Arrow Electronics, Inc.

Firewall 10.1 Essentials: Configuration and Management

Kód: PAN_EDU-210

DÉLKA: 5 (den)

CENA: Kč 59 000,00

Popis

Školení je vedené v češtině.

The Palo Alto Networks Firewall 10.0 Essentials: Configuration and Management (EDU-210) course is five days of instructor-led training that will help you to:

Configure and manage the essential features of Palo Alto Networks next-generation firewalls
Configure and manage Security and NAT policies to enable approved traffic to and from zones
Configure and manage Threat Prevention strategies to block traffic from known and unknown IP addresses, domains, and URLs
Monitor network traffic using the interactive web interface and firewall reports.

Toto školení pořádá společnost Tech Data AS Czech s.r.o.

Cíle

Successful completion of this five-day, instructor-led course should enhance the student’s understanding of how to configure and manage Palo Alto Networks NextGeneration Firewalls. The course includes hands-on experience configuring, managing, and monitoring a firewall in a lab environment.

Určeno pro

Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, and Support Staff.

Vstupní znalosti

Students must have a basic familiarity with networking concepts including routing, switching, and IP addressing. Students also should be familiar with basic security concepts. Experience with other security technologies (IPS, proxy, and content filtering) is a plus.

Program

Palo Alto Networks Portfolio and Architecture
Connect to the Management Network
Manage Firewall Configurations
Manage Firewall Administrator Accounts
Connect to Production Networks
The Cyberattack Lifecycle
Block Threats Using Security and NAT Policies
Block Packet- and Protocol-Based Attacks
Block Threats from Known Bad Sources
Block Threats by Identifying Applications
Maintain Application-Based Policies
Block Threats Using Custom Applications
Block Threats by Identifying Users
Block Threats by Identifying Devices
Block Unknown Threats
Block Threats in Encrypted Traffic
Prevent Use of Stolen Credentials
Block Threats Using Security Profiles
View Threat and Traffic Information 20 - Next Steps

Termíny školení