Network Kings
  • Home
  • Courses
    • IT Networking
      • CCNA 200-301
      • CCNP
        • CCNP Enterprise
        • CCNP Security
        • CCNP Data Center
        • CCNP SPCOR
        • OSPF | BGP | MPLS course
      • CCIE
        • CCIE Enterprise
        • CCIE Security
      • Network Automation
        • Cisco SD-WAN
        • Cisco DevNet Associate
        • Python for Networking
      • Firewall Courses
        • Paloalto Firewall
        • Checkpoint Firewall
        • FortiGate Firewall
        • ASA & FTD Firewall
        • Sophos
      • F5 LTM Load Balancer
    • Cybersecurity
      • CEH (V12)
      • CISSP Training
      • Comptia Pentest+
      • Comptia Cysa+
    • Cloud & Infrastructure
      • Comptia A+
      • Comptia Network+
      • Comptia Security+
      • Red Hat Linux
      • Microsoft MCSA 2016
      • Microsoft Azure
      • AWS Associate
      • AWS Professional
      • AWS DevOps
      • GCP Cloud
      • Docker and Kubernetes
      • Vmware Training
    CISCO COURSES
    FIREWALL COURSES
    CLOUD & CYBERSECURITY
    MULTIVENDOR COURSES
    CISCO COURSES

    POPULAR COURSES

    CCNA 200-301
    CCNP Enterprise
    OSPF | BGP | MPLS
    CCNP Data Center
    CCIE Enterprise
    Cisco SD-WAN
    CCNP Security
    CCIE Security
    Python for Network Eng.
    CCNP Service Provider
    Cisco DevNet Associate

    MASTER’S PROGRAM

    IT Professional Master Program
    Network Engineer Master Program
    certification

    FIREWALL COURSES

    POPULAR COURSES

    PaloAlto Firewall
    CheckPoint Firewall
    Fortigate Firewall
    ASA & FTD Firewall
    Sophos XG

    MASTER’S PROGRAM

    Network Engineer Master Program
    Super Firewall Master Program
    Cyber Security Master Program
    certification

    CLOUD & CYBERSECURITY

    POPULAR COURSES

    AWS Associate
    AWS Professional
    AWS DevOps
    Microsoft Azure
    GCP Cloud
    Docker and Kubernetes
    CEH (V12)
    CISSP Training
    CompTIA PenTest+
    CompTIA Security+
    CompTIA A+
    CompTIA Network+
    CompTIA CySA+

    MASTER’S PROGRAM

    Cyber Security Master Program
    Cloud Security Master Program
    certification

    MULTIVENDOR COURSES

    POPULAR COURSES

    F5 LTM Load Balancer
    Microsoft MCSA 2016
    Red Hat Linux
    Linux Online Training
    VMware Training

    MASTER’S PROGRAM

    IT Professional Master Program
    Super Firewall Master Program
    certification

  • Job Oriented Programs
    • IT Professional Master Program
    • Network Engineer Master Program
    • Cyber Security Master Program
    • Cloud Security Master Program
    • Super Firewall Master Program
  • Expert Program
    • Network Expert Master Program
    • CyberSecurity Engineer
  • All Access Pass
  • Schedule
  • Login
Network Kings
Contact us

Super Firewall Master Program

 5/5

97% positive reviews

Advanced

About Course

With the increase in the demand for cybersecurity, Super Firewall Certification Course is a combination comprising of the best courses available in IT.

✅Palo Alto
✅Checkpoint
✅F5 LTM Load Balancer

All three certification courses further help in the designing, installing, managing, configuring, and troubleshooting of firewall systems.

