Firewall: Optimizing FireWall Threat Prevention (EDU-214)

The Palo Alto Networks Firewall 10.0: Optimizing Firewall Threat Prevention (EDU-214) course is three days of instructor-led training that emphasizes the PAN-OS® threat prevention capabilities.


After completing this course, you should be able to:

  • Describe the cyber-attack lifecycle and recognize common forms of attack
  • Describe PAN-OS® threat prevention capabilities
  • Use firewall logs and reports to make better configuration decisions
  • Configure the firewall to detect, block, and record threats


Course Objectives

Successful completion of this three-day, instructor-led course should enhance the student’s understanding of how to better configure, manage, and monitor PAN-OS® threat prevention features. The student will get hands-on experience configuring, managing, and monitoring threat prevention features in a lab environment.


Scope

  • Course level: Intermediate
  • Course duration: 3 days
  • Course format: Combines lecture and hands-on labs
  • Platform support: Palo Alto Networks next-generation enterprise firewalls running the PAN-OS® operating system


Target Audience

Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, Network Engineers, and Support Staff


Prerequisites

Participants must complete the Firewall Essentials: Configuration and Management course, or have equivalent experience. Students must have a basic familiarity with networking concepts including routing, switching, and IP addressing.


Palo Alto Networks Education

Training from Palo Alto Networks and Palo Alto Networks Authorized Training Centers delivers knowledge and expertise that prepare you to protect our digital way of life. Our trusted security certifications validate your knowledge of the Palo Alto Networks next-generation security platform and your ability to help prevent successful cyberattacks and safely enable applications.

részletek megjelenítése


Course Modules

Module 1: The Cyber-Attack Lifecycle

Module 2: Blocking Packet- and Protocol-Based Attacks

Module 3: Blocking Threats from Known-Bad Sources

Module 4: Blocking Threats Using App-ID

Module 5: Blocking Threats Using Custom Applications

Module 6: Creating Custom Threat Signatures

Module 7: Blocking Threats in Encrypted Traffic

Module 8: Blocking Threats in Allowed Traffic

Module 9: Blocking Threats from Stolen Credentials

Module 10: Viewing Threat and Traffic Information