Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
- Overview of the Palo Alto Networks portfolio and architecture.
- Understanding firewall architecture.
Getting Started
- Configuring initial firewall settings.
- Setting up management network configurations.
- Activating the firewall.
- Managing licenses and software.
Managing Firewall Configurations
- Handling configuration management.
- Viewing and monitoring firewall logs.
Managing Firewall Administrator Accounts
- Overseeing firewall authentication and authorization.
- Creating local firewall administrator accounts.
- Creating non-local firewall administrator accounts.
- Setting up firewall administrator accounts for non-interactive login.
Connecting the Firewall to Production Networks
- Threat mitigation via network segmentation.
- Utilizing network interfaces and security zones.
- Configuring Layer 3 interfaces and sub-interfaces.
- Employing virtual wire interfaces.
- Configuring tap interfaces.
- Utilizing virtual routers.
- Configuring loopback interfaces.
Managing Security Policy Rules
- Creating and managing security policy rules.
- Creating and managing NAT policy rules.
- Controlling application usage through app-ID.
Blocking Threats
- Threat blocking using security and NAT policies.
- Preventing packet- and protocol-based attacks.
- Blocking threats from known malicious sources.
- Threat mitigation via application identification.
- Threat mitigation via user identification.
- Threat mitigation via device identification.
- Handling unknown threats.
- Blocking threats within encrypted traffic.
- Preventing the use of stolen credentials.
- Threat blocking via security profiles.
- Filtering inappropriate web traffic using URL filtering.
- Utilizing decryption to identify and block threats in encrypted traffic.
Threat and Traffic Information
- Leveraging logs and reports to locate critical information.
- Forwarding threat and traffic data to external services.
Security Best Practices
Summary and Next Steps
Requirements
- Fundamental knowledge of networking and security concepts.
Target Audience
- Security professionals.
- Cybersecurity analysts.
- System administrators.
35 Hours