Opis szkolenia
The Palo Alto Networks Firewall 11.0 Essentials: Configuration and Management (EDU-210) course is five days of instructor-led training that will help you to:
- Configure and manage the essential features of Palo Alto Networks next-generation firewalls
- Configure and manage Security and NAT policies to enable approved traffic to and from zones
- Configure and manage Threat Prevention strategies to block traffic from known and unknown IP addresses, domains, and URLs
- Monitor network traffic using the interactive web interface and firewall reports
Exclusive to Fast Lane / ITLS:
Additional Palo Alto Labs and extended lab hours after the course
- 2 Palo Alto Networks Firewalls for High Availability Solutions
- Global Protect Remote Access VPN Lab
- Site-to-Site VPN Lab
- Destination NAT Lab
- Captive Portal & User-ID Lab
Profil słuchaczy
Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts and Support Staff
Certyfikacje
Ten kurs jest częścią następującej ścieżki certyfikacyjnej:
Wymagania
Students must have a basic familiarity with networking concepts including routing, switching, and IP addressing. Students also should be familiar with basic security concepts. Experience with other security technologies (IPS, proxy, and content filtering) is a plus.
Cel szkolenia
Successful completion of this five-day, instructor-led course should enhance the student’s understanding of how to configure and manage Palo Alto Networks next-generation firewalls. The student should learn and get hands-on experience configuring, managing, and monitoring a firewall in a lab environment .
Proponowane kolejne szkolenia
Program szkolenia
Course Modules
- 1 - Palo Alto Networks Portfolio and Architecture
- 2 - Configuring Initial Firewall Settings
- 3 - Managing Firewall Configurations
- 4 - Managing Firewall Administrator Accounts
- 5 - Connecting the Firewall to Production Networks with Security Zones
- 6 - Creating and Managing Security Policy Rules
- 7 - Creating and Managing NAT Policy Rules
- 8 - Controlling Application Usage with App-ID
- 9 - Blocking Known Threats Using Security Profiles
- 10 - Blocking Inappropriate Web Traffic with URL Filtering
- 11 - Blocking Unknown Threats with Wildfire
- 12 - Controlling Access to Network Resources with User-ID
- 13 - Using Decryption to Block Threats in Encrypted Traffic
- 14 - Locating Valuable Information Using Logs and Reports
- 15 - What's Next in Your Training and Certification Journey
- Supplemental Materials
- Securing Endpoints with GlobalProtect
- Providing Firewall Redundancy with High Availability
- Connecting Remotes Sites using VPNs
- Blocking Common Attacks Using Zone Protection