Course Highlights
In today’s digital age, the value of strong cybersecurity cannot be overstated. Imagine yourself having the prowess to navigate one of the leading tools in this domain: the Palo Alto Firewall V9 & V10. This training course is your gateway to that vision, meticulously crafted to guide you through each dynamic facet of these versions.
Starting with a foundational understanding, you’ll be introduced to the initial phases of setting up and using the Palo Alto Firewall. Installation might seem rudimentary, but it’s the bedrock of your subsequent learning. You’ll then move seamlessly to the intuitive Dashboard Tab, where insights and controls await your expertise. However, this is just the appetiser; as the course unfolds, you’ll dive deeper into routing, learning to configure and verify, and ensuring data travels securely and efficiently.
But there’s more. Your journey will take a deeper twist into the realm of security policies, ensuring that each digital transaction is kept under a vigilant watch. From Security Profiles Configuration to the intricacies of Zone Protection, you’ll be in the driver’s seat, steering towards optimal online security. And, as a grand finale, configurations of App-ID, User-ID, and the nuances of dynamic roles will be unravelled, ensuring you’re equipped with an all-encompassing mastery of Palo Alto Firewall V9 & V10.
Learning outcome
- Understand the core principles and functionalities of Palo Alto Firewall V9 & V10.
- Proficiently install and navigate the Palo Alto Dashboard Tab.
- Configure and verify routing mechanisms effectively.
- Implement robust security policies to ensure optimal protection.
- Master the configurations of Security Profiles and Zone Protections.
Course media
Why should I take this course?
- Comprehensive coverage of Palo Alto Firewall V9 & V10 intricacies.
- A unique blend of theory and application to enhance understanding.
- Insights into the latest firewall configurations for modern challenges.
- Skills are in demand in the cybersecurity sector.
- A stepping stone to advanced cybersecurity credentials.
Career Path
- Palo Alto Firewall Technician
- Network Security Analyst
- Cybersecurity Consultant
- Firewall Implementation Specialist
- Palo Alto Systems Administrator
Requirements
- Basic knowledge of network security.
- A computer or device with internet access.
- Familiarity with firewall concepts.
Course Curriculum
-
Lecture-01:Conman Network Security Terms00:21:00
-
Lecture-02:Identify Malware Malicious Software00:31:00
-
Lecture-03:Introduction to Firewall Technology00:20:00
-
Lecture-04:About Palo Alto Networks Firewall00:15:00
-
Lecture-05:Install Palo Alto Firewall In VMware00:17:00
-
Lecture-06:Install Palo Alto On EVE-NG00:15:00
-
Lecture-07:Install Palo Alto in GNS300:13:00
-
Lecture-08:Install Palo Alto On ESXI00:12:00
-
Lecture-09:CLI Access Modes & Basic Commands00:18:00
-
Lecture-10:Introduction to Dashboard Tab00:22:00
-
Lecture-11:Palto Alto Initial Configuration00:04:00
-
Lecture-12:Configure DNS & NTP in Palto Firewall00:20:00
-
Lecture-13:Activate Licenses and Subscriptions00:23:00
-
Lecture-14:Dynamic Updates and Software Updates00:21:00
-
Lecture-15:Initial Working of Palo Alto Firewall00:22:00
-
Lecture-16:Management Interface Configuration00:27:00
-
Lecture-17:Palo Alto Firewall Interfaces Details00:32:00
-
Lecture-18:Palo Alto Firewall Zones Details00:12:00
-
Lecture-19:Routing Protocols,AD,Metric & Routing Tables00:21:00
-
Lecture-20:Virtual Routers in Palo Alto Firewall00:11:00
-
Lecture-21:Configure & Verify Static Routing in PA Firewall00:49:00
-
Lecture-22:Configure & Verify Default Routing in PA Firewall00:14:00
-
Lecture-23:Configure & Verify Dynamic Protocol RIP in PA00:24:00
-
Lecture-24:Configure & Verify RIP Authentication in PA00:18:00
-
Lecture-25:Configure & Verify Dynamic Protocol OSPF in PA00:35:00
-
Lecture-26:Configure and Verify Redistribute in PA00:14:00
-
Lecture-27:Security Policy Concept & Theory in PA00:52:00
-
Lecture-28:Security Policy Granular Criteria and Control00:45:00
-
Lecture-29:Security Policy Action Setting Options00:29:00
-
Lecture-30:Security Policy Shadows Rule in PA00:05:00
-
Lecture-31:Security Policy Test Policy Match Option00:06:00
-
Lecture-32:Security Policy View Rulebase as Groups00:09:00
-
Lecture-33:Security Policy Policy Optimizer Option00:05:00
-
Lecture-34:Introduction to SSL and TLS certificates00:17:00
-
Lecture-35:Configure SSL Forward Proxy in PA Firewall00:25:00
-
Lecture-36:Introduction to Security Profiles Content-ID00:10:00
