1 - Course Outline
Module 1 - Palo Alto Networks Portfolio and ArchitectureModule 2 - Connect to the Management NetworkModule 3 - Manage Firewall ConfigurationsModule 4 - Manage Firewall Administrator AccountsModule 5 - Connect to Production NetworksModule 6 - The Cyberattack LifecycleModule 7 - Block Threats Using Security and NAT PoliciesModule 8 - Block Packet- and Protocol-Based AttacksModule 9 - Block Threats from Known Bad SourcesModule 10 - Block Threats by Identifying ApplicationsModule 11 - Maintain Application-Based PoliciesModule 12 - Block Threats Using Custom ApplicationsModule 13 - Block Threats by Identifying UsersModule 14 – Block Threats by Identifying DevicesModule 15 - Block Unknown ThreatsModule 16 - Block Threats in Encrypted TrafficModule 17 - Prevent Use of Stolen CredentialsModule 18 - Block Threats Using Security ProfilesModule 19 - View Threat and Traffic InformationModule 20 - Next Steps
Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Who is it For?
Security Operations Specialists
Students must have a basic familiarity with networking concepts including routing, switching, and IP addressing. Students also should be familiar with basic security concepts. Experience with other security technologies (IPS, proxy, and content filtering) is a plus.