logo

Palo Alto Course

course overview

download outline

Select Country and City to View dates & book now

Overview

The Palo Alto Networks Firewall 10.0 Essentials: Configuration and Management (210) course is five days of instructor-led training that will enable you to:

  • Configure and manage the essential features of Palo Alto Networks next-generation firewalls
  • Configure and manage Security and NAT policies to enable approved traffic to and from zones
  • Configure and manage Threat Prevention strategies to block traffic from known and unknown IP addresses, domains, and URLs
  • Monitor network traffic using the interactive web interface and firewall reports

Audience

Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, and Support Staff

Skills Gained

Successful completion of this five-day, instructor-led course should enhance the student’s understanding of how to configure and manage Palo Alto Networks NextGeneration Firewalls. The course includes hands-on experience configuring, managing, and monitoring a firewall in a lab environment. 

Prerequisites

Students must have a basic familiarity with networking concepts including routing, switching, and IP addressing. Students should also be familiar with basic port-based security concepts. Experience with other security technologies (IPS, proxy, and content filtering) is a plus.

Outline

  1. Palo Alto Networks Portfolio and Architecture
  2. Connect to the Management Network
  3. Manage Firewall Configurations
  4. Manage Firewall Administrator Accounts
  5. Connect to Production Networks
  6. The Cyberattack Lifecycle
  7. Block Threats Using Security and NAT Policies
  8. Block Packet- and Protocol-Based Attacks
  9. Block Threats from Known Bad Sources
  10. Block Threats by Identifying Applications
  11. Maintain Application-Based Policies
  12. Block Threats Using Custom Applications
  13. Block Threats by Identifying Users
  14. Block Threats by Identifying Devices
  15. Block Unknown Threats
  16. Block Threats in Encrypted Traffic
  17. Prevent Use of Stolen Credentials
  18. Block Threats Using Security Profiles
  19. View Threat and Traffic Information
  20. Next Steps

Talk to an expert

Thinking about Onsite?

If you need training for 3 or more people, you should ask us about onsite training. Putting aside the obvious location benefit, content can be customised to better meet your business objectives and more can be covered than in a public classroom. Its a cost effective option. One on one training can be delivered too, at reasonable rates.

Submit an enquiry from any page on this site and let us know you are interested in the requirements box, or simply mention it when we contact you.

All $ prices are in USD unless it’s a NZ or AU date

SPVC = Self Paced Virtual Class

LVC = Live Virtual Class

Please Note: All courses are availaible as Live Virtual Classes

Trusted by over 1/2 million students in 15 countries

Our clients have included prestigious national organisations such as Oxford University Press, multi-national private corporations such as JP Morgan and HSBC, as well as public sector institutions such as the Department of Defence and the Department of Health.