Network Kings
  • Home
  • Courses
    • IT Networking
      • CCNA 200-301
      • CCNP
        • CCNP Enterprise
        • CCNP Security
        • CCNP Data Center
        • CCNP SPCOR
        • OSPF | BGP | MPLS course
      • CCIE
        • CCIE Enterprise
        • CCIE Security
      • Network Automation
        • Cisco SD-WAN
        • Cisco DevNet Associate
        • Python for Networking
      • Firewall Courses
        • Paloalto Firewall
        • Checkpoint Firewall
        • FortiGate Firewall
        • ASA & FTD Firewall
        • Sophos
      • F5 LTM Load Balancer
    • Cybersecurity
      • CEH (V12)
      • CISSP Training
      • Comptia Pentest+
      • Comptia Cysa+
    • Cloud & Infrastructure
      • Comptia A+
      • Comptia Network+
      • Comptia Security+
      • Red Hat Linux
      • Microsoft MCSA 2016
      • Microsoft Azure
      • AWS Associate
      • AWS Professional
      • AWS DevOps
      • GCP Cloud
      • Docker and Kubernetes
      • Vmware Training
    CISCO COURSES
    FIREWALL COURSES
    CLOUD & CYBERSECURITY
    MULTIVENDOR COURSES
    CISCO COURSES

    POPULAR COURSES

    CCNA 200-301
    CCNP Enterprise
    OSPF | BGP | MPLS
    CCNP Data Center
    CCIE Enterprise
    Cisco SD-WAN
    CCNP Security
    CCIE Security
    Python for Network Eng.
    CCNP Service Provider
    Cisco DevNet Associate

    MASTER’S PROGRAM

    IT Professional Master Program
    Network Engineer Master Program
    certification

    FIREWALL COURSES

    POPULAR COURSES

    PaloAlto Firewall
    CheckPoint Firewall
    Fortigate Firewall
    ASA & FTD Firewall
    Sophos XG

    MASTER’S PROGRAM

    Network Engineer Master Program
    Super Firewall Master Program
    Cyber Security Master Program
    certification

    CLOUD & CYBERSECURITY

    POPULAR COURSES

    AWS Associate
    AWS Professional
    AWS DevOps
    Microsoft Azure
    GCP Cloud
    Docker and Kubernetes
    CEH (V12)
    CISSP Training
    CompTIA PenTest+
    CompTIA Security+
    CompTIA A+
    CompTIA Network+
    CompTIA CySA+

    MASTER’S PROGRAM

    Cyber Security Master Program
    Cloud Security Master Program
    certification

    MULTIVENDOR COURSES

    POPULAR COURSES

    F5 LTM Load Balancer
    Microsoft MCSA 2016
    Red Hat Linux
    Linux Online Training
    VMware Training

    MASTER’S PROGRAM

    IT Professional Master Program
    Super Firewall Master Program
    certification

  • Job Oriented Programs
    • IT Professional Master Program
    • Network Engineer Master Program
    • Cyber Security Master Program
    • Cloud Security Master Program
    • Super Firewall Master Program
  • Expert Program
    • Network Expert Master Program
    • CyberSecurity Engineer
  • All Access Pass
  • Schedule
  • Login
Network Kings
Contact us

Cloud Security Master Program

 5/5

97% positive reviews

Advanced

About Course

This Master’s Program is for individuals who want to specialize in cloud security using Microsoft Azure. This master’s program covers the fundamentals of cloud security and the advanced security features of Azure.

✅ Azure 700 & Azure 500
✅ Azure 700

You will learn advanced-level cloud security skills and technologies.

Eligibility


  • Experience in IT security, networking, and cloud computing.
  • Basic knowledge of cloud computing.
  • A computer with an internet connection.
Play Video

Book Free 1 to 1 Guidance Session with Career Counsellor

Have a look at Network Kings
Terms and Privacy Policy

Multiple Languages

Choose from Hindi and English

24X7 Assistance

To answer your queries

Updated Syllabus

Latest resources to learn from

Hands on Experience

Practice with virtual labs

Get Certified

Earn a completion certificate

Syllabus

CCNP ENCOR
F5 LTM Firewall
Palo Alto Firewall
Checkpoint Firewall
CCNP ENCOR

01

Architecture

  • Enterprise Network
  • WLAN Deployment
  • Cisco SD-WAN Solutions
  • Cisco SD-Access Solution
  • Wireless QoS
  • Switching Mechanisms

02

Virtualization

  • Virtualization technologies
  • Path virtualization technologies
  • Virtualization Concepts

03

Infrastructure

  • Layer 2
  • Layer 3
  • Wireless
  • IP Services

04

Network Assurance

  • Diagnose network problems using various tools

05

Security

  • Configure and verify device access control
  • Configure and verify infrastructure security features
  • Describe REST API security
  • Configure and verify wireless security features
  • Describe components of network security design

