TRENDS is authorized to promote and deliver Palo Alto courses in partnership with Red Education. Palo Alto Logo is a registered trademark of Palo Alto Networks. All rights reserved.

Firewall 10.1 Essentials: Configuration and Management

Schedule

Start End Duration Location Details

Course Details

Firewall 10.1 Essentials: Configuration and Management

Duration: 5 Days

Course Code: EDU 210

Prerequisite:

Students must have a basic familiarity with networking concepts including routing, switching, and IP addressing. Students also should be familiar with basic security concepts. Experience with other security technologies (IPS, proxy, and content filtering) is a plus.

Course Description:

The Palo Alto Networks Firewall 10.1 Essentials: Configuration and Management (EDU-210) course will help you to:

•    Configure and manage the essential features of Palo Alto Networks next-generation firewalls 
•    Configure and manage Security and NAT policies to enable approved traffic to and from zones 
•    Configure and manage Threat Prevention strategies to block traffic from known and unknown IP addresses, domains, and URLs 
•    Monitor network traffic using the interactive web interface and firewall reports

Course Objective:

Successful completion of this five-day course should enhance the student’s understanding of how to configure and manage Palo Alto Networks Next Generation Firewalls. The course includes hands-on experience configuring, managing, and monitoring a firewall in a lab environment.   

Intended Audience:

Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, and Support Staff    

Course Outlines:

1 - Palo Alto Networks Portfolio and Architecture

2 - Configuring Initial Firewall Settings

3 - Managing Firewall Configurations

4 - Managing Firewall Administrator Accounts

5 - Connecting the Firewall to Production Networks with Security Zones

6 - Creating and Managing Security Policy Rules

7 - Creating and Managing NAT Policy Rules

8 - Controlling Application Usage with App-ID

9 - Blocking Known Threats Using Security Profiles

10 - Blocking Inappropriate Web Traffic with URL Filtering

11 - Blocking Unknown Threats with WildFire

12 - Controlling Access to Network Resources with User-ID

13 - Using Decryption to Block Threats in Encrypted Traffic

14 - Locating Valuable information Using Logs and Reports

15 - What's Next in Your Training and Certification Journey