Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CCNP Security Firewall – Cisco Firepower FTD 7.x Course 2025 – NGFW & FMC
Virtual Labs - EVE-NG
EVE-nG Professional License (6:35)
EVE-NG Virtual Platform (6:31)
IOL Devices - EVE-nG (7:17)
WIndows - EVE-NG (10:10)
Connecting WIndows PC- EVE-Topology (11:58)
Connecting WIndows PC - Internet (9:28)
GNS3 Overview
Virtual Labs - CCNP CCIE (9:12)
Cisco Lab Options (7:35)
About GNS3 (3:44)
Installing GNS3 on Windows (6:39)
Download links - FTD FMC 7.x
LINKS
FTD Lab Topology
Firepower Lab - Topology (9:20)
FTD Basic CLI Configration (7:57)
FMC 7x - Basic Setup CLI (5:37)
FMC 7x - GUI Login (3:40)
Regsiter FTD1 with FMC (12:33)
FTD Interface - Routing
Why Firewall needs Routing (3:43)
FTD interface Configuration (11:04)
FTD OSPF Routing - LAN (8:01)
FTD Default Routing (9:07)
FTD RIPv2 Routing (8:40)
Redistribution - OSPF-Static on FTD (8:20)
OSPF Routing - DMZ4 (7:07)
BGP Routing-Redistribution -FTD (25:45)
Network Address Translation
What is NAT (7:55)
Public-Private IP (5:14)
Why do we need NAT (6:33)
NAT Types (11:39)
FTD NAT Labs
Access Control Policies - Default (15:53)
Permit IN to OUT and DMZ Traffic (12:08)
Dynamic NAT (14:51)
Static NAT (12:32)
Permit OUT-DMZ Servers (16:29)
Port Address Translation- PAT (12:21)
Static PAT (12:59)
Policy NAT-Manual NAT (22:53)
Firewall policies -Introduction
Firewall Policies - Rules (5:43)
Firewall Security Zones (5:18)
Firewall objects-groups (7:23)
Firewall Actions -permit block monitor (7:17)
Firewall Policies - General
Rule-1 LAN-Internet-Allow (7:08)
Rule 2 INTERNET_DMZ3_SERVERS (4:13)
Rule 1-2 Verfication (2:55)
Rule 3 - LAN-to-DMZ-Servers (4:45)
LAN-to-DMZ-Servers - Configuration (7:55)
Rule4-DMZ-to-Internet (5:01)
Rule4-DMZ-to-Internet Configuration (4:04)
Rule5- DMZ3-to-DMZ4 (3:30)
Rule5- DMZ3-to-DMZ4 Configuration (2:55)
Rule6 -DENY_LAN_DMZ3 (5:00)
Rule6 -DENY_LAN_DMZ3 Configuration (5:29)
Rule7 -Implicit-Deny-All (4:17)
Rule7 -Implicit-Deny-All Configuration (6:04)
Firewall Policies - Services Ports
Policies -Service ports (9:52)
Rule1-Services LAN to INTERNET (6:24)
Services Rule1-LAN to INTERNET Config (5:04)
Services Rule2-Internet to DMZ3 (5:53)
Services Rule2-Internet to DMZ3 Config (4:18)
Services Rule3-LAN to DMZ (3:58)
Services Rule3-LAN to DMZ Config (6:04)
Services Rule4- DMZ to Internet (4:13)
Services Rule4- DMZ to Internet config (3:02)
Services Rule5- DMZ to DMZ (3:17)
Services Rule5- LAN to DMZ Deny (3:36)
Services Rule5- LAN to DMZ Deny Config (2:28)
Firewalll Policies - URL Filtering
Firewall URL Filtering (22:03)
URL Filtering-Block Categories (11:06)
URL Filtering-Block Categories Config (11:06)
URL Filtering-Allowed Categories (6:05)
URL Filtering-Allowed Categories Config (2:46)
URL Filtering-Custom Lists Config (3:58)
Custom URL Filtering-WhiteLists Config (7:22)
Application Filtering
Application Filtering-Firewalls (6:10)
Application Filtering-How it works (7:10)
Application Filtering-Examples (6:40)
Application Filtering-Block List Config (8:29)
Application Filtering-Allowed List (7:18)
Application Filtering-Allowed List -22 (1:22)
Application Filtering-Allowed List Config (7:16)
Application Filtering-DMZ to Internet Allow (6:24)
Application Filtering-DMZ to Internet Allow Co (7:37)
Application Filtering-DMZ to Internet Deny (6:05)
Application Filtering-DMZ to Internet Deny Con (8:30)
Geo Location Filtering
Geolocation Based Filtering-Benifits (4:07)
Geolocation Based Filtering (12:19)
Geolocation Based Filtering-Rule1 (6:56)
Geolocation Based Filtering-Rule1 Config (11:21)
Geolocation Based Filtering-Rule2 (2:41)
Geolocation Based Filtering-Rule2 Config (5:00)
Geolocation Based Filtering-Rule3 (4:04)
Geolocation Based Filtering-Rule3 Config (4:10)
Geolocation Based Filtering-Rule4 (2:13)
