Hello and welcome to the video lecture course. PF sense configuring firewall zones.
My name is Mario Bardwell, and I will be your instructor doing this course
now. Firewalls will always be synonymous or closely associated with information security.
We probably see the far wall like we see baseball and Babe Ruth
or boxing and Mohammed Ali basketball and Michael Jordan or, I don't know, traveling to the Moon and Neil Armstrong. You see the firewalls impact on the information security industry cannot be disputed,
just like these athletes in their respective sports
or one of the greatest astronauts and our understanding of outer space.
But maybe, as we continue to evolve in information security, we see the firewall, as some of us see airplanes and the Wright brothers
or vaguely remembering its importance,
but at the same time recognizing that they are launching pads to bigger and more innovative ideas
that happened many moons ago.
You know, the Wright brothers, Orville and Wilbur, for aviation pioneers that invented and successfully flew the first airplane back in the early 19 hundreds.
Now the word firewall doesn't belong to the physical. Applying to the virtual machine housed in your organization's data center. But to an invention dating back to the mid 18 hundreds,
that meant a physical wall
there to prevent the spread of fire in a structure.
And so, just like the first airplane has changed so much, so has the firewall.
But it is our ability to understand the basic purpose of these great inventions that has allowed for so much change, progress and success.
Now, like the coin word is defined as a physical
well meant to protect against fire in a structure.
The first network firewalls were logical walls
erected to protect private networks from external networks like the Internet, which we all know can be dangerous to an organization
and so the Internet can be viewed as fire.
So let me get down from my soapbox, and I'll actually to stay tuned as we learn together the importance for security minded folks to understand the firewall and how it's evolved to make our jobs easier
a little bit about my background.
I have the privilege toe work in information technology, and I've done so for about 10 years in various roles and industries stretching from law all the way to construction.
Currently, I'm information security engineer responsible for securing road access. Managing endpoints included network and Web application vulnerabilities,
next generation anti virus products in their operations, email, security policies and assistant and internal investigations.
I hold a masters degree in cyber security and information assurance
and also an undergraduate degree and network Indications and management.
I hold various certifications such as the C I S S P
S S C p C H, Thanks, Pleiss on a few more doing my 10 years
in the information technology space that are mostly geared towards information security.
I'm also the instructor of the cyber Recourse Zero trust networks The fundamentals
I encourage you to watch and listen to that lecture series
right after you've completed this lecture series.
So what's this course about?
So this course is designed to introduce you
or to re introduce you to a fireable and its purpose on a computer interconnected network.
In this course, I will talk about the history of the firewall.
I will also talk about the host based firewalls in the network based firewalls,
the configuring of zones and how a fire walk and segment zones based on the assets identified labeled and the placement
to ensure the right controls are around these assets and that will be introduced in the form of a lab. We'll configure a couple of zones and demonstrate what a firewall can do to allow or deny certain traffic
well, then go a little bit deeper into defining what firewall zones are and how they are used in most organizations today.
Besides whole space and never base Pharrell's will also take a look at packet filtering state ful and application level firewalls.
Booby protocols that are critical to the understanding of how best to use a firewall to protect the network from the Internet and also protect certain assets from other internal
Now, my target audience for this course, our network administrator, security analyst, engineers and managers. And
I think we all can benefit from understand in the firewall from a security perspective
and a business enablement perspective as well. So really,
this is a broad audience. This is for a lot of different folks in a lot of different roles. People that are gonna be decision makers at a high level as well as people are gonna be working one on one with customers, firewalls gonna impact to you
one way or the other.
Now what you should know. It's important that he was the viewer and listener off. This lecture series has a basic understanding of firewalls. You don't need to know much, but you should know what a firewall is, and and I could kind of take it from there.
You should also have some level of understanding of traditional network security architecture. Right. You know, hopefully you heard
about a d m Z or win or Lane or trusted or untrusted networks before And that will it'll, you know, help you understand where I'm taking this course,
to just understand different protocols, right? We're gonna go in and really take a look at the different protocols that we would either allow or block in an organization. So be aware of that. And
if you're familiar with things like Ping or the Internet control message protocol, those fundamental concepts we're gonna really allow you to,
you know, have no problem whatsoever. You know, during the duration of this course
and the learning objectives for this course, our understanding of the firewalls purpose is gonna be
you know Paramount. Also, the difference between the different generational firewalls, the creation and purpose of firewalls, owns and lastly again, common protocols imports we need to be familiar with when getting started on the topic of a firewall
and configure in one in a lab or a production environment.
so let's recap really quick about this short introduction here. I've introduced myself. I've provided my background in the area of security,
and the topic of P F Sense configure and Firewalls owns was introduced to you.
I explained to us the viewer and or listener who might target audience will be and share the learning objectives for the course.
Those learning objectives are understanding the difference between a packet filter state full and application fire will understand and how to configure PF since viral zones in a lab environment
and understanding some of the common protocols and their port numbers as they relate to firewalls.
Thanks for your time and stay tuned