Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
- Overview of the Palo Alto Networks portfolio and architecture.
- Firewall architecture.
Getting Started
- Configuring initial firewall settings.
- Configuring management network settings.
- Activating a firewall.
- Managing licenses and software.
Managing Firewall Configurations
- Managing configurations.
- Viewing and monitoring firewall logs.
Managing Firewall Administrator Accounts
- Managing firewall authentication and authorization.
- Creating a local firewall administrator account.
- Creating a non-local firewall administrator account.
- Creating a firewall administrator account for non-interactive login.
Connecting the Firewall to Production Networks
- Blocking threats through network segmentation.
- Using network interfaces and security zones.
- Layer 3 interfaces and sub-interfaces.
- Using virtual wire interfaces.
- Tap interfaces.
- Using virtual routers.
- Loopback interfaces.
Managing Security Policy Rules
- Creating and managing security policy rules.
- Creating and managing NAT policy rules.
- Controlling application usage using app-ID.
Blocking Threats
- Blocking threats using security and NAT policies.
- Blocking packet- and protocol-based attacks.
- Blocking threats from known bad sources.
- Blocking threats by identifying applications.
- Blocking threats by identifying users.
- Blocking threats by identifying devices.
- Blocking unknown threats.
- Blocking threats in encrypted traffic.
- Preventing the usage of stolen credentials.
- Blocking threats using security profiles.
- Blocking inappropriate web traffic with URL filtering.
- Using decryption to block threats in encrypted traffic.
Threat and Traffic Information
- Locating valuable information using logs and reports.
- Forwarding threat and traffic information to external services.
Security Best Practices
Summary and Next Steps
Requirements
- Fundamental knowledge of networking and security concepts.
Audience
- Security professionals.
- Cybersecurity analysts.
- Administrators.
35 Hours