Palo Alto Networks next-generation firewalls are architected to safely enable applications and prevent modern threats. Their approach identifies all network traffic based on applications, users, content and devices, and lets you express your business policies in the form of easy-to-understand security rules. Flexible deployment options and native integration with their next-generation security platform extend the policy enforcement and cyberthreat prevention to everywhere your users and data are located: in your network, on your endpoints and in the cloud.

starstarstarstarstar_outline

* Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Learning Objectives

The Palo Alto Networks Firewall 10.2 Essentials: Configuration and Management (EDU-210) course is five days of instructor-led training that will help you to:
Configure and manage the essential features of Palo Alto Networks next-generation firewalls
Configure and manage Security and NAT policies to enable approved traffic to and from zones
Configure and manage Threat Prevention strategies to block traffic from known and unknown IP addresses, domains, and URLs
Monitor network traffic using the interactive web interface and firewall reports

1
  • COURSE OUTLINE

  • 1 - Palo Alto Networks Portfolio and Architecture

    2 - Configuring Initial Firewall Settings

    3 - Managing Firewall Configurations

    4 - Managing Firewall Administrator Accounts

    5 - Connecting the Firewall to Production Networks with Security Zones

    6 - Creating and Managing Security Policy Rules

    7 - Creating and Managing NAT Policy Rules

    8 - Controlling Application Usage with App-ID

    9 - Blocking Known Threats Using Security Profiles

    10 - Blocking Inappropriate Web Traffic with URL Filtering

    11 - Blocking Unknown Threats with Wildfire

    12 - Controlling Access to Network Resources with User-ID

    13 - Using Decryption to Block Threats in Encrypted Traffic

    14 - Locating Valuable Information Using Logs and Reports

    15 - What's Next in Your Training and Certification Journey


Audience

Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, and Support Staff

Language

English

Prerequisites

Students must have a basic familiarity with networking concepts including routing, switching, and IP addressing. Students also should be familiar with basic security concepts. Experience with other security technologies (IPS, proxy, and content filtering) is a plus.

$4,995

Length: 5.0 days (40 hours)

Level:

Not Your Location? Change

Course Schedule:

Schedule select
12
Jun
Monday
9:00 AM CT -
5:00 PM CT
Filling Fast
Available
Schedule select
19
Jun
Monday
9:00 AM PT -
5:00 PM PT
Filling Fast
Available
Schedule select
26
Jun
Monday
9:00 AM CT -
5:00 PM CT
Filling Fast
Available
Schedule select
10
Jul
Monday
9:00 AM PT -
5:00 PM PT
Filling Fast
Available
Schedule select
10
Jul
Monday
9:00 AM CT -
5:00 PM CT
Filling Fast
Available
Loading...