View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

ssl

SEC0317 - PAN 9.0 File Type Filtering

The video looks into file type filtering capability on Palo Alto Firewall. We will demonstrate a quick way to enforce file type filtering by leveraging a default strict file profile. Customized file profile will be configured followed by file type exemption to help you further apply more granular control to meet your security policy.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0315 - PAN 9.0 SSL Decryption (Part 3)

The video looks at various aspects around traffic decryption on Palo Alto Firewall. We will be focusing on two commonly-used SSL decryption features namely SSL Forward Proxy and SSL Inbound Inspection to inspect user outbound internet, and inbound to our public-facing server. We will look at a way to prevent FW evasion with SSH tunneling using SSH Proxy. The lab finishes with a discussion around QUIC protocol.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0315 - PAN 9.0 SSL Decryption (Part 2)

The video looks at various aspects around traffic decryption on Palo Alto Firewall. We will be focusing on two commonly-used SSL decryption features namely SSL Forward Proxy and SSL Inbound Inspection to inspect user outbound internet, and inbound to our public-facing server. We will look at a way to prevent FW evasion with SSH tunneling using SSH Proxy. The lab finishes with a discussion around QUIC protocol.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0315 - PAN 9.0 SSL Decryption (Part 1)

The video looks at various aspects around traffic decryption on Palo Alto Firewall. We will be focusing on two commonly-used SSL decryption features namely SSL Forward Proxy and SSL Inbound Inspection to inspect user outbound internet, and inbound to our public-facing server. We will look at a way to prevent FW evasion with SSH tunneling using SSH Proxy. The lab finishes with a discussion around QUIC protocol.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0229 - ASA Firepower 6.0 Certificate-Based Access Control (Part 2)

The video looks at additional features on Cisco Firepower 6.0 SSL policy that can be used to implement access control. We will explore various way to perform traffic matching based on certificate attributed including self-signed certificate, expired certificate, certificate common name, and allowed cipher suites. We will also validate our configuration with some testing.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0229 - ASA Firepower 6.0 Certificate-Based Access Control (Part 1)

The video looks at additional features on Cisco Firepower 6.0 SSL policy that can be used to implement access control. We will explore various way to perform traffic matching based on certificate attributed including self-signed certificate, expired certificate, certificate common name, and allowed cipher suites. We will also validate our configuration with some testing.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0
Subscribe to RSS - ssl