You are on page 1of 2

AlgoSec

Level 1Firewall Analyzer(Online


- User Courses Configuration Training
Self-Training)
Training course
Introduction AlgoSec Firewall Analyzer can be configured for each customer’s needs and
can be implemented in different distributed deployments. This course focuses
on AlgoSec Firewall Analyzer Advanced Configuration and Integration.

Training This 3-day, expert AlgoSec Firewall Analyzer configuration training includes
theoretical sessions as well as hands-on labs for most of the topics.
Overview
Students who complete AlgoSec Firewall Analyzer Configuration course are
certified as CASE (Certified AlgoSec Security Expert).

This training course is designed for:


Who Should Take
• AlgoSec ASMS Sys Admins who need to configure and integrate their
This Training? company’s AlgoSec Firewall Analyzer system.
• AlgoSec Channel Partners or consultants who wish to offer Firewall
Analyzer implementation services to their customers

Prerequisite Participants are expected to be:


• ASMS Sys Admin Certified or Deployment certified
Knowledge • Working with AlgoSec Firewall Analyzer for at least one month.
• Having a basic knowledge of Linux CLI and of using PuTTy and WinSCP

Duration: 3 days
Training Schedule Class hours: 09:00 to 17:00 each day
and Language Language: English

Each participant should bring a laptop with these capabilities:


Equipment
• Access to the internet
• A web browser (Chrome is preferred) with HTTPS connectivity (port 443)
• SSH client (PuTTY, MobaXterm etc), WinSCP
• Office, to read PPTs and documents

For more details and registration, please send an email to


Registration
training@algosec.com
AlgoSec Firewall Analyzer Configuration Course Outline

Baseline Compliance
• Baseline report and usage
• Baseline Profile Configuration

Reporting Tool
• OOB Charts and Dashboards
• Customized Charts
• Customized Dashboards

Web Services API


• REST API
• Swagger
• SOAP API

Rule Documentation and Policy Tab


• Policy Tab
• Rule Documentation

Query Mechanism
• Single Device Query
• Group Query
• FIP Algorithm

Network Map
• Capabilities and Limitations
• Map Work

Map Configuration
• Improving Accuracy
• Troubleshooting

Risk Configuration
• Configuring Risks
• Risk Profile from Spreadsheet
• Trusted Traffic

You might also like