Get in Touch

Course Outline

Introduction

  • Overview of the Palo Alto Networks portfolio and architecture
  • Understanding firewall architecture

Getting Started

  • Configuring initial firewall settings
  • Setting up management network configurations
  • Activating the firewall
  • Managing licenses and software updates

Managing Firewall Configurations

  • Handling configuration management
  • Viewing and monitoring firewall logs

Managing Firewall Administrator Accounts

  • Managing firewall authentication and authorization protocols
  • Creating a local firewall administrator account
  • Establishing a non-local firewall administrator account
  • Setting up a firewall administrator account for non-interactive login

Connecting the Firewall to Production Networks

  • Mitigating threats through network segmentation
  • Utilizing network interfaces and security zones
  • Configuring Layer 3 interfaces and sub-interfaces
  • Implementing virtual wire interfaces
  • Setting up tap interfaces
  • Using virtual routers
  • Configuring loopback interfaces

Managing Security Policy Rules

  • Creating and managing security policy rules
  • Establishing and managing NAT policy rules
  • Controlling application usage via app-ID

Blocking Threats

  • Neutralizing threats using security and NAT policies
  • Defending against packet- and protocol-based attacks
  • Blocking threats originating from known malicious sources
  • Identifying and blocking threats based on application detection
  • Identifying and blocking threats based on user identity
  • Identifying and blocking threats based on device identification
  • Addressing unknown threats
  • Identifying and blocking threats within encrypted traffic
  • Preventing the use of stolen credentials
  • Blocking threats through security profiles
  • Filtering inappropriate web traffic using URL filtering
  • Utilizing decryption to identify threats in encrypted traffic

Threat and Traffic Information

  • Locating valuable insights using logs and reports
  • Forwarding threat and traffic data to external services

Security Best Practices

Summary and Next Steps

Requirements

  • Foundational understanding of networking and security concepts

Target Audience

  • Security professionals
  • Cybersecurity analysts
  • System administrators
 35 Hours

Number of participants


Price per participant

Upcoming Courses

Related Categories