COURSE REGISTRATION DETAILS
Palo Alto Networks NGFW 10.1 Essentials Training: Configuration & Management Go Back
Code: EDU-210
Format: 4 day Instructor-Led
Tuition (CAD): $3,995
Where: Online
Date/Time: Nov 14, 2022 9:00am - Nov 17, 2022 5:00pm
Extra: If you need to cancel, please provide at least 2 weeks notice prior to the first day of instruction for a full refund.
Course Overview
During this hands-on lab training, you will learn to work with the next-generation firewalls from Palo Alto Networks in a test environment. This 4-day course is taught by a Palo Alto Networks Authorized Trainer and forms the foundation of the educational training program to become a Palo Alto Networks Certified Network Security Engineer (PCNSE).Who can benefit
This course is appropriate for individuals responsible for the deployment and day to day management of Palo Alto Networks Next-Generation Firewalls: Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, Network Engineers and Technical Support staff.Course outline
In this course, you will learn how to:
- Configure and manage the essential features of Palo Alto Networks next-generation firewalls
- Configure and manage security and NAT policies to enable approved traffic to and from zones
- Configure and manage threat prevention strategies to block traffic from known and unknown IP addresses, domains, and URLs
- Monitor network traffic using the interactive web interface and firewall reports
Module 1 – Platform and architecture
- Describe the three pillars of the Palo Alto Networks portfolio
- Define the single-pass architecture
- Define Zero Trust Concept
- Describe the physical and virtual firewall models available from Palo Alto Networks
Module 2 – Initial configuration
- Identify available firewall management interfaces and the methods to access them
- Configure firewall management interface network settings and services
- Identify the purpose and location of the firewall licenses and how to manage licenses
- Identify how to update the PAN-OS® software
Module 3 – Managing firewall configurations
- Describe the purpose of the running and candidate firewall configurations
- Manage firewall configuration
- View and filter firewall logs, with focus on system and configuration logs because they are updated when managing firewall configurations
Module 4 – Managing firewall administrator accounts
- Describe the firewall authentication and authorization process and firewall components
- Create a local firewall administrator account
- Create a non-local firewall administrator account
- Create a firewall account that supports non-interactive login
Module 5 – Connecting the firewall
- Describe firewall network segmentation components used to block threats
- Configure firewall security zones to implement network segmentation
- Configure tap interfaces to collect network traffic for later analysis
- Configure virtual wire interfaces to control network traffic traversing between two firewall interfaces
- Configure Layer 3 interfaces to control network traffic traversing Layer 3 networks
- Configure a virtual router to support Layer 3 interfaces
Module 6 – Security policies
- Describe security policy concepts and operation
- Configure a security policy rule
- Manage a security policy
- Create and use tags and custom services in a security policy
Module 7 – NAT Policies
- Configure a NAT policy to implement source NAT
- Configure a NAT policy to implement destination NAT
Module 8 – App ID
- Identify how App-ID reduces the attack surface
- Describe App-ID concepts and operation
- Configure App-ID-based policy rules
- Update App-ID application database
Module 9 – Security Profiles
- Describe the seven different security profile types
- Define the two predefined vulnerability protection profiles
- Configure security profiles to prevent virus and spyware infiltration
- Configure file blocking profiles to identify and control the flow of file types through the firewall
- Configure a DoS protection profile to help mitigate Layer 3 and 4 protocol-based attacks
Module 10 – URL Filtering
- Configure the firewall to block traffic from known-malicious IP addresses
- Configure the firewall to block traffic from known-malicious domains
- Configure the firewall to block traffic from known-malicious URLs
- Describe other URL filtering operations and options
Module 11 – Wildfire
- Describe WildFire purposes and operation
- Describe WildFire license and deployment choices
- Configure and update WildFire
- View WildFire reports and logs
Module 12 – User-ID
- Identify the purpose and four main components of User-ID
- Identify available IP-to-username mapping methods
- Configure the PAN-OS® integrated agent to connect to monitored servers
- Configure username-to-group name mapping
- Implement User-ID in Security policy
Module 13 – Encrypted traffic
- Review fundamental SSL concepts and operation
- Create and manage certificates using the web interface
- Configure SSL/TLS forward proxy decryption
- Configure SSL/TLS inbound inspection decryption
- Prevent decryption for specific traffic
- View information and troubleshoot SSL/TLS issues using the CLI and logs
- Identify decryption configuration considerations
- Configure SSH decryption
- List other available decryption methods
Module 14 – Logging and reporting
- Monitor threat and traffic information using the Dashboard and the ACC
- Monitor threat and traffic information using the logs
- Monitor threat and traffic information using App Scope reports
- Monitor threat and traffic information using predefined and custom reports
- Configure firewall log forwarding to external services
What you need
Basic network knowledge (scope: routing, switching and IP addressing). Basic security concepts. Experience with other security technologies (IPS, Proxy, content filtering) is a plus.Students need a laptop with a decent HTML5 browser, preferably Chrome or Firefox.