Get in Touch

Course Outline

Introduction

  • Overview of the Palo Alto Networks portfolio and architecture
  • Firewall architecture fundamentals

Getting Started

  • Configuring initial firewall settings
  • Setting up management network parameters
  • Activating the firewall
  • Managing licenses and software updates

Managing Firewall Configurations

  • Overseeing configuration management
  • Viewing and monitoring firewall logs

Managing Firewall Administrator Accounts

  • Administering firewall authentication and authorization
  • Creating a local firewall administrator account
  • Creating a non-local firewall administrator account
  • Creating a firewall administrator account for non-interactive login

Connecting the Firewall to Production Networks

  • Threat mitigation through network segmentation
  • Utilizing network interfaces and security zones
  • Layer 3 interfaces and sub-interfaces
  • Implementing virtual wire interfaces
  • Deploying tap interfaces
  • Configuring virtual routers
  • Configuring loopback interfaces

Managing Security Policy Rules

  • Creating and managing security policy rules
  • Creating and managing NAT policy rules
  • Controlling application usage via app-ID

Blocking Threats

  • Blocking threats using security and NAT policies
  • Preventing packet- and protocol-based attacks
  • Blocking threats originating from known malicious sources
  • Blocking threats by identifying specific applications
  • Blocking threats by identifying specific users
  • Blocking threats by identifying specific devices
  • Mitigating unknown threats
  • Blocking threats within encrypted traffic
  • Preventing the use of stolen credentials
  • Blocking threats using security profiles
  • Filtering inappropriate web traffic via URL filtering
  • Leveraging decryption to block threats in encrypted traffic

Threat and Traffic Information

  • Extracting valuable insights using logs and reports
  • Forwarding threat and traffic data to external services

Security Best Practices

Summary and Next Steps

Requirements

  • Fundamental understanding of networking and security concepts

Audience

  • Security professionals
  • Cybersecurity analysts
  • System and network administrators
 35 Hours

Related Categories