Introduction¶
Concrete Experience¶
Objectives¶
-
Understand the characteristics and functionalities of different types of firewalls, including packet filtering, stateful inspection, proxy, and next-generation firewalls.
-
Identify and describe various firewall topologies and their role in enhancing network security, such as bastion host, screened subnet, multi-homed firewall, belt-and-suspenders, screened host, and proxy server.
-
Understand the purpose and process of vulnerability scanning, including how tools like Nessus identify, prioritize, and provide remediation guidance for system vulnerabilities.
-
Identify and explain the critical capabilities of network-based security, including intrusion detection and prevention, threat intelligence, traffic analysis, access control, and encryption.
TLO Knowledge and Skills¶
Condition:¶
- Given a classroom, applicable references, and a practical exercise, the Cyber Mission Force student will demonstrate an understanding of firewall security rules and network firewall configurations.
Knowledge:¶
- Types of Firewalls
- Firewall Topologies
- Vulnerability Scanning
- Capabilities of Network-Based Security
Skills:¶
- Apply firewall rules