1. Introduction to Palo Alto Firewall
2. Dashboard overview of Palo Alto Firewall
3. Configuring the DNS & NTP in Palo Alto Firewall
4. Management Interface Configuration in Palo Alto Firewall
5. Basic requirements to establish a traffic flow through the Palo Alto Firewall
6. Virtual Routers in Palo Alto Firewall
7. Static Routing in Palo Alto Firewall
8. Configuring & Managing RIP Routing Protocol in Palo Alto Firewall
9. Configuring & Managing the RIP Routing Authentication in Palo Alto firewall
10. Configuring & Managing the OSPF Routing Protocol in Palo Alto Firewall
11. Configuring & Managing the Default Routing Protocol in Palo Alto Firewall
12. Route Redistribution in Palo Alto Firewall
13. Introduction to Security Policy
14. Security Policy Granular view
15. Security Policy - Different types of Actions
16. Shadow Rule of a security policy
17. Grouping of Security Policies
18. Introduction to the SSL and TLS
19. Understanding SSL TLS using real time wireshark packet captures
20. Need for the SSL Decryption
21. Different Types of SSL TLS Decryption methods in Palo Alto Firewall
22. SSL Forward Proxy in Palo Alto Firewall
23. Introduction to the Content-ID Security Profiles
24. Anti-Virus Profile in Palo Alto Firewall
25. Anti-Spyware Profile in Palo Alto Firewall
26. Vulnerability Profiles in Palo Alto Firewall
27. URL Filtering in Palo Alto Firewall
28. File Blocking feature in Palo Alto Firewall
29. Wildfire Analysis feature in Palo Alto Firewall
30. Data Filtering Feature in Palo Alto Firewall
31. DOS Protection Security Profiles in Palo Alto Firewall
32. Packet Buffer Protection feature in Palo Alto Firewall
33. Zone Protection feature in Palo Alto Firewall
34. Grouping of Security Profiles in Palo Alto Firewall
35. Layer 2 Deployment method of Palo Alto Firewall
36. TAP mode of Deployment in Palo Alto Firewall
37. Virtual wire Deployment method of Palo Alto Firewall
38. Sub-Interfaces mode in Palo Alto Firewall
39. Introduction to Application-ID in Palo Alto Firewall
40. Application Dashboard Overview
41. Application Shift in Palo Alto Firewall
42. Working with the Dependent Applications
43. Application Groups in Palo Alto Firewall
44. Application Filters in Palo Alto Firewall
45. Managing the Custom Applications in Palo Alto Firewall
46. Application Overrides & Updates in Palo Alto Firewall
47. Introduction to User-Identification in Palo Alto Firewall
48. Captive Portal Authentication in Palo Alto Firewall
49. DHCP Server configuration in Palo Alto FIrewall
50. DHCP Relay Agent configuration in Palo Alto Firewall
51. Introduction to the NAT (Network Address Translation) in Palo Alto Firewall
52. Source NAT with Dynamic IP method in Palo Alto Firewall
53. Source NAT with Static IP address in Palo Alto Firewall
54. Destination NAT features in Palo Alto Firewall
55. U-Turn NAT feature in Palo Alto Firewall
56. Objects (Address, Address Groups, Service, Service Group).
57. Introduction to Cryptography
58. Basics of VPN Technology
59. Understanding IPSEC protocol
60. Understanding IKE Protocol
61. Configuring & Managing IPSEC VPN in Palo Alto Firewall
62. Configuring & Managing Global Protect VPN in Palo Alto Firewall
63. Introduction about High Availability (HA) or Redundancy
64. High Availability feature in Palo Alto Firewall
65. Configuring SYSLOG server in Palo Alto Firewall
66. Configuring the SNMP Server in the Palo Alto Firewall
67. Packet Capturing feature in Palo Alto Firewall for Troubleshooting
68. ACC dashboard Overview
69. Backup & Restoring the configuration in Palo Alto Firewall
70. Setup a Palo Alto Firewall Lab in EVE-NG
71. Setup a Palo Alto Firewall lab in VMWare Workstation