Course Highlights
In today’s digital age, the value of strong cybersecurity cannot be overstated. Imagine yourself having the prowess to navigate one of the leading tools in this domain: the Palo Alto Firewall V9 & V10. This training course is your gateway to that vision, meticulously crafted to guide you through each dynamic facet of these versions.
Starting with a foundational understanding, you’ll be introduced to the initial phases of setting up and using the Palo Alto Firewall. Installation might seem rudimentary, but it’s the bedrock of your subsequent learning. You’ll then move seamlessly to the intuitive Dashboard Tab, where insights and controls await your expertise. However, this is just the appetiser; as the course unfolds, you’ll dive deeper into routing, learning to configure and verify, and ensuring data travels securely and efficiently.
But there’s more. Your journey will take a deeper twist into the realm of security policies, ensuring that each digital transaction is kept under a vigilant watch. From Security Profiles Configuration to the intricacies of Zone Protection, you’ll be in the driver’s seat, steering towards optimal online security. And, as a grand finale, configurations of App-ID, User-ID, and the nuances of dynamic roles will be unravelled, ensuring you’re equipped with an all-encompassing mastery of Palo Alto Firewall V9 & V10.
Learning outcome
- Understand the core principles and functionalities of Palo Alto Firewall V9 & V10.
- Proficiently install and navigate the Palo Alto Dashboard Tab.
- Configure and verify routing mechanisms effectively.
- Implement robust security policies to ensure optimal protection.
- Master the configurations of Security Profiles and Zone Protections.
Course media
Why should I take this course?
- Comprehensive coverage of Palo Alto Firewall V9 & V10 intricacies.
- A unique blend of theory and application to enhance understanding.
- Insights into the latest firewall configurations for modern challenges.
- Skills are in demand in the cybersecurity sector.
- A stepping stone to advanced cybersecurity credentials.
Career Path
- Palo Alto Firewall Technician
- Network Security Analyst
- Cybersecurity Consultant
- Firewall Implementation Specialist
- Palo Alto Systems Administrator
Requirements
- Basic knowledge of network security.
- A computer or device with internet access.
- Familiarity with firewall concepts.
Course Curriculum
-
Lecture-01:Conman Network Security Terms
00:21:00
-
Lecture-02:Identify Malware Malicious Software
00:31:00
-
Lecture-03:Introduction to Firewall Technology
00:20:00
-
Lecture-04:About Palo Alto Networks Firewall
00:15:00
-
Lecture-05:Install Palo Alto Firewall In VMware
00:17:00
-
Lecture-06:Install Palo Alto On EVE-NG
00:15:00
-
Lecture-07:Install Palo Alto in GNS3
00:13:00
-
Lecture-08:Install Palo Alto On ESXI
00:12:00
-
Lecture-09:CLI Access Modes & Basic Commands
00:18:00
-
Lecture-10:Introduction to Dashboard Tab
00:22:00
-
Lecture-11:Palto Alto Initial Configuration
00:04:00
-
Lecture-12:Configure DNS & NTP in Palto Firewall
00:20:00
-
Lecture-13:Activate Licenses and Subscriptions
00:23:00
-
Lecture-14:Dynamic Updates and Software Updates
00:21:00
-
Lecture-15:Initial Working of Palo Alto Firewall
00:22:00
-
Lecture-16:Management Interface Configuration
00:27:00
-
Lecture-17:Palo Alto Firewall Interfaces Details
00:32:00
-
Lecture-18:Palo Alto Firewall Zones Details
00:12:00
-
Lecture-19:Routing Protocols,AD,Metric & Routing Tables
00:21:00
-
Lecture-20:Virtual Routers in Palo Alto Firewall
00:11:00
-
Lecture-21:Configure & Verify Static Routing in PA Firewall
00:49:00
-
Lecture-22:Configure & Verify Default Routing in PA Firewall
00:14:00
-
Lecture-23:Configure & Verify Dynamic Protocol RIP in PA
00:24:00
-
Lecture-24:Configure & Verify RIP Authentication in PA
00:18:00
-
Lecture-25:Configure & Verify Dynamic Protocol OSPF in PA
00:35:00
-
Lecture-26:Configure and Verify Redistribute in PA
00:14:00
-
Lecture-27:Security Policy Concept & Theory in PA
00:52:00
-
Lecture-28:Security Policy Granular Criteria and Control
00:45:00
-
Lecture-29:Security Policy Action Setting Options
00:29:00
-
Lecture-30:Security Policy Shadows Rule in PA
00:05:00
-
Lecture-31:Security Policy Test Policy Match Option
00:06:00
-
Lecture-32:Security Policy View Rulebase as Groups
00:09:00
-
Lecture-33:Security Policy Policy Optimizer Option
00:05:00
-
Lecture-34:Introduction to SSL and TLS certificates
00:17:00
-
Lecture-35:Configure SSL Forward Proxy in PA Firewall
00:25:00
-
Lecture-36:Introduction to Security Profiles Content-ID
00:10:00
