Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
Revisiting IPv6 Security
- Key security challenges in IPv6
- Native security capabilities of IPv6
- Common IPv6 attack vectors
Threats to IPv6 CPE and Mitigation Strategies
- Customer Premise Equipment (CPE)
- Universal Threat Mitigation (UTM)
- Classification of threats and corresponding mitigation techniques
- IPv6 Intrusion Protection System (IPS)
- Guidelines for security policy formulation
- Security considerations for Mobile IPv6
Firewall Configuration Policies for IPv6
- Host-based Firewalls configurations
- Gateway Firewalls configurations
- Separation of firewall policies
- Policy consolidation
- Handling inbound ICMPv6 traffic
- Managing inbound TCP services for the firewall
- Managing inbound TCP services for all devices, including the firewall
- Handling inbound UDP services for the firewall
- Foundations of firewall management using IPtables
- Default behavior of policy chains
- Connection-specific responses
- Understanding connection states
Implementing IPv6 Rules and Policies via IPtables
Practical Lab Session
- Illustration of Man-in-the-Middle attacks
- Setup and validation of an IPv6 firewall
Summary and Future Directions
Requirements
- Holding a CSE6 Silver certification or an equivalent credential
- A solid understanding of foundational network security principles
- Familiarity with IPv4 security mechanisms
Target Audience
- Security professionals, IT budget decision-makers, Network and Security Architects, IT administrators, and Network/IT support specialists
28 Hours
Testimonials (2)
communication, knowledge from experience, solve problems,
Marcin Walewski - Intel Technology Poland Sp. z o.o.
Course - OpenStack Bootcamp
The virtual desktop in a browser feature was kind of neat.