Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
- Overview of the Palo Alto Networks portfolio and architecture
- Firewall architecture fundamentals
Getting Started
- Configuring initial firewall settings
- Setting up management network parameters
- Activating the firewall
- Managing licenses and software updates
Managing Firewall Configurations
- Overseeing configuration management
- Viewing and monitoring firewall logs
Managing Firewall Administrator Accounts
- Administering firewall authentication and authorization
- Creating a local firewall administrator account
- Creating a non-local firewall administrator account
- Creating a firewall administrator account for non-interactive login
Connecting the Firewall to Production Networks
- Threat mitigation through network segmentation
- Utilizing network interfaces and security zones
- Layer 3 interfaces and sub-interfaces
- Implementing virtual wire interfaces
- Deploying tap interfaces
- Configuring virtual routers
- Configuring loopback interfaces
Managing Security Policy Rules
- Creating and managing security policy rules
- Creating and managing NAT policy rules
- Controlling application usage via app-ID
Blocking Threats
- Blocking threats using security and NAT policies
- Preventing packet- and protocol-based attacks
- Blocking threats originating from known malicious sources
- Blocking threats by identifying specific applications
- Blocking threats by identifying specific users
- Blocking threats by identifying specific devices
- Mitigating unknown threats
- Blocking threats within encrypted traffic
- Preventing the use of stolen credentials
- Blocking threats using security profiles
- Filtering inappropriate web traffic via URL filtering
- Leveraging decryption to block threats in encrypted traffic
Threat and Traffic Information
- Extracting valuable insights using logs and reports
- Forwarding threat and traffic data to external services
Security Best Practices
Summary and Next Steps
Requirements
- Fundamental understanding of networking and security concepts
Audience
- Security professionals
- Cybersecurity analysts
- System and network administrators
35 Hours