Firewall 10.0 Essentials: Configuration and Management (EDU-210)

Základní info

Popis kurzu

The Firewall Configuration and Management (EDU-210) training is the most crucial course as it covers all the fundamentals to understand the Next-Generation FireWall from the ground up. Even experienced firewall engineers take a lot out of this course as it includes, besides the architecture and management essentials, topics like Application Identification, Content ID (IPS, Anti-Virus/-Spyware, URL Filtering, File Blocking), SSL Decryption, GlobalProtect Remote Access and User Identification which are all features usually not supported by legacy firewalls. In addition to the official content, we also teach security best practices which will enable students to fully leverage the potential of the Palo Alto Networks Next-Generation Firewall as we not only explain the theory but how to use every feature in real life. 


The Firewall Configuration and Management (EDU-210) training is the most crucial course as it covers all the fundamentals to understand the Next-Generation FireWall from the ground up. Even experienced firewall engineers take a lot out of this course as it includes, besides the architecture and management essentials, topics like Application Identification, Content ID (IPS, Anti-Virus/-Spyware, URL Filtering, File Blocking), SSL Decryption, GlobalProtect Remote Access and User Identification which are all features usually not supported by legacy firewalls. In addition to the official content, we also teach security best practices which will enable students to fully leverage the potential of the Palo Alto Networks Next-Generation Firewall as we not only explain the theory but how to use every feature in real life. 

Určeno pro

Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, and Support Staff

Obsah kurzu


  1. Palo Alto Networks Portfolio and Architecture

  2. Connect to the Management Network

  3. Manage Firewall Configurations

  4. Manage Firewall Administrator Accounts

  5. Connect to Production Networks

  6. The Cyberattack Lifecycle

  7. Block Threats Using Security and NAT Policies

  8. Block Packet- and Protocol-Based Attacks

  9. Block Threats from Known Bad Sources

  10. Block Threats by Identifying Applications

  11. Maintain Application-Based Policies

  12. Block Threats Using Custom Applications

  13. Block Threats by Identifying Users

  14. Block Threats by Identifying Devices

  15. Block Unknown Threats

  16. Block Threats in Encrypted Traffic

  17. Prevent Use of Stolen Credentials

  18. Block Threats Using Security Profiles

  19. View Threat and Traffic Information

  20. Next Steps

Předpoklady

Students must have a basic familiarity with networking concepts including routing, switching, and IP addressing. Students also should be familiar with basic security concepts. Experience with other security technologies (IPS, proxy, and content filtering) is a plus.

Studijní materiály

V angličtině

Firewall 10.0 Essentials: Configuration and Management (EDU-210)

Vybraný termín:

27.9.2021  Online

Cena
59000 Kč + 21 % DPH

Kontaktovat dodavatele


Kontrola proti spamu. Kolik je dvě a sedm ? Součet zapište číslicemi.