Currently Empty: 0.00$
Curriculum
- 72 Sections
- 80 Lessons
- 32 Weeks
Expand all sectionsCollapse all sections
- AWS Cloud Network and Security Job Oriented BootcampLearn AWS Cloud Network and Security with hands-on training in AWS Networking, Cloud Security, Network Security and Palo Alto firewalls and Cybersecurity in the Cloud Space.0
- MODULE 1 : Introduction to Cloud and AWS Services0
- MODULE 2 : AWS VPC Networking0
- MODULE 3 : Hands on LAB – AWS VPC Networking0
- MODULE 4 : Multi Account Landing Zone and AWS Transit Gateway0
- MODULE 5 : Hands on LAB - AWS Transit Gateway0
- MODULE 6 : Hybrid Connectivity0
- MODULE 7 : Hands on LAB - Hybrid Connectivity0
- MODULE 8 : AWS Elastic Load Balancer0
- MODULE 9 : Hands on LAB - AWS ELASTIC LOAD BALANCER0
- MODULE 10 : AWS Route530
- MODULE 11 : Hands on LAB- AWS Route530
- MODULE 12 : AWS Cloud Security and Compliance0
- MODULE 13 : Hands on LAB- AWS Cloud Security and Compliance0
- MODULE 14 : Infrastructure as Code (IaC) using Terraform0
- MODULE 15 : Hands on LAB using Terraform0
- MODULE 16 : Projects5
- Azure Cloud Network and Security Job Oriented BootcampLearn Azure Cloud Network and Security with hands-on training in Azure Networking, Cloud Security, Network Security, Palo Alto Firewalls and Cybersecurity in the Cloud Space.0
- MODULE 1 : Introduction to Cloud and Azure Services0
- MODULE 2 : Azure Virtual Networks0
- MODULE 3 : Hands on LAB – Azure Virtual Networks0
- MODULE 4 : Design Azure Hybrid Networking0
- MODULE 5 : Hands on LAB - Azure Hybrid Networking0
- MODULE 6: Azure Load Balancer0
- MODULE 7 : Hands on LAB Azure Load Balancer0
- MODULE 8 : Design and Implement Network Security0
- MODULE 9 : Hands on LAB- Network security0
- MODULE 10 : Azure Private Access0
- MODULE 11 : Hands on LAB- Azure Private Access0
- MODULE 12: Design and implement network monitoring0
- MODULE 13 : Azure DNS0
- MODULE 14: Design and Implementation of Azure HUB and Spoke Model Architecture0
- MODULE 15 : Design and Implementation of Azure Virtual WAN Architecture0
- MODULE 16 : Infrastructure as Code (IaC) using Terraform0
- MODULE 17 : Hands on LAB using Terraform0
- MODULE 18 : Projects5
- Google Cloud Network and Security Job Oriented BootcampLearn Google Cloud Network and Security with hands-on training in GCP Networking, Cloud Security, Network Security, Palo Alto Firewalls and Cybersecurity in the Cloud Space.0
- MODULE 1 : Introduction to Cloud and GCP Services0
- MODULE 2 : Basic Networking0
- MODULE 3: GCP VPC Networking0
- MODULE 4: Hands on LAB – GCP VPC Networking0
- MODULE 5 : GCP VPC Peering0
- MODULE 6 : Centralized Shared VPC0
- MODULE 7 : Centralized Shared VPC0
- MODULE 8 : Hands on LAB GCP VPC-Zones-Regions wise Network Communication0
- MODULE 9 : Cloud NAT0
- MODULE 10 : VPC Firewall0
- MODULE 11 : GCP Private Access0
- MODULE 12 : Cloud IAP0
- MODULE 13 : Cloud Interconnect0
- MODULE 14 : Cloud VPN0
- MODULE 15 : Cloud Load Balancer0
- MODULE 16 : Cloud CDN0
- MODULE 17 : Cloud Armor0
- MODULE 18 : Logging & Monitoring0
- MODULE 19 : Infrastructure as Code (IaC) using Terraform0
- MODULE 20 : Hands on LAB using Terraform0
- MODULE 21 : Project5
- Palo Alto Network and Security Job Oriented BootcampLearn Palo Alto Network Security Defend On-Premises and Cloud Environments Against Modern Cybersecurity Threats.0
- Module 1 : Introduction to Network Security and Palo Alto Networks6
- Module 2 : Deploy Palo Alto Firewall in the Cloud Environment1
