PAN-EDU-210 - Palo Alto Networks Firewall Essentials: Configuration and Management V10.0 (EDU-210)

Palo Alto Networks next-generation firewalls are architected to safely enable applications and prevent modern
threats. Their approach identifies all network traffic based on applications, users, content and devices, and lets you
express your business policies in the form of easy-to-understand security rules.
Flexible deployment options and native integration with their next-generation security platform extend the policy
enforcement and cyberthreat prevention to everywhere your users and data are located: in your network, on your
endpoints and in the cloud.

Please note that this new 5-day course replaces the Palo Alto Networks EDU-201, EDU-205, and EDU-231.

Palo Alto Networks next-generation firewalls are architected to safely enable applications and prevent modern threats. Their approach identifies all network traffic based on applications, users, content and devices, and lets you express your business policies in the form of easy-to-understand security rules.

Student Testimonials

Instructor did a great job, from experience this subject can be a bit dry to teach but he was able to keep it very engaging and made it much easier to focus. Student
Excellent presentation skills, subject matter knowledge, and command of the environment. Student
Instructor was outstanding. Knowledgeable, presented well, and class timing was perfect. Student

Click here to print this page »

Prerequisites


Students must have a basic familiarity with networking concepts including routing, switching, and IP addressing. Students also should be familiar with basic security concepts. Experience with other security technologies (IPS, proxy, and content filtering) is a plus.

Detailed Class Syllabus


Course Outline


Module 1 - Palo Alto Networks Portfolio and
Architecture
· Module 2 - Connect to the Management
Network
· Module 3 - Manage Firewall Configurations
· Module 4 - Manage Firewall Administrator
Accounts
· Module 5 - Connect to Production Networks
· Module 6 - The Cyberattack Lifecycle
· Module 7 - Block Threats Using Security and
NAT Policies
· Module 8 - Block Packet- and Protocol-Based
Attacks
· Module 9 - Block Threats from Known Bad
Sources
· Module 10 - Block Threats by Identifying
Applications
· Module 11 - Maintain Application-Based Policies
· Module 12 - Block Threats Using Custom
Applications
· Module 13 - Block Threats by Identifying Users
· Module 14 – Block Threats by Identifying Devices
· Module 15 - Block Unknown Threats
· Module 16 - Block Threats in Encrypted Traffic
· Module 17 - Prevent Use of Stolen Credentials
· Module 18 - Block Threats Using Security Profiles
· Module 19 - View Threat and Traffic Information
· Module 20 - Next Steps