Palo Alto Networks next-generation firewalls are architected to safely enable applications and prevent modern
threats. Their approach identifies all network traffic based on applications, users, content and devices, and lets you
express your business policies in the form of easy-to-understand security rules.
Flexible deployment options and native integration with their next-generation security platform extend the policy
enforcement and cyberthreat prevention to everywhere your users and data are located: in your network, on your
endpoints and in the cloud.
Please note that this new 5-day course replaces the Palo Alto Networks EDU-201, EDU-205, and EDU-231.
Palo Alto Networks next-generation firewalls are architected to safely enable applications and prevent modern threats. Their approach identifies all network traffic based on applications, users, content and devices, and lets you express your business policies in the form of easy-to-understand security rules.
Instructor did a great job, from experience this subject can be a bit dry to teach but he was able to keep it very engaging and made it much easier to focus.
Excellent presentation skills, subject matter knowledge, and command of the environment.
Instructor was outstanding. Knowledgeable, presented well, and class timing was perfect.
Click here to print this page »
Students must have a basic familiarity with networking concepts including routing, switching, and IP addressing. Students also should be familiar with basic security concepts. Experience with other security technologies (IPS, proxy, and content filtering) is a plus.
Detailed Class Syllabus
Module 1 - Palo Alto Networks Portfolio and
· Module 2 - Connect to the Management
· Module 3 - Manage Firewall Configurations
· Module 4 - Manage Firewall Administrator
· Module 5 - Connect to Production Networks
· Module 6 - The Cyberattack Lifecycle
· Module 7 - Block Threats Using Security and
· Module 8 - Block Packet- and Protocol-Based
· Module 9 - Block Threats from Known Bad
· Module 10 - Block Threats by Identifying
· Module 11 - Maintain Application-Based Policies
· Module 12 - Block Threats Using Custom
· Module 13 - Block Threats by Identifying Users
· Module 14 – Block Threats by Identifying Devices
· Module 15 - Block Unknown Threats
· Module 16 - Block Threats in Encrypted Traffic
· Module 17 - Prevent Use of Stolen Credentials
· Module 18 - Block Threats Using Security Profiles
· Module 19 - View Threat and Traffic Information
· Module 20 - Next Steps