What you'll get

  • Job Credibility
  • Certification Valid for Life
  • On-demand video*
  • E-Book
  • Self-Paced Learning
  • Certificate of Completion

Exam details

  • Mode of Exam : Online
  • Duration : 1 Hour
  • Multiple Choice Questions are asked
  • No. of Questions are asked : 50
  • Passing Marks : 25 (50%)
  • There is no negative marking

Discover the course which is all about the fundamentals of Palo Alto Networks. Here, you will be taught all the tools, features, and options of your Palo Alto firewalls which offers protection and will enhance your visibility in your network traffic. This course has been designed for anyone who will understand learning every possible aspect of a technology platform which consumes precious time.

In this course you'll learn the understanding of the core technologies, and the zone-based firewall. There are many discussions like how App-ID gives more control, how Content-ID makes things safe, how to Authenticate users with USER-ID, knowing about the technical requirements, how to gain access to the user interface, how to upgrade the firewall, how to manage certificates and many other things in details. You will study here from the very basics to the mastery of this course.

Moreover, many detailed topics are discussed like:

  • Setting up panorama
  • Device groups
  • Panorama HA
  • The rollback procedure
  • Logging service
  • External Logging
  • Exploring API

These are not only the topics which are discussed but also more topics like threat intelligence with minemeld, debugging process, monitoring with pan(w) achrome and many other topics.

You will just require general basic knowledge of network topics such as access control lists, routing, and NAT but not necessary as this course got you covered. This course is also apt for you to opt as you will get the knowledge from the very beginning until you become a pro., you’ll learn everything which is required to set it up like a professional.

This course is for students who are pursuing engineering or computer science. Network Engineers or Administrators, IT Security Administrators, and Security Engineers are also welcome to take this course.

It is for anyone who manages, designs, or operates a Palo Alto Networks or the Candidates who are studying for the Palo Alto Networks PCNSE certification.

After completing this course, you’ll feel confident enough of your knowledge that you can take full advantage of all of the features of the Palo Alto Networks and most importantly you will get lifetime access to this course as the source of e learning. You will get a robust and strong foundation after taking this course which will help you to get further secure and stable jobs. Here, from the basics to the advanced, every concept is covered in the most practical way so that you will not only pass your exams but also you are ready for the real-world environment. So, you shouldn't waste any more time, so take this course now.