Eligibility


  • Basic understanding of networking concepts
  • Fundamental knowledge of network security

Book Free 1 to 1 Guidance Session with Career Counsellor

Have a look at Network Kings
Terms and Privacy Policy

Multiple Languages

Choose from Hindi and English

24X7 Assistance

To answer your queries

Updated Syllabus

Latest resources to learn from

Hands on Experience

Practice with virtual labs

Get Certified

Earn a completion certificate

Curriculum designed to clear CCNA 200-301 Exam

CCNA Routing and Switching
Networking Fundamentals
Network Access
Routing and Switching Protocols
Wireless Access Point
Internet Protocol (IP) Services
Automation and Programmability
CCNA Routing and Switching
  • Exploring the network, configuring a network operating system.
  • Application layer, transport layer.
  • Network protocols and communications.
  • Network layer.
  • IP addressing, subnetting IP networks.
  • Network access.
  • Ethernet
Networking Fundamentals
  • To make students understand the role and function of various network components.
  • Explain characteristics of network technology architectures.
  • Compare cabling types with physical interface Compare UDP to TCP
  • Identify interface and cable issues
  • Configure and verify subnetting and IPv4 addressing
  • Configure and verify IPv6 prefix and addressing
Network Access
  • Verify and config VLANs (normal range) spanning multiple switches
  • Verify and configure interswitch connectivity
  • Configure and verify Layer 2 discovery protocols (Cisco Discovery Protocol and LLDP)
  • Configure and verify (Layer 2/Layer 3) EtherChannel (LACP)
  • Describe the need for basic operations of Rapid PVST+ Spanning Tree Protocol and also identify basic operations
  • Draw comparison between Cisco Wireless Architectures and AP modes
Routing and Switching Protocols
  • Ethernet
  • Network access
  • Subnetting IP networks and IP addressing
  • Network layer
  • Application layer, Transport layer
  • Communications and network protocols
  • Exploring the network and configuring a network operating system.
Wireless Access Point
  • Learn to allow different networks to connect to wireless networks
  • Increase productivity while reducing infrastructure costs.
Internet Protocol (IP) Services
  • Network protocols
  • Socket programming
  • IP routing
  • User datagram protocol
  • Window protocol
  • Sliding window protocols
Automation and Programmability
  • Explain how automation affects network management
  • Draw comparison between traditional networks and control based networking
  • Describe controller- based and software defined architectures (overlay, underlay and fabric)
  • Describe characteristics of REST based API’s (CRUD, HTTP VERBS AND DATA ENCODING)
  • Differentiate traditional campus device management with CISCO DNA Center enabled device management.
Download Brochure

We offer world's biggest virtual labs

Experience real-world simulations to become job ready.

Get 24×7 access to labs to learn at your convenience.

Access virtually from any part of the world.

Zero downtime.

Industry-oriented training.

Meet your Mentor

Atul Sharma

An experienced Network Engineer

Having 12+ years of experience in the IT industry, your favourite mentor, Atul Sharma, is a Network Engineer and the founder of Network Kings who began his IT journey merely through a YouTube channel in 2013 and focussed on his vision to produce Engineers worldwide. He has worked with Aricent, TCS, Apple, and Juniper.

OUR TOP INSTRUCTORS

Amit Bhatt

An experienced Industry Expert

After clearing the top certification exams - RHCE, and RHCSA, Amit Bhatt has become an asset to IT. He has approximately 11 years of industry experience. He has worked with firms like TechStratus Solutions Pvt. Ltd. CDAC, IBM, and Integrated Solutions.

OUR TOP INSTRUCTORS

Sukesh

An experienced CyberSecurity Engineer

Your mentor, Sukesh, has gained 12 years of industry experience by clearing CCIE Security, NSE1, NSE2, and VCP-DCV certification exams. He has worked with HCL, CompuCom, RSTFORUM, Capita IT Enterprise Services, Sungard Availability Services, and Cyber Software.

OUR TOP INSTRUCTORS

Adhirath

An Industry Specialist

One of your favourite mentors, Adirath, has around 4+ years of industry experience. He has worked with Ideogram Technology Solutions Pvt. Ltd. and has acquired CEH, CompTIA PenTest+, VMware, MCSA, CCNA, and CCNP certifications.

Regular LIVE Webinars

Upskill your knowledge with Live Webinars held by Industry Experts catering learners from different domains.

