Firewall Setup and Configuration Lab
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:00
Hey, everyone, welcome back to the course. So in the last video, we took a look at how control number 11 mapped up to the next cybersecurity framework.
00:09
In this video, we're just gonna talk briefly about the lab. So I want to stress that with this lab and the remaining two in this course, we do not have a step by step walk through video. But we do have a step by step guide for you to follow to go through the lab on your own. The reason we did this is to make sure that you get some hands on practice without the's step by step guidance
00:28
of an instructor
00:31
so you can find this step by step guide and the others inside of the resource is section of this course would be sure to download those, and they were literally walking through step by step of this lab.
00:42
This particular lab is going to be related to setting up a firewall, setting a different configurations and then testing that the configuration change we've made the rule change that we've made will actually block the traffic. That is supposed to
00:57
one thing to keep in mind with these labs is you always want to make sure to mark your progress, so you'll notice there's a task bar percentage down here at the bottom, right. If we select the next button there, you'll see that we have check boxes. And as we mark those check boxes, it will go ahead and mark thes particular task as complete.
01:15
So be sure to do that as you're going through this lab.
01:19
That way, you can get full credit for the lab once complete.
01:23
So again with this particular lab, you'll want to make sure you download this step by step guide again. This is found in the resource is section of the course, and in this particular lab you'll be give figuring a PF sense firewall, making a rule change specifically to block ICMP traffic. And then you perform a ping to see if it was actually successful or not.
01:42
In the next module, we're gonna talk about control number 12 which is boundary defense
Up Next
Instructed By
Similar Content