Course Outline
Introduction
Palo Alto Networks and Cybersecurity
- Specifications and platforms used in Palo Alto Networks
- Palo Alto Networks ecosystem integration
Palo Alto Firewalls
- Deployment options
- Firewall behaviors
Overview of Malware
- Propagating
- Non-propagating
Preparing the Virtual Laboratory
- Configuring an AWS account
- Configuring a Palo Alto instance in AWS
- Configuring the Windows-based User-ID agent
Palo Alto Networks Development Environment
- Implementing basic settings
- Adding commit changes
- Managing interface
- Enabling updates
Security Configuration and Threat Prevention
- Managing packet flow and traffic
- Configuring the firewall
- Setting up dynamic block lists
- Implementing Palo Alto AntiVirus protection
- Optimizing data filtering
- Configuring denial of service protection
Networks and Availability
- Enabling the Palo Alto firewall as a host server
- Configuring virtual routers
- Configuring ports
- Configuring different IPs
Summary and Conclusion
Requirements
- Experience with information security
Audience
- System administrator
Testimonials
Related Courses
BeyondCorp: Implementing Zero Trust Security
14 hoursBeyondCorp is an open source Zero Trust security framework that allows employees to work securely from any location without the need for a traditional VPN. In this instructor-led, live training, participants will learn hands-on how to set up a
Certified Lead Ethical Hacker
35 hoursWhy should you attend? The Certified Lead Ethical Hacker training course enables you to develop the necessary expertise to perform information system penetration tests by applying recognized principles, procedures and penetration testing
Network Security
14 hoursSince all applications today heavily rely on communication and networks, there is no application security without network security. This course focuses on network security with a software security viewpoint, and discusses common network attacks
Certified Network Defender | CND
35 hoursCertified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on the security education framework and work role task
Zscaler
14 hoursZscaler is a SaaS security platform that provides a fast and secure connection between a user and any application. This instructor-led, live training (online or onsite) is aimed at systems administrators who wish to learn how to use Zscaler to
System and Network Security with FortiGate
21 hoursFortiGuard Labs is a security and threat intelligence research company by Fortinet, one of the leading cybersecurity service providers today. Among its most notable products are FortiGate next-generation firewalls (NGFWs) that are more efficient
Network Security in Linux
14 hoursDuring the course, participants will learn: What is denial of service attacks, Flooding, Sniffing, MIM? How to break from the network to the server? How to watch packets on the network (also running on switches)? Do you watch any
Network Security Administrator
35 hoursAudience: System Administrators and Network Administrators as well as anyone who is interested in defensive network security technologies.
Penetration Testing with Nmap
14 hoursNmap is a port scanner used for penetration and network testing. Port scanners such as Nmap, discover vulnerable communications on computer network systems. This instructor-led, live training (online or onsite) is aimed at software testers who
OpenVAS
14 hoursOpenVAS is an advanced open source framework which consists of several services and tools for network vulnerability scanning and management. In this instructor-led, live training, participants will learn how to use OpenVAS for network
Wireless Network and Telecom Network Security
35 hoursWireless and telecom network security refers the practices carried out to safeguard communication devices, terminal equipment, routing equipment, servers and Wireless devices and networks against malicious attacks. This instructor-led, live