Attend A FREE Webinar

Upcoming Batches

Watch out for our upcoming Live webinars and events 

upcoming-paloalto-firewall
Weekday Batch
5 March, 08:00 PM IST
Book a Seat
upcoming-redhat-linux
Weekday Batch
15 March, 08:00 PM IST
Book a Seat
upcoming-ccna
Weekday Batch
17 Apr, 08:00 PM IST
Book a Seat
upcoming-ccnp
Weekday Batch
25 Apr, 08:00 PM IST
Book a Seat

Word of Mouth

Knowledge is Power. Know It From Our Alumni!

56% Hike

Pradipta Sannyasi

Network Engineer

Connect on Linkedin
Read review on Linkedin
72% Hike

Kartick Mondal

System Engineer

Connect on Linkedin
Read review on Linkedin
88% Hike

Harsh Sonker

Associate Consultant

Connect on Linkedin
Read review on Linkedin
95% Hike

Ilyas Khan

Network Administration Trainee

Connect on Linkedin
Read review on Linkedin
View More

Super Firewall Master Program Fees

Live Online Classes

  • 90+ Hours of Expert Training
  • 1:1 Doubt-clearance Sessions
  • Career Guidance
  • 24*7 Lab Access
  • Flexible Training

Super Firewall Master Program Weekend Batch

Sat-Sun

April 29th, 9 PM IST

Duration: 5 - 6 Months

Super Firewall Master Program Weekend Batch

Sat-Sun

July 1st, 9 PM IST

Duration: 5 - 6 Months

Super Firewall Master Program Weekend Batch

Sat-Sun

September 2nd, 9 PM IST

Duration: 5 - 6 Months

Corporate Training

  • If you wish to undergo the corporate training, feel free to contact us via email at Info@networkkings.org

Frequently Asked Questions

What is Palo Alto Firewall?
Passing CCNA can be a bit challenging, but with proper guidance and study material, one can clear the examination with flying colours.
What is CheckPoint Firewall?

One can pass CCNA in three months with complete dedication towards the course and learn all the mandatory skills in 3 months only if the course material is authentic.

What is F5 LTM load balancer?
Anyone with a graduation degree is open to enrolling in a CCNA course and learning networking from the beginning.
What if I miss an online class?
The passing score for CCNA certification is 800 out of 1000.
Where can I enroll for this course?
CCNA certification is good for the future since it marks the beginning of an individual's networking journey in IT and provides them with the basic skills required in the domain.
What if my query is not listed here?
CCNA certification is valid only for three years. Renewal is mandatory to avail of the benefits of the certification.
Didn’t find your query? Request a Callback
Network Kings
Accelerate your career with the best
IT courses to excel in the industry.
Play store App Image
apple

Company

About Us
Contact Us
Blog
Connect with Alumni
Reviews
Hire from Us
Career with Us
Affiliate
Terms & Conditions
Refund Policy
Privacy Policy
Pay in EMI
Help & Support
Become an Instructor
Pay

Contact Us

  • India Toll FREE: 1800 120 1334 (India)
  • support@nwkings.com

©2023. Network Kings. All Rights Reserved.

Syllabus

Palo Alto Firewall
Checkpoint Firewall
F5 LTM
Palo Alto Firewall

01

Palo Alto Networks Security Operating Platform Core Components

  • Components and operation
  • Zero Trust security model
  • Cyberattack lifecycle

02

Simply Passing Traffic

  • Firewall Interfaces
  • Security
  • Virtual Router

03

Traffic Visibility

  • Security policies
  • App-ID

04

Securing Traffic

  • Security Prole
  • Firewall

05

Identifying Users

  • Usernames

06

Deployment Optimization

  • Heatmap and BPA reports
Download Brochure

Checkpoint Firewall

01

Security Concepts

  • Introduction to Check point and its appliances, GAIA
    OS- Know your product
  • Introduction to Check Point architecture and
    terminologies
  • Overview of Security management and security
    gateway

02

Virtualization

  • Deploying Security Gateway and Security
    management server on GNS or VMware in distributed
    and standalone architecture
  • Integrating Security management with Security gateway
  • Licensing
  • Installing and navigating Smart Console