Course Content

Total: 173 lectures
  • Understanding the Core Technologies
  • Understanding the zone-based firewall
  • Expected behavior when determining zones
  • Understanding App-ID and Content-ID
  • How App-ID gives more control
  • How Content-ID makes things safe
  • The management and data plane
  • Authenticating users with User-ID
  • Authenticating users with User-ID
  • Technical requirements
  • Gaining access to the user interface
  • Connecting to the web interface and CLI
  • Adding licenses and setting up dynamic updates
  • Creating a new account
  • Registering a new device
  • Activating licenses
  • Downloading and scheduling dynamic updates
  • Upgrading the firewall
  • Understanding the partitions
  • Upgrade considerations
  • Upgrading via the CLI
  • Upgrading via the web interface
  • Hardening the management interface
  • Limiting access via an access List
  • Accessing internet resources from offline management
  • Admin accounts
  • Understanding the interface types
  • VWire
  • The Layer 3 interface
  • The Layer 2 interface and VLANs
  • The loopback interface
  • The tunnel interface
  • Subinterfaces
  • HA interfaces
  • AE interfaces
  • Tap interfaces
  • The Decryption Port Mirror interface
  • Section 2: Advanced Configuration and Putting the Features to Work
  • Chapter 3: Building Strong Policies
  • Understanding and preparing security profiles
  • The Antivirus profile
  • The Anti-Spyware profile
  • The Vulnerability Protection profile
  • URL filtering
  • The file blocking profile
  • The WildFire Analysis profile
  • Custom objects
  • Security profile groups
  • Understanding and building security rules
  • Dropping "bad" traffic
  • Allowing applications
  • Controlling logging and schedules
  • Address objects
  • Tags
  • Policy Optimizer
  • Creating NAT rules
  • Creating NAT rules
  • Inbound NAT
  • Outbound NAT
  • Chapter 4: Taking Control of Sessions
  • Controlling the bandwidth with quality of service policies
  • DSCP and ToS headers
  • QoS enforcement in the firewall
  • Leveraging SSL decryption to break open encrypted sessions
  • SSH proxy
  • SSL forward proxy
  • SSL Inbound Inspection
  • Redirecting sessions over different paths using policy-based forwarding
  • Redirecting critical traffic
  • Load balancing
  • Chapter 5: Services and Operational Modes
  • Applying a DHCP client and DHCP server
  • DHCP client
  • DHCP server and relay
  • Configuring a DNS proxy
  • Setting up high availability
  • Active/Passive mode
  • Active/Active mode
  • Firewall states
  • High-availability interfaces
  • Setting up Active/Passive mode
  • Setting up Active/Active
  • Enabling virtual systems
  • Creating a new VSYS
  • Inter-VSYS routing
  • Creating a shared gateway
  • Managing certificates
  • Chapter 6: Identifying Users and Controlling Access
  • User-ID basics
  • Preparing Active Directory and setting up the agents
  • Configuring group mapping
  • Setting up a captive portal
  • Authenticating users
  • Using an API for User-ID
  • User credential detection
  • Chapter 7: Managing Firewalls through Panorama
  • Setting up Panorama
  • Initial Panorama configuration
  • Panorama logging
  • Device groups
  • Adding managed devices
  • Preparing device groups
  • Creating policies and objects
  • Important things to know when creating objects in device groups
  • Setting up templates and template stacks
  • Panorama management
  • Device deployment
  • Migrating unmanaged to managed devices
  • Panorama HA
  • Tips and tricks
  • Chapter 8: Upgrading Firewalls and Panorama
  • Documenting the key aspects
  • Documenting the key aspects
  • Upgrade considerations
  • Preparing for the upgrade
  • The upgrade process
  • Upgrading a single Panorama instance
  • Upgrading a Panorama HA cluster
  • Upgrading a single firewall
  • Upgrading a firewall cluster
  • Upgrading log collectors (or firewalls) through Panorama
  • After the upgrade
  • The rollback procedure
  • Special case for upgrading older hardware
  • The downgrade procedure
  • Chapter 9: Logging and Reporting
  • Log storage and forwarding
  • Configuring log collectors and log collector groups
  • Logging Service
  • External logging
  • Configuring log forwarding
  • System logs
  • Session logs
  • Reporting
  • Pre-defined reports
  • Custom reports
  • The Application Command Center
  • Filtering logs
  • z: VPN and Advanced Protection
  • z: VPN and Advanced Protection
  • Setting up the VPN
  • Configuring the IPSec site-to-site VPN
  • Configuring GlobalProtect
  • Custom applications and threats
  • Application override
  • Signature-based custom applications
  • Custom threats
  • Zone protection and DoS protection
  • System protection settings
  • Configuring zone protection
  • Configuring DoS protection
  • Chapter 11: Troubleshooting Common Session Issues
  • Using the tools at our disposal
  • Log files
  • Packet captures
  • Botnet reports
  • Interpreting session details
  • Using the troubleshooting tool
  • Using maintenance mode to resolve and recover from system issues
  • Chapter 12: A Deep Dive into Troubleshooting
  • Understanding global counters
  • Analyzing session flows
  • Preparation
  • Execution
  • Cleanup
  • A practical example
  • Debugging processes
  • CLI troubleshooting commands cheat sheet
  • Chapter 13: Supporting Tools
  • Integrating Palo Alto Networks with Splunk
  • Monitoring with Pan(w)achrome
  • Threat intelligence with MineMeld
  • Exploring the API

Reviews

Please login or register to review
Frequently Asked Questions