Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
- Overview of the Palo Alto Networks portfolio and architecture
- Understanding firewall architecture
Getting Started
- Configuring initial firewall settings
- Setting up management network configurations
- Activating the firewall
- Managing licenses and software updates
Managing Firewall Configurations
- Handling configuration management
- Viewing and monitoring firewall logs
Managing Firewall Administrator Accounts
- Managing firewall authentication and authorization protocols
- Creating a local firewall administrator account
- Establishing a non-local firewall administrator account
- Setting up a firewall administrator account for non-interactive login
Connecting the Firewall to Production Networks
- Mitigating threats through network segmentation
- Utilizing network interfaces and security zones
- Configuring Layer 3 interfaces and sub-interfaces
- Implementing virtual wire interfaces
- Setting up tap interfaces
- Using virtual routers
- Configuring loopback interfaces
Managing Security Policy Rules
- Creating and managing security policy rules
- Establishing and managing NAT policy rules
- Controlling application usage via app-ID
Blocking Threats
- Neutralizing threats using security and NAT policies
- Defending against packet- and protocol-based attacks
- Blocking threats originating from known malicious sources
- Identifying and blocking threats based on application detection
- Identifying and blocking threats based on user identity
- Identifying and blocking threats based on device identification
- Addressing unknown threats
- Identifying and blocking threats within encrypted traffic
- Preventing the use of stolen credentials
- Blocking threats through security profiles
- Filtering inappropriate web traffic using URL filtering
- Utilizing decryption to identify threats in encrypted traffic
Threat and Traffic Information
- Locating valuable insights using logs and reports
- Forwarding threat and traffic data to external services
Security Best Practices
Summary and Next Steps
Requirements
- Foundational understanding of networking and security concepts
Target Audience
- Security professionals
- Cybersecurity analysts
- System administrators
35 Hours