Time
1 hour 18 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:00
Hello and welcome to the video lecture course. PF sense configuring firewall zones.
00:07
My name is Mario Bardwell, and I will be your instructor doing this course
00:13
now. Firewalls will always be synonymous or closely associated with information security.
00:19
We probably see the far wall like we see baseball and Babe Ruth
00:24
or boxing and Mohammed Ali basketball and Michael Jordan or, I don't know, traveling to the Moon and Neil Armstrong. You see the firewalls impact on the information security industry cannot be disputed,
00:40
just like these athletes in their respective sports
00:44
or one of the greatest astronauts and our understanding of outer space.
00:50
But maybe, as we continue to evolve in information security, we see the firewall, as some of us see airplanes and the Wright brothers
00:59
a little for gotten
01:00
or vaguely remembering its importance,
01:03
but at the same time recognizing that they are launching pads to bigger and more innovative ideas
01:11
that happened many moons ago.
01:14
You know, the Wright brothers, Orville and Wilbur, for aviation pioneers that invented and successfully flew the first airplane back in the early 19 hundreds.
01:25
Now the word firewall doesn't belong to the physical. Applying to the virtual machine housed in your organization's data center. But to an invention dating back to the mid 18 hundreds,
01:37
that meant a physical wall
01:40
there to prevent the spread of fire in a structure.
01:45
And so, just like the first airplane has changed so much, so has the firewall.
01:51
But it is our ability to understand the basic purpose of these great inventions that has allowed for so much change, progress and success.
02:00
Now, like the coin word is defined as a physical
02:06
well meant to protect against fire in a structure.
02:09
The first network firewalls were logical walls
02:14
erected to protect private networks from external networks like the Internet, which we all know can be dangerous to an organization
02:23
or are hanging
02:24
and so the Internet can be viewed as fire.
02:28
So let me get down from my soapbox, and I'll actually to stay tuned as we learn together the importance for security minded folks to understand the firewall and how it's evolved to make our jobs easier
02:46
a little bit about my background.
02:49
I have the privilege toe work in information technology, and I've done so for about 10 years in various roles and industries stretching from law all the way to construction.
03:00
Currently, I'm information security engineer responsible for securing road access. Managing endpoints included network and Web application vulnerabilities,
03:13
next generation anti virus products in their operations, email, security policies and assistant and internal investigations.
03:21
I hold a masters degree in cyber security and information assurance
03:25
and also an undergraduate degree and network Indications and management.
03:30
I hold various certifications such as the C I S S P
03:35
S S C p C H, Thanks, Pleiss on a few more doing my 10 years
03:39
in the information technology space that are mostly geared towards information security.
03:46
I'm also the instructor of the cyber Recourse Zero trust networks The fundamentals
03:53
I encourage you to watch and listen to that lecture series
03:57
right after you've completed this lecture series.
04:01
So what's this course about?
04:03
So this course is designed to introduce you
04:06
or to re introduce you to a fireable and its purpose on a computer interconnected network.
04:15
In this course, I will talk about the history of the firewall.
04:18
I will also talk about the host based firewalls in the network based firewalls,
04:26
the configuring of zones and how a fire walk and segment zones based on the assets identified labeled and the placement
04:35
to ensure the right controls are around these assets and that will be introduced in the form of a lab. We'll configure a couple of zones and demonstrate what a firewall can do to allow or deny certain traffic
04:49
well, then go a little bit deeper into defining what firewall zones are and how they are used in most organizations today.
04:59
Besides whole space and never base Pharrell's will also take a look at packet filtering state ful and application level firewalls.
05:09
Another topic.
05:10
Booby protocols that are critical to the understanding of how best to use a firewall to protect the network from the Internet and also protect certain assets from other internal
05:24
some networks.
05:26
Now, my target audience for this course, our network administrator, security analyst, engineers and managers. And
05:34
I think we all can benefit from understand in the firewall from a security perspective
05:41
and a business enablement perspective as well. So really,
05:45
this is a broad audience. This is for a lot of different folks in a lot of different roles. People that are gonna be decision makers at a high level as well as people are gonna be working one on one with customers, firewalls gonna impact to you
05:59
one way or the other.
06:00
Now what you should know. It's important that he was the viewer and listener off. This lecture series has a basic understanding of firewalls. You don't need to know much, but you should know what a firewall is, and and I could kind of take it from there.
06:15
You should also have some level of understanding of traditional network security architecture. Right. You know, hopefully you heard
06:23
about a d m Z or win or Lane or trusted or untrusted networks before And that will it'll, you know, help you understand where I'm taking this course,
06:33
it's important to
06:36
to just understand different protocols, right? We're gonna go in and really take a look at the different protocols that we would either allow or block in an organization. So be aware of that. And
06:49
if you're familiar with things like Ping or the Internet control message protocol, those fundamental concepts we're gonna really allow you to,
07:01
you know, have no problem whatsoever. You know, during the duration of this course
07:10
and the learning objectives for this course, our understanding of the firewalls purpose is gonna be
07:16
you know Paramount. Also, the difference between the different generational firewalls, the creation and purpose of firewalls, owns and lastly again, common protocols imports we need to be familiar with when getting started on the topic of a firewall
07:33
and configure in one in a lab or a production environment.
07:38
Okay,
07:40
so let's recap really quick about this short introduction here. I've introduced myself. I've provided my background in the area of security,
07:50
and the topic of P F Sense configure and Firewalls owns was introduced to you.
07:56
I explained to us the viewer and or listener who might target audience will be and share the learning objectives for the course.
08:05
Those learning objectives are understanding the difference between a packet filter state full and application fire will understand and how to configure PF since viral zones in a lab environment
08:18
and understanding some of the common protocols and their port numbers as they relate to firewalls.
08:24
Thanks for your time and stay tuned

Up Next

pfSense: Installing and Configuring the Firewall

In this pfSense Firewall training course, students will learn how a firewall functions on a network or host. The course provides details about the different types of firewalls, as well as providing a hands-on lab experience configuring separate zones.

Instructed By

Instructor Profile Image
Mario Bardowell
Instructor