logo

SonicWall Course

course overview

download outline

Select Country and City to View dates & book now

Overview

The SonicWall Network Security Administration course provides students the required background, knowledge and hand-on experience to begin designing, implementing and troubleshooting SonicWall Network Security Appliances running SonicOS firmware.

Audience

Security professionals, System engineers, channel partners, service partners, and end users with one-or-more years of experience in implementing IT security technologies (Network, Applications, and Systems)

Skills Gained

This course will enable students to configure, monitor, manage, and optimize the SonicWall Next-Gen firewall appliances running SonicOS to effectively defend against evolving and emerging network and cyber security threats.

This course will enable students to configure, monitor, manage, and optimize the SonicWall Next-Gen firewall appliances running SonicOS to effectively defend against evolving and emerging network and cyber security threats. Upon completion of the course, the students will be able to configure the SonicWall firewall for Secure and Remote Connectivity, Network Optimization, and Advanced Threat Protection. Upon completion of the course, the students will be able to configure the SonicWall firewall for Secure and Remote Connectivity, Network Optimization, and Advanced Threat Protection. Upon completion of the course, the students will be able to configure the SonicWall firewall for Secure and Remote Connectivity, Network Optimization, and Advanced Threat Protection.

Prerequisites

The SonicWall Network Security Administration course provides students the required background, knowledge and hand-on experience to begin designing, implementing and troubleshooting SonicWall Network Security Appliances running SonicOS firmware.

  • High-level understanding of networking fundamentals and architecture, including OSI data model, IP addressing, dynamic routing, switching, VoIP, cloud and virtualization, network topologies and connectivity, wired and wireless networks, system backup and recovery, network applications and peripherals, network management protocols, etc.
  • Knowledge of enterprise security concepts and technologies, such as firewalls, gateways, VPN architecture, threat protection, content filtering, NAT, IPSec, SSL, DPI, zones, encryption and cryptography, access control, Identity management, security compliance policies, latest cyber threats and vulnerabilities, etc.

High-level understanding of networking fundamentals and architecture, including OSI data model, IP addressing, dynamic routing, switching, VoIP, cloud and virtualization, network topologies and connectivity, wired and wireless networks, system backup and recovery, network applications and peripherals, network management protocols, etc. High-level understanding of networking fundamentals and architecture, including OSI data model, IP addressing, dynamic routing, switching, VoIP, cloud and virtualization, network topologies and connectivity, wired and wireless networks, system backup and recovery, network applications and peripherals, network management protocols, etc. High-level understanding of networking fundamentals and architecture, including OSI data model, IP addressing, dynamic routing, switching, VoIP, cloud and virtualization, network topologies and connectivity, wired and wireless networks, system backup and recovery, network applications and peripherals, network management protocols, etc.

Knowledge of enterprise security concepts and technologies, such as firewalls, gateways, VPN architecture, threat protection, content filtering, NAT, IPSec, SSL, DPI, zones, encryption and cryptography, access control, Identity management, security compliance policies, latest cyber threats and vulnerabilities, etc. Knowledge of enterprise security concepts and technologies, such as firewalls, gateways, VPN architecture, threat protection, content filtering, NAT, IPSec, SSL, DPI, zones, encryption and cryptography, access control, Identity management, security compliance policies, latest cyber threats and vulnerabilities, etc. Knowledge of enterprise security concepts and technologies, such as firewalls, gateways, VPN architecture, threat protection, content filtering, NAT, IPSec, SSL, DPI, zones, encryption and cryptography, access control, Identity management, security compliance policies, latest cyber threats and vulnerabilities, etc.

Outline

Course modules 1. Setting up Basic Firewall Components 2. Unified Threat Management 3. Secure Access 4. Deep Packet Inspection for SSL (DPI-SSL) 5. Content Filtering Services 6. Application Control 7. Scalability and Reliability 8. High Availability

Talk to an expert

Thinking about Onsite?

If you need training for 3 or more people, you should ask us about onsite training. Putting aside the obvious location benefit, content can be customised to better meet your business objectives and more can be covered than in a public classroom. Its a cost effective option. One on one training can be delivered too, at reasonable rates.

Submit an enquiry from any page on this site and let us know you are interested in the requirements box, or simply mention it when we contact you.

All $ prices are in USD unless it’s a NZ or AU date

SPVC = Self Paced Virtual Class

LVC = Live Virtual Class

Please Note: All courses are availaible as Live Virtual Classes

Trusted by over 1/2 million students in 15 countries

Our clients have included prestigious national organisations such as Oxford University Press, multi-national private corporations such as JP Morgan and HSBC, as well as public sector institutions such as the Department of Defence and the Department of Health.