- Audits
- INSPECT
- Logs and Log Review
- Port Scan
| - Authentication
- Client Authentication
- General Knowledge
- Session Authentication
- User Authentication
|
- Core Concepts
- Basic Knowledge
- Commands
- Configuration
- System Requirements
| - FW-1 Installation/Architecture
- Architecture
- Installation
- Modules
|
- FW-1 Management
- Encryption
- Network Objects
- Resources
- Services
| - High Availability
- Implementing
- Planning and Architecture
- State Syncronization
|
- Network Address Translation
- Hide Mode Translation
- Implementation
- Static Mode Translation
| - Performance Tuning
- Memory and CPU
- Performance Monitoring
- Rule Optimization
|
- Security Policy/Rule Base
- Configuration
- Implicit Rules
- Rule Base
| |