Currently Empty: 0.00$
Curriculum
- 30 Sections
- 190 Lessons
- 4 Weeks
Expand all sectionsCollapse all sections
- MODULE 1 : Introduction to Cloud and AWS Services14
- 1.1Introduction to Cloud
- 1.2AWS Cloud Services
- 1.3AWS Global Regions & Availability Zone
- 1.4AWS VPC Network
- 1.5AWS Transit Gateway
- 1.6AWS VPN
- 1.7AWS Direct Connect Gateway
- 1.8AWS Elastic Computers (EC2)
- 1.9AWS Identity and Access Management (IAM)
- 1.10AWS Database Services
- 1.11AWS Storage S3 Buckets
- 1.12Route 53
- 1.13AWS Architecture Framework
- 1.14Create and Setup AWS Account
- MODULE 2 : AWS VPC Networking15
- 2.1Basic Networking
- 2.2AWS VPC Networking Overview
- 2.3AWS Regions and Availability Zone
- 2.4VPC CIDR Block
- 2.5Subnet , Route Table and Internet Gateway
- 2.6AWS Security Groups
- 2.7Network ACL
- 2.8NAT Gateway
- 2.9VPC Endpoint
- 2.10VPC Peering
- 2.11IP Address IPv4 & IPv6
- 2.12Network Interface
- 2.13VPC Flow Logs
- 2.14Share VPC Resource
- 2.15Understanding of Ingress, Egress, North South and South North Traffic.
- MODULE 3 : Hands on LAB – AWS VPC Networking9
- 3.1Design a AWS VPC Network Diagram
- 3.2Deploy a VPC Network and egress traffic using internet gateway
- 3.3Provision EC2, Security Groups, NACL and apply into existing AWS Resources
- 3.4Deploy two VPC Network and establish a connection through VPC Peering – Within same AWS Account in same regions
- 3.5Deploy two VPC Network and establish a connection through VPC Peering – Within different AWS Account in different regions.
- 3.6Deploy NAT Gateway
- 3.7Deploy a web service on public subnet
- 3.8Deploy VPC Endpoint to connect S3 bucket
- 3.9Share AWS Resources to another account
- MODULE 4 : Multi Account Landing Zone and AWS Transit Gateway6
- MODULE 5 : Hands on LAB - AWS Transit Gateway10
- 5.1Design Multi Account Landing Zone Architecture
- 5.2Deploy two VPC in US-EAST Region
- 5.3Deploy Transit Gateway in US-EAST Region
- 5.4Create Transit Gateway Attachment, Transit Gateway Routing and establish the two VPC connections through Transit Gateway US-EAST Region.
- 5.5Deploy two VPC in EUROPE Region
- 5.6Deploy Transit Gateway in EUROPE Region
- 5.7Create Transit Gateway Attachment, Transit Gateway Routing and establish the two VPC connections through Transit Gateway EUROPE.
- 5.8Deploy Transit Gateway Peering between two region
- 5.9Deploy Transit Gateway Network Manager
- 5.10Troubleshooting and validation of connectivity using Network Manager
- MODULE 6 : Hybrid Connectivity12
- 6.1Introduction of AWS Direct Connect Gateway
- 6.2Understanding of Connection
- 6.3Understanding of Virtual Interfaces(VIFs) – Public VIF, Private VIF, Transit VIF
- 6.4Gateway Association – VPCs and Transit Gateway
- 6.5Direct Connect with Transit Gateway
- 6.6Failover and High Availability (HA) best practices
- 6.7Security and Compliance Consideration
- 6.8Introduction of AWS Site-2-Site-VPN
- 6.9Benefits of AWS Site-2-Site VPN
- 6.10Use Cases of AWS Site-2-Site VPN
- 6.11Introduction of AWS Cloud WAN
- 6.12Use Cases of AWS Cloud WAN
- MODULE 7 : Hands on LAB - Hybrid Connectivity6
- 7.1Design the VPC Architecture using Direct Connect Gateway
- 7.2Configure Direct Connect Gateway and associated with VPC
- 7.3Configure Direct Connect Gateway and associated with Transit Gateway
- 7.4Design the VPC Architecture using AWS Site-2-Site VPN
- 7.5Configure AWS Site-2-Site VPN
- 7.6Monitoring Direct connect Gateway and site-2-site VPN using CloudWatch
- MODULE 8 : AWS Elastic Load Balancer13
- 8.1Introduction to AWS Elastic Load Balancer (ELB)
- 8.2Benefits of Load Balancer
- 8.3Type of Load Balancer
- 8.4Application Load Balancer
- 8.5Network Load Balancer
- 8.6Classic Load Balancer
- 8.7Gateway Load Balancer
- 8.8Cross regions load Balancing
- 8.9Listener and Target Groups
- 8.10Path-based Routing
- 8.11TLS Termination
- 8.12Understanding of Dual Stack IP Address
- 8.13Understanding of Sticky Sessions
- MODULE 9 : Hands on LAB - AWS Elastic Load Balancer3
- 9.1Design a High Availability Architecture using AWS Load Balancer for Internal and External Services
- 9.2Deploy a web application behind an Application Load Balancer (ALB) to distribute traffic between two EC2 instances in different Availability Zones.