06

Automation

  • Basic Python components and scripts

ccnp training
Download Brochure

F5 LTM Firewall

01

Setting Up the BIG-IP System

  • Introducing the BIG-IP System
  •  Initially Setting Up the BIG-IP System
  • Archiving the BIG-IP Configuration
  • Leveraging F5 Support Resources and Tools

02

Reviewing Local Traffic Configuration

  • Reviewing Nodes, Pools, and Virtual Servers
  • Reviewing Address Translation
  • Reviewing Routing Assumptions
  • Reviewing Application Health Monitoring
  • Reviewing Traffic Behavior Modification with Profiles
  • Reviewing the TMOS Shell (TMSH)
  • Reviewing Managing BIG-IP Configuration Data

03

Load Balancing Traffic with LTM

  • Exploring Load Balancing Options
  • Using Priority Group Activation and Fallback Host
  • Comparing Member and Node Load Balancing

04

Modifying Traffic Behavior with Persistence

  • Reviewing Persistence
  • Introducing Cookie Persistence
  • Specifying Default and Fallback Persistence
  • Introducing SSL Persistence
  • Introducing SIP Persistence
  • Introducing Universal Persistence
  • Introducing Destination Address Affinity Persistence
  • Using Match Across Options for Persistence

05

Monitoring Application Health

  • Differentiating Monitor Types
  • Customizing the HTTP Monitor
  • Monitoring an Alias Address and Port
  • Monitoring a Path vs. Monitoring a Device
  • Managing Multiple Monitors
  • Using Application Check Monitors
  • Using Manual Resume and Advanced Monitor Timer
    Settings

06

Processing Traffic with SNATs

  • Overview of SNATs
  • Using SNAT Pools
  • SNATs as Listeners
  • SNAT Specificity
  • VIP Bounceback
  • Additional SNAT Options
  • Network Packet
  • Processing Review

07

Processing Traffic with Virtual Servers

  • Understanding the Need for Other Virtual
    Server Types
  • Forwarding Traffic with a Virtual Server
  • Understanding Virtual Server Order of
    Precedence
  • Path Load Balancing

08

Modifying Traffic Behavior with Profiles

  • Profiles Overview
  • TCP Express Optimization
  • TCP Profiles Overview
  • HTTP Profile Options
  • HTTP/2 Profile Options
  • OneConnect
  • Offloading HTTP Compression to BIG-IP
  • Web Acceleration Profile and HTTP Caching
  • Stream Profiles
  • F5 Acceleration Technologies

09

Selected Topics

  • VLAN, VLAN Tagging, and Trunking
  • Restricting Network Access
  • SNMP Features
  • Segmenting Network Traffic with Route Domains

10

Customizing Application Delivery with iRules

  • Getting Started with iRules
  • Understanding When iRules are Triggered
  • Deploying iRules
  • Constructing an iRule
  • Testing and Debugging iRules
  • Exploring iRules Documentation

11

Customizing Application Delivery with Local Traffic Policies

  • Introducing the BIG-IP System
  • Initially Setting Up the BIG-IP System
  • Archiving the BIG-IP Configuration
  • Leveraging F5 Support Resources and Tools

12

Securing Application Delivery with LTM

  • Understanding Today’s Threat Landscape
  • Integrating LTM Into Your Security Strategy
  • Defending Your Environment Against SYN Flood
    Attacks
  • Defending Your Environment Against Other
    Volumetric Attacks
  • Addressing Application Vulnerabilities with iRules and
    Local Traffic Policies
  • Detecting and Mitigating Other Common HTTP
    Threats

13

Customizing Application Delivery with Local Traffic Policies

  • About the Final Lab Project
Download Brochure

Palo Alto Firewall

01

Palo Alto Networks Security Operating Platform Core Components

  • Components and operation
  • Zero Trust security model
  • Cyberattack lifecycle

02

Simply Passing Traffic

  • Firewall Interfaces
  • Security
  • Virtual Router

03

Traffic Visibility

  • Security policies
  • App-ID

04

Securing Traffic

  • Security Prole
  • Firewall

05

Identifying Users

  • Usernames

06

Deployment Optimization

  • Heatmap and BPA reports
Download Brochure

Checkpoint Firewall

01

Security Concepts

  • Introduction to Check point and its appliances, GAIA
    OS- Know your product
  • Introduction to Check Point architecture and
    terminologies
  • Overview of Security management and security
    gateway

02

Virtualization

  • Deploying Security Gateway and Security
    management server on GNS or VMware in distributed
    and standalone architecture
  • Integrating Security management with Security gateway
  • Licensing
  • Installing and navigating Smart Console