Firewall Configuration with pfSense
*(ISC)² Members/Associates can access this course for free by logging in above and clicking the 'My Courses' menu item.
Firewalls provide an essential line of defense against network attacks and are an indispensable tool. pfSense, a widely used, free, and open-source firewall software, can be installed on any physical or virtual machine for use as a firewall on a network. In this lab, cybersecurity professionals or anyone new to firewalls learn how to harden, secure, configure, and operate a firewall using pfSense. Learners in this lab will create and apply firewall rules and discover how to leverage pfSense aliases to simplify a rule set. Finally, learners will view statistics and logs collected to monitor, report, and resolve security problems.
This course includes the following modules: 1) Manage Network Access Times 2) Restrict Access to Firewall 3) Secure SSH Access to Firewall 4) Test the Firewall 5) Firewall Features
Audience or Who Should Take This Course
Security practitioners or anyone hoping to learn more about firewall configuration and operation using the open-source firewall software, pfSense.
Familiarity using the Unix/Linux command line and a working understanding of networking and filtering concepts (TCP/IP, DNS, etc.).
How This Course Works
Lab content within this course takes place within a Linux virtual machine environment. Learners are introduced to each section of the lab and will have the ability to work through the entire lab at their own pace. Included within each section is a video walkthrough for additional support. Learners will have seven days to work through the lab before progress resets.
Throughout this course learners will be asked to work through and complete the following activities:
- Review of foundation information needed to succeed in the lab.
- Video walkthrough for additional support. (optional)
- 5 lab task using pfSense in regard to basic administration and understanding the functions common among firewalls. These tasks include the following:
- Securely accessing and administering a firewall
- Creating a basic firewall ruleset
- Hardening and restricting access to a firewall
- Using aliases to simplify rule creation
- Reviewing and assessing traffic logs and statistics
- Knowledge Checks
- Final Assessment
- Course Evaluation
Members must self-report CPEs earned through the (ISC)² CPE portal. At the end of the course instructions will be provided for downloading the certificate. It is important to retain the certificate of completion as proof of credits earned. CPEs earned for this course may be eligible for continuing professional education credits for non-(ISC)² certifications. Please visit the continuing education requirements established by the credentialing organization for eligibility.