Firewall 10.0 Essentials: Configuration and Management (EDU-210)
The Palo Alto Networks Firewall 10.0 Essentials: Configuration and Management (EDU-210) course is five days of instructor-led training that will help you to:
- Configure and manage the essential features of Palo Alto Networks next-generation firewalls
- Configure and manage Security and NAT policies to enable approved traffic to and from zones
- Configure and manage Threat Prevention strategies to block traffic from known and unknown IP addresses, domains, and URLs
- Monitor network traffic using the interactive web interface and firewall reports
Objectives
Successful completion of this five-day, instructor-led course should enhance the student’s understanding of how to configure and manage Palo Alto Networks NextGeneration Firewalls. The course includes hands-on experience configuring, managing, and monitoring a firewall in a lab environment.
Target Audience
Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, and Support Staff
Prerequisites
Students must have a basic familiarity with networking concepts including routing, switching, and IP addressing. Students also should be familiar with basic security concepts. Experience with other security technologies (IPS, proxy, and content filtering) is a plus.
Scope
Level: Introductory
Duration: 5 days
Format: Lecture and hands-on labs
Platform support: Palo Alto Networks next-generation firewalls running PAN-OS® operating system version 9.2
Course Modules
- Palo Alto Networks Portfolio and Architecture
- Connect to the Management Network
- Manage Firewall Configurations
- Manage Firewall Administrator Accounts
- Connect to Production Networks
- The Cyberattack Lifecycle
- Block Threats Using Security and NAT Policies
- Block Packet- and Protocol-Based Attacks
- Block Threats from Known Bad Sources
- Block Threats by Identifying Applications
- Maintain Application-Based Policies
- Block Threats Using Custom Applications
- Block Threats by Identifying Users
- Block Threats by Identifying Devices
- Block Unknown Threats
- Block Threats in Encrypted Traffic
- Prevent Use of Stolen Credentials
- Block Threats Using Security Profiles
- View Threat and Traffic Information 20 - Next Steps
