Login

Palo Alto Firewall Training with Step-by-Step Lab Workbook

Get 92% Discount | CPD Accredited | Affordable Pricing | No Hidden Charges | 24/7 Tutor Support | Instant Access

course-highlight Course Highlights

Learn firewall technologies to protect your business from cyberattacks. This Palo Alto Firewall Training with Step-by-Step Lab Workbook will teach you how to install, configure, deploy, manage and troubleshoot Palo Alto Networks firewalls. It’s perfect for students who wish to learn the Palo Alto Firewall and prepare for the PCNSE.

The Firewall course will introduce you to standard security terms and malware. Then, it will teach you about the significant types of firewalls, their functions and their advantages. The Firewall training will improve your knowledge of the Palo Alto Networks & PCNSE. You’ll learn about the Palo Alto firewall policies and network configuration. We will teach you how to install Palo Alto Firewall On VMware Workstation, GNS3 and EVE-NG. You’ll also learn how to configure Palo Alto Networks for an efficient lab environment.

Moreover, our Palo Alto networks courses will teach you about the different interfaces and zones in the Palo Alto Firewall. You’ll find information about routing configuration, radius server configuration, IPSEC configuration, high availability configuration and more. The Palo Alto training will guide you through backing up and restoring configurations. You’ll also learn how to do packet capture in Firewall and understand the concept of site-to-site VPN theory.

course-benefits Learning outcome

  • Master Palo Alto firewall configurations and administration.
  • Implement effective security measures against cyber threats.
  • Make informed decisions for strategic network security.
  • Prepare for relevant firewall certification exams.
  • Expertly troubleshoot complex firewall issues.

course-why Why should I take this course?

  • Palo Alto basics to advanced firewall administration essentials.
  • Learn from seasoned professionals in the field.
  • Aspiring and current network security professionals seeking Palo Alto expertise.
  • System administrators and engineers are responsible for network protection.
  • Cybersecurity enthusiasts aim to delve into Palo Alto firewall technologies.

course-why Career Path

  • Network Security Analyst
  • Firewall Administrator
  • Cybersecurity Consultant
  • IT Security Engineer
  • Network Architect

course-requirement Requirements

  • Proficiency in written and spoken English
  • Access to a computer with internet connectivity

Course Curriculum

  • play Lecture 1:Common Network Security Terms & Malware
    play 00:43:00
  • play Lecture 2: Introduction to Firewall Technologies
    play 00:26:00
  • play Lecture 3: About Palo Alto Networks & PCNSE
    play 00:16:00
  • play Lecture 4: Install Palo Alto Firewall On VMware Workstation
    play 00:19:00
  • play Lecture 5: Install Palo Alto Firewall in GNS3
    play 00:12:00
  • play Lecture 6: Install Palo Alto Firewall On EVE-NG
    play 00:15:00
  • play Lecture 7: CLI Access Modes, DNS & NTP Configuration
    play 00:43:00
  • play Lecture 8: Introduction to Dashboard Tab
    play 00:37:00
  • play Lecture 9: Palo Alto Firewall Licenses and Updates
    play 00:27:00
  • play Lecture 10: Palo Alto Firewall Initial Working Lab
    play 00:29:00
  • play Lecture 11: Palo Alto Firewall Interfaces and Zones
    play 00:44:00
  • play Lecture 12: Configure & Verify Static Routing & RIPV2
    play 00:57:00
  • play Lecture 13: Configure & Verify Redistribution & OSPF
    play 00:33:00
  • play Lecture 14: Configure & Verify Security Policy Rules
    play 01:15:00
  • play Lecture 15: Configure & Verify NAT and PAT
    play 01:44:00
  • play Lecture 16: Configure Object (Address,Service,Tags)
    play 01:05:00
  • play Lecture 17: Configure Antivirus Security Profile
    play 00:34:00
  • play Lecture 18: Configure Anti-Spyware Security Profile
    play 00:25:00
  • play Lecture 19: Configure Vulnerability Security Profile
    play 00:22:00
  • play Lecture 20: Configure URL Filtering Security Profile
    play 00:36:00
  • play Lecture 21: Configure File Blocking Security Profile
    play 00:15:00
  • play Lecture 22: Configure WildFire Analysis Security Profile
    play 00:27:00
  • play Lecture 23: Configure Data Filter Security Profile
    play 00:26:00
  • play Lecture 24: Configure Security Group Security Profile
    play 00:05:00
  • play Lecture 25: Configure and Attach Interface Mgmt
    play 00:13:00
  • play Lecture 26: Configure DoS Protection & Zone Protection
    play 01:22:00
  • play Lecture 27: SSL Forward Proxy
    play 01:03:00
  • play Lecture 28: Palo Alto Firewall App-ID Introduction
    play 00:15:00
  • play Lecture 29: Palo Alto Firewall App-ID Labs
    play 01:33:00
  • play Lecture 30: Palo Alto Firewall Layer 2 Deployment
    play 00:31:00
  • play Lecture 31: Palo Alto Firewall Tap Mode Deployment
    play 00:19:00
  • play Lecture 32: Palo Alto Firewall Virtual Wire Deployment
    play 00:16:00
  • play Lecture 33: Palo Alto Firewall User-ID Captive Portal
    play 00:37:00
  • play Lecture 34: Palo Alto Firewall User-ID LDAP Integration
    play 01:07:00
  • play Lecture 35: Service Route Configuration
    play 00:09:00
  • play Lecture 36: Administrator Accounts Part-1
    play 00:33:00
  • play Lecture 37: Administrator Accounts Part-2
    play 00:30:00
  • play Lecture 38: Configure RADIUS Authentication
    play 00:25:00
  • play Lecture 39: Configure and Verify DHCP Server & Relay
    play 00:39:00
  • play Lecture 40: High Availability Theory
    play 00:41:00
  • play Lecture 41: High Availability Lab
    play 00:50:00
  • play Lecture 42: Link and Path Monitoring Lab
    play 00:16:00
  • play Lecture 43: Backup and Restore in Palo Alto Firewall
    play 01:00:00
  • play Lecture 44: Logs Type in Palo Alto Firewall
    play 00:30:00
  • play Lecture 45: Configure and Verify Syslogs
    play 00:31:00
  • play Lecture 46: Configure and Verify NetFlow
    play 00:20:00
  • play Lecture 47: Packet Capture in Palo Alto Firewall
    play 00:32:00
  • play Lecture 48: ACC(Application Command Center) Tab
    play 00:32:00
  • play Lecture 49: Site-to-Site VPN Theory Concept
    play 00:42:00
  • play Lecture 50: Site-to-Site VPN Configuration Lab
    play 01:03:00
  • play Lecture 51: Remote Access VPN Global Protect
    play 01:26:00