High Availablty Concepts
High Availability - Network (16:03)
Understanding High Availability (HA) (12:30)
High Availability-Switches (16:03)
High Availability-Firewalls (7:29)
High Availability-Servers (6:51)
High Availability-Summary (15:46)
High Availability-Best Practices (8:44)
HA in Firewalls (8:39)
HA Firewall Concepts (10:25)
HA - FIrewall Vendors (4:21)
High Availablty - Firewalls
HA - Firewalls HA - (7:08)
High Availablity - Modes (8:12)
High Availablity - Ports (7:00)
High Availablity - HearBeat (11:25)
High Availablity - Failover Trigger (10:30)
High Availablity - Config Sync (7:18)
High Availablity - Session Sync (13:17)
HA - Link Path Monitoring (6:51)
HA -Prerequisite - PaloAlto (6:42)
FTD High Availablity
FTD high Availablity - Lab Topology (3:53)
FTD HA - FTD 2 Basic CLI Setup (7:05)
Register FTD2 with FMC (3:11)
Regsiter FTD1 with FMC (12:33)
FTD VPN
Site to Site VPN Configuration - FTD Side (18:28)
VPN Topology Setup - FTD Firewall (17:23)
Intrusion Prevention System - IPS
SQL Injection Attacks (4:26)
What is Intrusion -Types (11:29)
Web Shells Attack (3:28)
Local-Remote File Inclusion Attacks (3:23)
Cross-Site Request Forgery (CSRF) Attacks (3:13)
Server-Side Request Forgery (SSRF) Attacks (3:19)
Network-Protocol Based Attacks (9:25)
Vulnerability Exploit Based Attacks (7:12)
Ransomware Attacks (3:19)
Supply Chain Attacks (2:34)
API-Based Attacks (2:10)
Cloud-Native Attacks (2:11)
Phishing & Spear Phishing (2:40)
Intrusion Prevention System-IPS (11:54)
IPS vs IDS (7:26)
Host-Based IPS (HIPS) (14:03)
Network-Based IPS (NIPS) (13:02)
Host vs Network IPS Comparison (9:51)
IPS-Inline vs promisciuos Deployment Modes (9:27)
Signature-Based Detection - IPS (8:49)
Anomaly-Based Detection - IPS (7:58)
Policy-Based Detection - IPS (5:57)
Reputation-Based Detection - IPS (7:09)
Logging
Device-Network Events Logging (9:39)
Syslog - Terminal Logging (6:48)
Cryoptography
What is Cryptography (3:40)
Goals of Cryptography (3:47)
What is Hashing and How it works (2:56)
Hashing Drawbacks (2:15)
Hashing with HMAC (3:16)
What is Encryption - Decryption (1:53)
Encryption Algorithms - Symmetric vs Assymetric (5:26)
Cryptanalysis - Attacks (4:23)
Assymetric Encryption - Drawbacks (3:13)
Public Key Infrastructure (4:16)
VPN-Basics
VPN-Introduction (5:09)
VPN Types (3:49)
VPN Logical Topologies (1:25)
VPN Default Lab Setup- Routers (5:22)
VPN Default Topology - IOU - GNS3 (11:49)
About IPSEC
IPsec Security Services (6:53)
what is ipsec (2:48)
IPsec Modes - Tunnel vs Transport (5:29)
IPSec Site to site VPN
How IPsec VPN works (5:19)
Step-1 Interesting Traffic Configuration (3:02)
Step-2 IKE Phase-1 (7:36)
Step-3- IKE - Phase 2 (8:30)
IKE Phase -2 Configuration- Verification (6:56)
IPSEC VPN - With NAT (12:43)
IPSEC VPN - Dynamic IP Remote Site (16:45)
IKEv1 Phase 1-2 - Modes-Messages
IKE Phases -Modes (1:57)
IKE Phase 1 - Main Mode (5:47)
IKE Phase 1 - Aggressive Mode (8:12)
Phase1 - Agressive vs Main Mode (1:11)
IKE Phase 2 - Main Mode (8:12)
IPSEC VPN - LImitations (5:00)
IKEv2- Foundations
IKEv1 vs IKEv2 (13:47)
IPSEC KEv2 (8:47)
IKEv2 - Phase 1-IKE-SA_INIT_AUTH (12:22)
IKEv2 - Phase 2 - CHILD SA (7:02)
IKEv2 - Platform Support (4:16)
IKEv2 - Supported VPNs (4:56)
IKEv2-SIte-Site VPN
IKEv2- Site-Site VPN -Lab Setup (5:05)
IKEv2 -Site-Site VPN - Proposals (12:04)
IKEv2 -Site-Site VPN - Policy (8:32)
IKEv2 -Site-Site VPN - KeyRing (10:25)
IKEv2 -Site-Site VPN - Profile (7:23)
IKEv2 -Site-Site VPN - IPSec (7:09)
IKEv2 -Site-Site VPN - Verification (4:36)
SSL VPN-OVerview
Remote Access VPN (2:32)
What is SSL - TLS (3:06)
How SSL-TLS Works (7:53)
What is SSL VPN (4:17)
SSL VPN Modes (6:02)
Teach online with
IKE Phase 2 - Main Mode
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock