Registration in a program is done on a course-by-course basis each term. The expected availability of courses is displayed below but may change throughout the year. Click on the arrows below to confirm upcoming course offerings and to add a course to your online shopping cart. For assistance, please use the inquiry form on this page or call 519-452-4277.

Overview

Micro-credential Series Description

This micro-credential series will study the theory and procedures required to secure the edge of a network from potential internal and external threats. The micro-credential series will provide students with the skillset to configure and enhance network security to meet constantly changing requirements.

Courses

Micro-credential Series Requirements

Firewall
Take all of the following Mandatory Courses:
INFO-1285Checkpoint Firewall
This course provides the student with a general understanding of how to install, configure, and manage CheckPoint firewalls for defense of Small and Medium Businesses as well as enterprise network architecture. Students will learn the theory and configuration steps for setting up the security, networking, threat prevention, logging, and reporting features of next generation firewall technologies. Learning Outcomes: 1. Compare and contrast industry leading firewall platforms, architecture, and defense capabilities. 2. Demonstrate a basic firewall configuration, initial access, interfaces, security zones, virtual routing, filtering, licensing, service routes, software updates, and policy-based forwarding. 3. Analyze security policy administrative concepts related to source and destination network address translation. 4. Outline and construct security policies to identify known and unknown application software running on the service network. 5. Differentiate, configure, and deploy filtering and file blocking technologies such as anti-virus, anti-spyware, and intrusion detection and intrusion prevention systems. 6.Configure and deploy Virtual Private Network (VPN). Total class hours - 24.
INFO-1286Cisco Firewall
This course provides the student with a general understanding of how to install, configure, and manage Cisco firewalls for defense of Small and Medium Businesses as well as enterprise network architecture. Students will learn the theory and configuration steps for setting up the security, networking, threat prevention, logging, and reporting features of Cisco's next generation firewall technologies. Learning Outcomes: 1. Compare and contrast industry leading firewall platforms, architecture, and defense capability related to zero trust security models and public cloud security. 2. Demonstrate a basic firewall configuration, initial access, interfaces, security zones, virtual routing, filtering, licensing, service routes, software updates, and policy-based forwarding. 3. Analyze security policy administrative concepts related to source and destination network address translation. 4. Outline and construct security policies to identify known and unknown application software running on the service network. 5. Differentiate, configure, and deploy filtering technologies such as anti-virus, and anti-spyware to protect against telemetry induced attack vectors. 6.Configure and deploy Virtual Private Network (VPN). Total class hours - 24.
INFO-1287Palo Alto Firewall
This course provides students with a general understanding of how to install, configure, and manage Palo Alto firewalls for defense of Small and Medium Businesses as well as enterprise network architecture. Students will learn the theory and practice of setting up the security, networking, threat prevention, logging, and reporting features of Palo Alto's next generation firewalls. This course is the first step to the Palo Alto Networks PCNSA certification. Learning Outcomes: 1.Compare and contrast industry leading firewall platforms, architecture, and defense capability related to zero trust security models and public cloud security. 2.Demonstrate and apply configuration of firewall initial access, interfaces, security zones, virtual routing, filtering, licensing, service routes, software updates, and policy-based forwarding. 3.Analyze security policy administrative concepts related to source and destination network address translation. 4.Outline and construct security policies to identify known and unknown application software running on the service network. 5.Differentiate, configure, and deploy filtering technologies such as anti-virus, anti-spyware, and file blocking, to protect against telemetry induced attack vectors. 6.Configure and deploy Virtual Private Network (VPN). Total class hours - 24.

More Information

More Info

Learning Outcomes

  1. Compare and contrast industry leading firewall platforms, architecture, and defense capabilities.
  2. Demonstrate a basic firewall configuration, initial access, interfaces, security zones, virtual routing, filtering, licensing, service routes, software updates, and policy-based forwarding.
  3. Analyze security policy administrative concepts related to source and destination network address translation.
  4. Outline and construct security policies to identify known and unknown application software running on the service network.
  5. Differentiate, configure, and deploy filtering and file blocking technologies such as anti-virus, anti-spyware, and intrusion detection and intrusion prevention systems.
  6. Configure and deploy Virtual Private Network (VPN).
  7. Compare and contrast industry leading firewall platforms, architecture, and defense capability related to zero trust security models and public cloud security.
  8. Demonstrate a basic firewall configuration, initial access, interfaces, security zones, virtual routing, filtering, licensing, service routes, software updates, and policy-based forwarding.
  9. Analyze security policy administrative concepts related to source and destination network address translation.
  10. Outline and construct security policies to identify known and unknown application software running on the service network.
  11. Differentiate, configure, and deploy filtering technologies such as anti-virus, and anti-spyware to protect against telemetry induced attack vectors.
  12. Configure and deploy Virtual Private Network (VPN).
  13. Compare and contrast industry leading firewall platforms, architecture, and defense capability related to zero trust security models and public cloud security.
  14. Demonstrate and apply configuration of firewall initial access, interfaces, security zones, virtual routing, filtering, licensing, service routes, software updates, and policy-based forwarding.
  15. Analyze security policy administrative concepts related to source and destination network address translation.
  16. Outline and construct security policies to identify known and unknown application software running on the service network.
  17. Differentiate, configure, and deploy filtering technologies such as anti-virus, anti-spyware, and file blocking, to protect against telemetry induced attack vectors.
  18. Configure and deploy Virtual Private Network (VPN).
     

Series Details

Program Code
XFW1
Delivery
Part-Time
Online
Topic Area
Computers, Design, and Media
photo of the front page of the part-time studies guide

Download the Part-time Studies Guide

 

What's included:

  • How to assess if part-time learning is right for you
  • Part-time learning options and the differences between each
  • How to pay for your part-time education
  • Part-time options within your area of interest
  • How to sign up for part-time studies and where to get help

 

Learn how to download