For business inquiries : (+1) 438 601-1155
For special requests : (+1) 438 601-1155
This course equips participants with tools and techniques to address issues using Stormshield Network's UTM products through the Command Line Interface (CLI). It targets personnel from companies aiming for high-level Stormshield partnerships and those aspiring to become expert support engineers or trainers. Recognized by ANSSI, this certification holds high professional value and is eligible for CPF (code 237269).
Module 1: Introduction and Basics
Participant Introductions
Introduction to Operating System and UNIX Commands
Secure Shell (SSH) and File System Basics
Module 2: System Environment and Logs
Understanding System and User Environment
File Management and Commands
Log Management and Analysis
Module 3: Configuration Files and Backup
Exploring Configuration Files
Backup Strategies
Module 4: Network Fundamentals
Basics of Network and Routing
Configuring Network Interfaces
Routing Essentials
Module 5: Traffic Capture and Analysis
Techniques for Capturing and Analyzing Traffic
Hands-On Lab
Module 6: Advanced Security Queries (ASQ)
Introduction to ASQ
Security Policies and Filtering
Module 7: Network Address Translation (NAT) and Filtering
NAT Overview
Filtering Techniques
Module 8: Stateful Analysis and Tracking
ASQ Stateful Tracking
Connection Table Analysis
Module 9: Daemons and Processes
Understanding Daemons and Processes
Daemon Supervisor
Module 10: IPSec VPN Implementation
Basics of IPSec VPN
VPN Configuration Lab
Module 11: Public Key Infrastructure (PKI) and Certificates
Introduction to PKI and Certificates
Certificate Verification
Module 12: High Availability Configuration
High Availability Basics
Configuration and Management
Replication and Synchronization
HA Logs and Events
Stormshield is a cybersecurity company that specializes in providing comprehensive solutions to protect organizations from advanced cyber threats. They offer a range of security products and services, including network security, endpoint protection, cloud security, and industrial security.