- 9.3Deploy a web application behind an Network Load Balancer (NLB) to distribute traffic between two EC2 instances in different Availability Zones.
- MODULE 10 : AWS Route535
- MODULE 11 : Hands on LAB- AWS Route534
- MODULE 12 : AWS Cloud Security and Compliance6
- MODULE 13 : Hands on LAB- AWS Cloud Security and Compliance6
- MODULE 14 : Infrastructure as Code (IaC) using Terraform4
- MODULE 15 : Hands on LAB using Terraform7
- 15.1Deploy AWS VPC Network using Terraform
- 15.2Provision EC2 Instance using Terraform
- 15.3Deploy two VPC networks and establish VPC Peering Connection using Terraform
- 15.4Deploy AWS Transit Gateway using Terraform
- 15.5Deploy multiple VPC and establish connections through Transit Gateway using Terraform
- 15.6Deploy a web application behind Application Load Balancer using Terraform
- 15.7Create AWS Security Groups using Terraform
- MODULE 16 : Projects5
- Palo Alto Network and Security Job Oriented BootcampLearn Palo Alto Network Security Defend On-Premises and Cloud Environments Against Modern Cybersecurity Threats.0
- Module 1 : Introduction to Network Security and Palo Alto Networks6
- Module 2 : Deploy Palo Alto Firewall in the Cloud Environment1
- Module 3 : Initial Configuration and Management5
- Module 4: Palo Alto Networks core features: App-ID, User-ID, Content-ID, Threat Prevention, and Dynamic Updates.6
- 21.1Key Concept of App-ID (Application Identification) and Layer 7 application
- 21.2Compare of Layer 4 and Layer 7 firewall rules and Custom APP-ID
- 21.3Overview of User-ID (User Identification)
- 21.4Content-ID (Content Inspection)
- 21.5Threat Prevention
- 21.6Overview of Dynamic Updates and Schedule Dynamic Updates
- Module 5 : Implementing Security Policy5
- 22.1Understanding Security Policy Rule Structure and Processing
- 22.2Configuring Firewall Rules: Source, Destination, Application, Service, Action
- 22.3Implementing NAT (Network Address Translation): Source NAT, Destination NAT
- 22.4Understanding and SSL/TLS Inspection and Implementing Decryption Policy
- 22.5Troubleshooting Security Policy Issues
- Module 6 : Implementing Security Profiles7
- 23.1Introduction to Security Profile Groups (SPg)
- 23.2Application Control: Visibility and Enforcement
- 23.3URL Filtering: Managing Web Access and Security
- 23.4Anti-Virus and Anti-Spyware: Protecting Against Malware
- 23.5Vulnerability Protection: Preventing Exploits
- 23.6File Blocking and Data Filtering
- 23.7WildFire Analysis: Understanding and Mitigating Advanced Threats
- Module 7 : Implementing Zone Protection Profile5
- 24.1Introduction to Zone Protection Profiles
- 24.2Configuring Flood Protection: SYN Flood, UDP Flood , ICMP Flood
- 24.3Configuring Reconnaissance Protection : TCP Port Scan, Host Sweep, UDP Port Scan, IP Protocol.
- 24.4Configuring Packet-Based Protection: IP Drop, TCP Drop, ICMP Drop and IP Option Drop
- 24.5Applying Zone Protection Profiles to Security Zones
- Module 8 : Denial-of-Service (DoS) Protection in Palo Alto Networks6
- Module 9 : VPN Configuration and Management4
- Module 10: Policy Optimization3
- Module 11 : Monitoring, Logging, and Reporting5
- Module 12 : Panorama – Centralized Network Security Management8
- 29.1Introduction to Panorama
- 29.2Panorama Architecture and Modes
- 29.3Deploy Panorama VM Series in AWS/Azure/GCP Cloud Environment
- 29.4Device Groups and Template management
- 29.5Device Registration into Panorama
- 29.6Objects and Configuration Management
- 29.7Policy Management with Panorama
- 29.8Logging, Monitoring and Reporting
- Ready for Job Search4

