Currently Empty: 0.00$
Curriculum
- 13 Sections
- 62 Lessons
- 2 Weeks
Expand all sectionsCollapse all sections
- Module 1 : Introduction to Network Security and Palo Alto Networks6
- Module 2 : Deploy Palo Alto Firewall in the Cloud Environment1
- Module 3 : Initial Configuration and Management5
- Module 4: Palo Alto Networks core features: App-ID, User-ID, Content-ID, Threat Prevention, and Dynamic Updates.6
- 4.1Key Concept of App-ID (Application Identification) and Layer 7 application
- 4.2Compare of Layer 4 and Layer 7 firewall rules and Custom APP-ID
- 4.3Overview of User-ID (User Identification)
- 4.4Content-ID (Content Inspection)
- 4.5Threat Prevention
- 4.6Overview of Dynamic Updates and Schedule Dynamic Updates
- Module 5 : Implementing Security Policy5
- 5.1Understanding Security Policy Rule Structure and Processing
- 5.2Configuring Firewall Rules: Source, Destination, Application, Service, Action
- 5.3Implementing NAT (Network Address Translation): Source NAT, Destination NAT
- 5.4Understanding and SSL/TLS Inspection and Implementing Decryption Policy
- 5.5Troubleshooting Security Policy Issues
- Module 6 : Implementing Security Profiles6
- 6.1Application Control: Visibility and Enforcement
- 6.2URL Filtering: Managing Web Access and Security
- 6.3Anti-Virus and Anti-Spyware: Protecting Against Malware
- 6.4Vulnerability Protection: Preventing Exploits
- 6.5File Blocking and Data Filtering
- 6.6WildFire Analysis: Understanding and Mitigating Advanced Threats
- Module 7 : Implementing Zone Protection Profile5
- 7.1Introduction to Zone Protection Profiles
- 7.2Configuring Flood Protection: SYN Flood, UDP Flood , ICMP Flood
- 7.3Configuring Reconnaissance Protection : TCP Port Scan, Host Sweep, UDP Port Scan, IP Protocol.
- 7.4Configuring Packet-Based Protection: IP Drop, TCP Drop, ICMP Drop and IP Option Drop
- 7.5Applying Zone Protection Profiles to Security Zones
- Module 8 : Denial-of-Service (DoS) Protection in Palo Alto Networks6
- Module 9 : VPN Configuration and Management3
- Module 10: Policy Optimization3
- Module 11 : Monitoring, Logging, and Reporting5
- Module 12 : Panorama – Centralized Network Security Management7
- Ready for Job Search4
Overview of Palo Alto Networks
Next

