Radware DefensePro Level 1 - RAD300-101


This course covers DefensePro® product.

Learn how to isolate, block and prevent application-level attacks, coupling unmatched security performance with advanced security intelligence. Understand how to securely connect and protect all mission-critical applications by thwarting viruses, intrusions, Trojans, worms and Denial of Service attacks. Learn how to eliminate security tool vulnerabilities and bottlenecks across all combined security architectures, overcoming the security vs. performance trade-off for fault-tolerant and highly scalable defense.

Please bring your laptop to complete the hands-on lab exercises. Students will use well-known applications such as PDF Reader, VNC, Telnet, SSH and possibly other Radware-proprietary apps. Therefore, it is also important to have administrative rights on your laptop.

  • Install and deploy a DefensePro based on deployments guidelines
  • Understand the different Attack Protection capabilities and how to configure them
  • Navigate and use APSolute Vision
  • Understand and use Vision Reporter
  • expand_more chevron_right Zielgruppe

      expand_more chevron_right Vorkenntnisse

      Für dieses Seminar werden folgende Vorkenntnisse empfohlen: Familiarity with common network terminology, TCP/IP addressing & routing, and Internetworking concepts is required. Delegates should also be proficient in basic PC operation and application, including skilled at operating a keyboard, mouse and Windows OS as well as basic Web browser operation (Internet Explorer used in class).

      expand_more chevron_right Detail-Inhalte

      1. Day 1
      2. Presentations:
        1. Introduction
        2. Connectivity
        3. Administration and Security Policies
        4. Behavioral DoS
          1. BDos With DNS Protection
      3. Hands on Labs:
        1. Administration and Initial Configuration:
          1. Initial DefensePro Setup
          2. Connecting to Your DefensePro Using APSolute Vision
          3. Administering DefensePro
        2. Network Flood Protection:
          1. Behavioral DoS Protection
      4. Day 2
      5. Presentations:
        1. Anti Scanning
        2. SYN Flood Protection
          1. DefenseSSL
        3. Connection Limits
        4. Server Protections
          1. Server Cracking Protection
          2. HTTP Mitigator
      6. Hands on Labs:
        1. Network Flood Protection:
          1. DNS Flood Protection
          2. SYN Flood Protection
          3. SYN Flood SSL Protection
          4. Connection Limits
        2. Server Protection:
          1. Server Cracking Protection Lab 9 –
          2. HTTP Mitigator Protection
      7. Day3
      8. Presentations:
        1. Signature Protections
          1. Signature Profiles
          2. Custom Signatures
        2. Policy Exceptions (Black & White Lists)
        3. ACL
        4. Deployment Guidelines
        5. Vision and Vision Reporter
      9. Hands on Labs:
        1. Signature Protection:
          1. Signature Protection
          2. Custom Signatures
        2. Additional Components
          1. Policy Exceptions (Black & White lists)
          2. Administration
          3. Vision Reporter


        Durch Angabe Ihrer E-Mail-Adresse und Anklicken des Buttons „Newsletter abonnieren“ erklären Sie sich damit einverstanden, dass ETC Ihnen regelmäßig Informationen zu IT Seminaren und weiteren Trainings- und Weiterbildungsthemen zusendet. Die Einwilligung kann jederzeit bei ETC widerrufen werden.

      Ähnliche Seminare