-
Lecture-37:Configure Security Profile (Antivirus Profile)
00:21:00
-
Lecture-38:Configure Security Profile (Anti-Spyware)
00:25:00
-
Lecture-39:Configure Security Profile (Vulnerability)
00:35:00
-
Lecture-40:Configure Security Profile (URL Filtering)
00:37:00
-
Lecture-41:Configure Security Profile (File Blocking)
00:19:00
-
Lecture-42:Configure Security Profile (WildFire Analysis)
00:36:00
-
Lecture-43:Configure Security Profile (Data Filter)
00:26:00
-
Lecture-44:Configure Security Profile (Security Group)
00:10:00
-
Lecture-45:DoS & Zone Protection and Packet Buffer Theory
00:18:00
-
Lecture-46:Configure & Verify DoS Protection Profile
00:43:00
-
Lecture-47:Configure & Verify Zone Protection Profile
00:26:00
-
Lecture-48:Configure & Verify Packet Buffer Protection
00:10:00
-
Lecture-49:Palo Alto Firewall Layer 2 Deployment
00:31:00
-
Lecture-50:Palo Alto Firewall Tap Mode Deployment
00:25:00
-
Lecture-51:Palo Alto Firewall V-Wire Mode Deployment
00:23:00
-
Lecture-52:Palo Alto Firewall Sub-Interface Mode
00:23:00
-
Lecture-53:NAT Theory & Source Network Address Translation Types
00:18:00
-
Lecture-54:Source NAT Type Dynamic IP and Port (DIPP) Theory & Lab
00:46:00
-
Lecture-55:Source NAT Type Dynamic IP(DIP) Theory and Lab
00:11:00
-
Lecture-56:Source NAT Type Static IP Theory and Lab
00:11:00
-
Lecture-57:Destination Network Address Translation Static IP
00:21:00
-
Lecture-58:DNAT Port Forwarding and Port Translation
00:11:00
-
Lecture-59:U-Turn NAT-Network Address Translation Theory & Lab
00:18:00
-
Lecture-60:Objects (Address, Address Groups,Regions,Service, Service Group)
00:46:00
-
Lecture-61:Introduction to App-ID in Palo Alto Firewall
00:39:00
-
Lecture-62: Walk-through and Details of Applications in PA Firewall
00:13:00
-
Lecture-63: Walk-through and Details of Applications Window in PA
00:18:00
-
Lecture-64:Application Shifts in Palo Alto Firewall
00:12:00
-
Lecture-65:Dependent Applications in Palo Alto Firewall
00:06:00
-
Lecture-66:Implicitly Use Applications in Palo Alto Firewall
00:02:00
-
Lecture-67:Application Groups in Palo Alto Firewall
00:14:00
-
Lecture-68: Application Filters in Palo Alto Firewall
00:15:00
-
Lecture-69:Custom Applications in Palo Alto Firewall
00:09:00
-
Lecture-70:Application Override in Palo Alto Firewall
00:14:00
-
Lecture-71:Application Updates in Palo Alto Firewall
00:04:00
-
Lecture-72:Security Policy based on Application in PA
00:12:00
-
Lecture-73:Introduction to User-ID (User Identification)
00:06:00
-
Lecture-74:Captive Portal User-ID in Palo Alto Firewall
00:26:00
-
Lecture-75:AD,DNS, Users and Groups Configuration
00:16:00
-
Lecture-76:Palo Alto Firewall Active Directory Integration
00:43:00
-
Lecture-77:DHCP(Dynamic Host Configuration Protocol) Theory
00:16:00
-
Lecture-78:DHCP(Dynamic Host Configuration Protocol) Server Lab
00:29:00
-
Lecture-79:DHCP(Dynamic Host Configuration Protocol) Relay Lab
00:17:00
-
Lecture-80:Configure Interface Mgmt (Management) Profile
00:09:00
-
Lecture-81:Service Features Service Route Configuration
00:09:00
-
Lecture-82:Administrator Accounts & Dynamic Roles Configuration
00:17:00
-
Lecture-83:Administrator Accounts & Role Based Configuration
00:16:00
-
Lecture-84:Administrator Accounts Window Walk-through
00:10:00
-
Lecture-85:Administrator Accounts Password Complexity
00:26:00
-
Lecture-86:Redundancy High Availability (HA) Theory
00:33:00
-
Lecture-87:High Availability (HA) Active-Passive Lab
00:46:00
-
Lecture-88:Cryptography, Encryption and Hashing Concepts
00:37:00
-
Lecture-89:Internet Key Exchange, Version & Phases Theory
00:10:00
-
Lecture-90:VPN, Types, Protocols,Classification etc Theory
00:07:00
-
Lecture-91:IPSec Protocols, Features,Modes,Encryption Theory
00:06:00
-
Lecture-92:IPSec Site-to-Site Virtual Private Network VPN Lab
00:37:00
-
Lecture-93:Remote-Access VPN GlobalProtect Theory and Lab
01:26:00
-
Lecture-94:Log Types (Traffic,Threat, User-ID etc) in Monitor Tab
00:35:00
-
Lecture-95:Configure and Verify Syslog in Palo Alto Firewall
00:24:00
-
Lecture-96:Configure and Verify NetFlow in Palo Alto Firewall
00:15:00
-
Lecture-97:Configure and Verify SNMP in Palo Alto Firewall
00:16:00
-
Lecture-98:Configure and Verify Packet Capture GUI and CLI
00:36:00
-
Lecture-99:App Scope (Summary,Change,Threat,Network Monitor)
00:05:00
-
Lecture-100:ACC (Application Command Center ) Tab Walk-through
00:17:00
-
Lecture-101:Configure Backup and Restore in Palo Alto Firewall
00:40:00
14-Day Money-Back Guarantee
-
Duration:1 day, 12 hours
-
Access:1 Year
-
Units:101


Want to get everything for £149
Take Lifetime Pack