Palo Alto Networks

Doing what's right for the customer

Nexum Palo Alto Networks
Upcoming training courses by date and location
Date Location Guaranteed to Run Options
01-20-2020 Chicago, IL Request More Info
01-20-2020 Instructor Led Online (CT) Request More Info
02-24-2020 Chicago, IL Request More Info
02-24-2020 Instructor Led Online (CT) Request More Info
04-07-2020 Chicago, IL Request More Info
04-07-2020 Instructor Led Online (CT) Request More Info

The Palo Alto Networks Firewall 9.0: Optimizing Firewall Threat Prevention (EDU-214) course is four days of instructor-led training that emphasizes the PAN-OS® threat prevention capabilities. After completing this course, you should be able to:

  • Describe the cyber-attack lifecycle and recognize common forms of attack
  • Describe PAN-OS® threat prevention capabilities
  • Use firewall logs and reports to make better configuration decisions
  • Configure the firewall to detect, block, and record threats

Scope

  • Course level: Intermediate
  • Course format: Combines lecture and hands-on labs
  • Platform support: Palo Alto Networks next-generation enterprise firewalls running the PAN-OS® operating system

Prerequisites

Participants must complete the Firewall 8.1 Essentials: Configuration and Management course, or have equivalent experience. Students must have a basic familiarity with networking concepts including routing, switching, and IP addressing.

Objectives

Successful completion of this four-day, instructor-led course should enhance the student’s understanding of how to better configure, manage, and monitor PAN-OS® threat prevention features. The student will get hands-on experience configuring, managing, and monitoring threat prevention features in a lab environment.

Agenda

  • Module 1: The Cyber-Attack Lifecycle
  • Module 2: Blocking Packet- and Protocol-Based Attacks
  • Module 3: Blocking Threats from Known-Bad Sources
  • Module 4: Blocking Threats Using AppID
  • Module 5: Blocking Threats Using Custom Applications
  • Module 6: Creating Custom Threat Signatures
  • Module 7: Blocking Threats in Encrypted Traffic
  • Module 8: Blocking Threats in Allowed Traffic
  • Module 9: Blocking Threats from Stolen Credentials
  • Module 10: Viewing Threat and Traffic Information
Register for this course