-
Lecture-37:Configure Security Profile (Antivirus Profile)00:21:00
-
Lecture-38:Configure Security Profile (Anti-Spyware)00:25:00
-
Lecture-39:Configure Security Profile (Vulnerability)00:35:00
-
Lecture-40:Configure Security Profile (URL Filtering)00:37:00
-
Lecture-41:Configure Security Profile (File Blocking)00:19:00
-
Lecture-42:Configure Security Profile (WildFire Analysis)00:36:00
-
Lecture-43:Configure Security Profile (Data Filter)00:26:00
-
Lecture-44:Configure Security Profile (Security Group)00:10:00
-
Lecture-45:DoS & Zone Protection and Packet Buffer Theory00:18:00
-
Lecture-46:Configure & Verify DoS Protection Profile00:43:00
-
Lecture-47:Configure & Verify Zone Protection Profile00:26:00
-
Lecture-48:Configure & Verify Packet Buffer Protection00:10:00
-
Lecture-49:Palo Alto Firewall Layer 2 Deployment00:31:00
-
Lecture-50:Palo Alto Firewall Tap Mode Deployment00:25:00
-
Lecture-51:Palo Alto Firewall V-Wire Mode Deployment00:23:00
-
Lecture-52:Palo Alto Firewall Sub-Interface Mode00:23:00
-
Lecture-53:NAT Theory & Source Network Address Translation Types00:18:00
-
Lecture-54:Source NAT Type Dynamic IP and Port (DIPP) Theory & Lab00:46:00
-
Lecture-55:Source NAT Type Dynamic IP(DIP) Theory and Lab00:11:00
-
Lecture-56:Source NAT Type Static IP Theory and Lab00:11:00
-
Lecture-57:Destination Network Address Translation Static IP00:21:00
-
Lecture-58:DNAT Port Forwarding and Port Translation00:11:00
-
Lecture-59:U-Turn NAT-Network Address Translation Theory & Lab00:18:00
-
Lecture-60:Objects (Address, Address Groups,Regions,Service, Service Group)00:46:00
-
Lecture-61:Introduction to App-ID in Palo Alto Firewall00:39:00
-
Lecture-62: Walk-through and Details of Applications in PA Firewall00:13:00
-
Lecture-63: Walk-through and Details of Applications Window in PA00:18:00
-
Lecture-64:Application Shifts in Palo Alto Firewall00:12:00
-
Lecture-65:Dependent Applications in Palo Alto Firewall00:06:00
-
Lecture-66:Implicitly Use Applications in Palo Alto Firewall00:02:00
-
Lecture-67:Application Groups in Palo Alto Firewall00:14:00
-
Lecture-68: Application Filters in Palo Alto Firewall00:15:00
-
Lecture-69:Custom Applications in Palo Alto Firewall00:09:00
-
Lecture-70:Application Override in Palo Alto Firewall00:14:00
-
Lecture-71:Application Updates in Palo Alto Firewall00:04:00
-
Lecture-72:Security Policy based on Application in PA00:12:00
-
Lecture-73:Introduction to User-ID (User Identification)00:06:00
-
Lecture-74:Captive Portal User-ID in Palo Alto Firewall00:26:00
-
Lecture-75:AD,DNS, Users and Groups Configuration00:16:00
-
Lecture-76:Palo Alto Firewall Active Directory Integration00:43:00
-
Lecture-77:DHCP(Dynamic Host Configuration Protocol) Theory00:16:00
-
Lecture-78:DHCP(Dynamic Host Configuration Protocol) Server Lab00:29:00
-
Lecture-79:DHCP(Dynamic Host Configuration Protocol) Relay Lab00:17:00
-
Lecture-80:Configure Interface Mgmt (Management) Profile00:09:00
-
Lecture-81:Service Features Service Route Configuration00:09:00
-
Lecture-82:Administrator Accounts & Dynamic Roles Configuration00:17:00
-
Lecture-83:Administrator Accounts & Role Based Configuration00:16:00
-
Lecture-84:Administrator Accounts Window Walk-through00:10:00
-
Lecture-85:Administrator Accounts Password Complexity00:26:00
-
Lecture-86:Redundancy High Availability (HA) Theory00:33:00
-
Lecture-87:High Availability (HA) Active-Passive Lab00:46:00
-
Lecture-88:Cryptography, Encryption and Hashing Concepts00:37:00
-
Lecture-89:Internet Key Exchange, Version & Phases Theory00:10:00
-
Lecture-90:VPN, Types, Protocols,Classification etc Theory00:07:00
-
Lecture-91:IPSec Protocols, Features,Modes,Encryption Theory00:06:00
-
Lecture-92:IPSec Site-to-Site Virtual Private Network VPN Lab00:37:00
-
Lecture-93:Remote-Access VPN GlobalProtect Theory and Lab01:26:00
-
Lecture-94:Log Types (Traffic,Threat, User-ID etc) in Monitor Tab00:35:00
-
Lecture-95:Configure and Verify Syslog in Palo Alto Firewall00:24:00
-
Lecture-96:Configure and Verify NetFlow in Palo Alto Firewall00:15:00
-
Lecture-97:Configure and Verify SNMP in Palo Alto Firewall00:16:00
-
Lecture-98:Configure and Verify Packet Capture GUI and CLI00:36:00
-
Lecture-99:App Scope (Summary,Change,Threat,Network Monitor)00:05:00
-
Lecture-100:ACC (Application Command Center ) Tab Walk-through00:17:00
-
Lecture-101:Configure Backup and Restore in Palo Alto Firewall00:40:00
14-Day Money-Back Guarantee
-
Duration:1 day, 12 hours
-
Access:1 Year
-
Units:101
Want to get everything for £149
Take Lifetime Pack