- Module 3 : Initial Configuration and Management5
- 62.1Basic Network Configuration: Interfaces, Zones, Virtual Routers
- 62.2Understanding and Configuring System Settings (Management Interface, DNS, NTP)
- 62.3Object Management: Addresses, Address Groups, Services, Service Groups
- 62.4Administrator Roles and Access Control
- 62.5Palo Alto Firewall PAN-OS Upgrade
- Module 4: Palo Alto Networks core features: App-ID, User-ID, Content-ID, Threat Prevention, and Dynamic Updates.6
- 63.1Key Concept of App-ID (Application Identification) and Layer 7 application
- 63.2Compare of Layer 4 and Layer 7 firewall rules and Custom APP-ID
- 63.3Overview of User-ID (User Identification)
- 63.4Content-ID (Content Inspection)
- 63.5Threat Prevention
- 63.6Overview of Dynamic Updates and Schedule Dynamic Updates
- Module 5 : Implementing Security Policy5
- 64.1Understanding Security Policy Rule Structure and Processing
- 64.2Configuring Firewall Rules: Source, Destination, Application, Service, Action
- 64.3Implementing NAT (Network Address Translation): Source NAT, Destination NAT
- 64.4Understanding and SSL/TLS Inspection and Implementing Decryption Policy
- 64.5Troubleshooting Security Policy Issues
- Module 6 : Implementing Security Profiles7
- 65.1Introduction to Security Profile Groups
- 65.2Application Control: Visibility and Enforcement
- 65.3URL Filtering: Managing Web Access and Security
- 65.4Anti-Virus and Anti-Spyware: Protecting Against Malware
- 65.5Vulnerability Protection: Preventing Exploits
- 65.6File Blocking and Data Filtering
- 65.7WildFire Analysis: Understanding and Mitigating Advanced Threats
- Module 7 : Implementing Zone Protection Profile5
- 66.1Introduction to Zone Protection Profiles
- 66.2Configuring Flood Protection: SYN Flood, UDP Flood , ICMP Flood
- 66.3Configuring Reconnaissance Protection : TCP Port Scan, Host Sweep, UDP Port Scan, IP Protocol.
- 66.4Configuring Packet-Based Protection: IP Drop, TCP Drop, ICMP Drop and IP Option Drop
- 66.5Applying Zone Protection Profiles to Security Zones
- Module 8 : Denial-of-Service (DoS) Protection in Palo Alto Networks6
- Module 9 : VPN Configuration and Management4
- Module 10: Policy Optimization3
- Module 11 : Monitoring, Logging, and Reporting5
- Module 12 : Panorama – Centralized Network Security Management8
- 71.1Introduction to Panorama
- 71.2Panorama Architecture and Modes
- 71.3Deploy Panorama VM Series in AWS/Azure/GCP Cloud Environment
- 71.4Device Groups and Template management
- 71.5Device Registration into Panorama
- 71.6Policy Management with Panorama
- 71.7Objects and Configuration Management
- 71.8Logging, Monitoring and Reporting
- Ready for Job Search4
To enroll in a course, you need to create an account on our platform, browse our course catalog, and click on the "Enroll" button next to the course you want to join. Follow the on-screen instructions to complete the registration process.
Yes, most of our courses offer a certificate of completion, provided you meet all the course requirements, such as passing quizzes and submitting assignments.
Courses often include quizzes, assignments, and sometimes final exams to assess your understanding of the material. The specific assessment methods will be detailed in the course syllabus.
Courses can be paid for using a credit/debit card, PayPal, or other payment methods specified at checkout. Payment is required at the time of enrollment.




