Get in Touch

Course Outline

Introduction

  • Overview of the Palo Alto Networks portfolio and architecture.
  • Understanding firewall architecture.

Getting Started

  • Configuring initial firewall settings.
  • Setting up management network configurations.
  • Activating the firewall.
  • Managing licenses and software.

Managing Firewall Configurations

  • Handling configuration management.
  • Viewing and monitoring firewall logs.

Managing Firewall Administrator Accounts

  • Overseeing firewall authentication and authorization.
  • Creating local firewall administrator accounts.
  • Creating non-local firewall administrator accounts.
  • Setting up firewall administrator accounts for non-interactive login.

Connecting the Firewall to Production Networks

  • Threat mitigation via network segmentation.
  • Utilizing network interfaces and security zones.
  • Configuring Layer 3 interfaces and sub-interfaces.
  • Employing virtual wire interfaces.
  • Configuring tap interfaces.
  • Utilizing virtual routers.
  • Configuring loopback interfaces.

Managing Security Policy Rules

  • Creating and managing security policy rules.
  • Creating and managing NAT policy rules.
  • Controlling application usage through app-ID.

Blocking Threats

  • Threat blocking using security and NAT policies.
  • Preventing packet- and protocol-based attacks.
  • Blocking threats from known malicious sources.
  • Threat mitigation via application identification.
  • Threat mitigation via user identification.
  • Threat mitigation via device identification.
  • Handling unknown threats.
  • Blocking threats within encrypted traffic.
  • Preventing the use of stolen credentials.
  • Threat blocking via security profiles.
  • Filtering inappropriate web traffic using URL filtering.
  • Utilizing decryption to identify and block threats in encrypted traffic.

Threat and Traffic Information

  • Leveraging logs and reports to locate critical information.
  • Forwarding threat and traffic data to external services.

Security Best Practices

Summary and Next Steps

Requirements

  • Fundamental knowledge of networking and security concepts.

Target Audience

  • Security professionals.
  • Cybersecurity analysts.
  • System administrators.
 35 Hours

Number of participants


Price per participant

Upcoming Courses

Related Categories