03

Check Point software ow & introduction to GAIA OS

  • Software blades- In depth discussion about different
    SW blades and usage
  • Firewall ow processing- Logical in depth GW rewall
    chains processing

04

Security Policy Management

  • In depth discussion about security policies- Inline layers,
    ordered layers
  • Access, Application control and Threat prevention policies
  • NAT (Hide NAT, Static NAT)
  • URLF (URL ltering) In-depth discussion about how URL
    gets categorized
  • QoS
    Labs: Creating security policies to allow or block access

05

Logs and Monitoring

  • Smart view tracker
  • Working and trafc analysis using Trafc and system
    logs
    Labs: Live logs capturing and analysis

06

ClusterXL & VRRP

  • Check Point Firewall in redundancy
  • Cluster troubleshooting
    Labs: Deploying Check Point cluster solution

07

Working with VSX

  • Labs: Deploying and working with VSX environments
checkpoint
Download Brochure

F5 LTM

01

Setting Up the BIG-IP System

  • Introducing the BIG-IP System
  •  Initially Setting Up the BIG-IP System
  • Archiving the BIG-IP Configuration
  • Leveraging F5 Support Resources and Tools

02

Reviewing Local Traffic Configuration

  • Reviewing Nodes, Pools, and Virtual Servers
  • Reviewing Address Translation
  • Reviewing Routing Assumptions
  • Reviewing Application Health Monitoring
  • Reviewing Traffic Behavior Modification with Profiles
  • Reviewing the TMOS Shell (TMSH)
  • Reviewing Managing BIG-IP Configuration Data

03

Load Balancing Traffic with LTM

  • Exploring Load Balancing Options
  • Using Priority Group Activation and Fallback Host
  • Comparing Member and Node Load Balancing

04

Modifying Traffic Behavior with Persistence

  • Reviewing Persistence
  • Introducing Cookie Persistence
  • Specifying Default and Fallback Persistence
  • Introducing SSL Persistence
  • Introducing SIP Persistence
  • Introducing Universal Persistence
  • Introducing Destination Address Affinity Persistence
  • Using Match Across Options for Persistence

05

Monitoring Application Health

  • Differentiating Monitor Types
  • Customizing the HTTP Monitor
  • Monitoring an Alias Address and Port
  • Monitoring a Path vs. Monitoring a Device
  • Managing Multiple Monitors
  • Using Application Check Monitors
  • Using Manual Resume and Advanced Monitor Timer
    Settings

06

Processing Traffic with SNATs

  • Overview of SNATs
  • Using SNAT Pools
  • SNATs as Listeners
  • SNAT Specificity
  • VIP Bounceback
  • Additional SNAT Options
  • Network Packet
  • Processing Review

07

Processing Traffic with Virtual Servers

  • Understanding the Need for Other Virtual
    Server Types
  • Forwarding Traffic with a Virtual Server
  • Understanding Virtual Server Order of
    Precedence
  • Path Load Balancing

08

Modifying Traffic Behavior with Profiles

  • Profiles Overview
  • TCP Express Optimization
  • TCP Profiles Overview
  • HTTP Profile Options
  • HTTP/2 Profile Options
  • OneConnect
  • Offloading HTTP Compression to BIG-IP
  • Web Acceleration Profile and HTTP Caching
  • Stream Profiles
  • F5 Acceleration Technologies

09

Selected Topics

  • VLAN, VLAN Tagging, and Trunking
  • Restricting Network Access
  • SNMP Features
  • Segmenting Network Traffic with Route Domains

10

Customizing Application Delivery with iRules

  • Getting Started with iRules
  • Understanding When iRules are Triggered
  • Deploying iRules
  • Constructing an iRule
  • Testing and Debugging iRules
  • Exploring iRules Documentation

11

Customizing Application Delivery with Local Traffic Policies

  • Introducing the BIG-IP System
  • Initially Setting Up the BIG-IP System
  • Archiving the BIG-IP Configuration
  • Leveraging F5 Support Resources and Tools