Firewall: Optimizing FireWall Threat Prevention (EDU-214)

The Palo Alto Networks Firewall 9.0: Optimizing Firewall Threat Prevention (EDU-214) course is four days of instructor-led training that emphasizes the PAN-OS® threat prevention capabilities.

After completing this course, you should be able to:
  • Describe the cyber-attack lifecycle and recognize common forms of attack
  • Describe PAN-OS® threat prevention capabilities
  • Use firewall logs and reports to make better configuration decisions
  • Configure the firewall to detect, block, and record threats

Course Objectives
Successful completion of this four-day, instructor-led course should enhance the student’s understanding of how to better configure, manage, and monitor PAN-OS® threat prevention features. The student will get hands-on experience configuring, managing, and monitoring threat prevention features in a lab environment.
 
Scope
  • Course level: Intermediate
  • Course duration: 4 days
  • Course format: Combines lecture and hands-on labs
  • Platform support: Palo Alto Networks next-generation enterprise firewalls running the PAN-OS® operating system
 
Target Audience
Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, Network Engineers, and Support Staff
 
Prerequisites
Participants must complete the Firewall 8.1 Essentials: Configuration and Management course, or have equivalent experience. Students must have a basic familiarity with networking concepts including routing, switching, and IP addressing.
 
Palo Alto Networks Education
Training from Palo Alto Networks and Palo Alto Networks Authorized Training Centers delivers knowledge and expertise that prepare you to protect our digital way of life. Our trusted security certifications validate your knowledge of the Palo Alto Networks next-generation security platform and your ability to help prevent successful cyberattacks and safely enable applications.
 
Show details
 
Course Modules
Module 1: The Cyber-Attack Lifecycle
Module 2: Blocking Packet- and Protocol-Based Attacks
Module 3: Blocking Threats from Known-Bad Sources
Module 4: Blocking Threats Using App-ID
Module 5: Blocking Threats Using Custom Applications
Module 6: Creating Custom Threat Signatures
Module 7: Blocking Threats in Encrypted Traffic
Module 8: Blocking Threats in Allowed Traffic
Module 9: Blocking Threats from Stolen Credentials
Module 10: Viewing Threat and Traffic Information