وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Palo Alto Firewall PCNSA V11 Training

سرفصل های دوره

Learn Palo Alto Firewall PCNSA PAN-OS Version 11 with Step-by-Step Lab Workbook


1 - Introduction
  • 1 -EVE-NG Images Links.txt
  • 1 -PCNSA course Overview
  • 1 -PCNSA-EVE-Top.zip
  • 1 -PCNSA-Workbooks.zip
  • 2 -Basic Terminology
  • 3 -CIA Triad Concepts
  • 4 -Core Security Concepts

  • 2 - Firewall Technologies
  • 1 -Firewall Technologies Fundamentals
  • 2 -Next Generation Firewalls
  • 3 -Introduction to WAF
  • 4 -Overview of Palo Alto Networks
  • 5 -Zero Trust Security Principles
  • 6 -Architecture of PA Firewalls

  • 3 - EVE-NG LAB Setup
  • 1 -Installing EVE-NG Version 6
  • 2 -Adding SW images in EVE-NG
  • 3 -Adding Other Images in EVE-NG
  • 4 -Adding PA Firewall in EVE-NG
  • 5 -Adding Panorama in EVE-NG
  • 6 -Setting Up PCNSA Lab
  • 7 -Importing Labs into EVE-NG

  • 4 - Device & Network Configuration
  • 1 -Configuring Devices
  • 2 -Configuring DMZ Switch
  • 3 -Configuring NTP Server
  • 4 -Initial Configuration of PA
  • 5 -Initial Configuration of HQ-FW
  • 6 -Methods of Access PA Firewall
  • 7 -Access PA Firewall Through API

  • 5 - Palo Alto Networks Firewall
  • 1 -PA Dashboard Walk-Through
  • 2 -PA CLI Modes and Commands
  • 3 -Configuring DNS & NTP in PA
  • 4 -Concepts of Security Zones
  • 5 -Practical Lab of Security Zones
  • 6 -Concepts of Virtual Routers
  • 7 -Practical Lab on Virtual Routers
  • 8 -Interfaces of Palo Alto Firewall
  • 9 -Layer 3 Network Interfaces
  • 10 -PA Interface MGMT
  • 11 -Practical Lab of VR Default Router
  • 12 -Route Monitoring Overview
  • 13 -Practical Lab of Path Monitoring

  • 6 - Security Policies and NAT
  • 1 -Concepts of Security Policies
  • 2 -Practical Lab of Security Policies
  • 3 -Understanding NAT
  • 4 -Overview of Source NAT
  • 5 -Overview of Destination NAT
  • 6 -Practical Lab of Source NAT
  • 7 -Practical Lab of Destination NAT

  • 7 - SSL Decryption & Certificates
  • 1 -SSL Decryption Overview
  • 2 -Using Self-Signed Certificates
  • 3 -Installing Certificate
  • 4 -Practical Lab of Decryption Policies
  • 5 -Verifying Decryption Policy

  • 8 - Security Profiles
  • 1 -Security Profiles Overview
  • 2 -Security Profiles Deep Dive
  • 3 -Practical Lab of Antivirus Profile
  • 4 -Practical Lab of Anti-Spyware Profile
  • 5 -Practical Lab of Vulnerability Profile
  • 6 -Practical Lab of File Blocking Profile
  • 7 -Practical Lab of WildFire Profile
  • 8 -Practical Lab of Data Filtering Profile
  • 9 -Security Group Overview
  • 10 -Practical Lab on Security Groups

  • 9 - URL Filtering Profile
  • 1 -Overview of URL Filtering
  • 2 -Malicious URLs Through Security Policy
  • 3 -Malicious URLs Through URL Filtering
  • 4 -Custom URL Category-Security Policy
  • 5 -EDL to Block URL-Security Policy
  • 6 -EDL & Custom URL-URL Filtering Profile

  • 10 - DNS Security
  • 1 -Overview of DNS Security
  • 2 -Practical Lab of DNS Security

  • 11 - APP-ID (Application Identification)
  • 1 -Understanding App-ID
  • 2 -App-ID Identification Methods
  • 3 -App-ID Operation
  • 4 -Application Shifts
  • 5 -Application Window
  • 6 -Dependent Applications
  • 7 -Implicitly Use Application
  • 8 -Application Groups
  • 9 -Application Filters
  • 10 -Application Block Page
  • 11 -Identify Apps in SSL Traffic
  • 12 -Policy Optimizer
  • 13 -Application-ID Lab
  • 14 -Port-Base to App-Base

  • 12 - Tags and Groups
  • 1 -Overview of Tags in PA
  • 2 -Practical Lab of Tags
  • 3 -Overview of Shadow Rule
  • 4 -Static and Dynamic Group

  • 13 - Service Route
  • 1 -Overview of Service Route
  • 2 -Service Route Configuration

  • 14 - User-ID (User Identification)
  • 1 -Overview of User-ID
  • 2 -User Mapping Methods
  • 3 -User-ID Agent Forms
  • 4 -User-ID Operation DC
  • 5 -Overview of Captive Portal
  • 6 -Lab of Captive Portal
  • 7 -AD Server Configuration
  • 8 -Configuring Windows AD
  • 9 -Configuring DNS Server
  • 10 -User and Groups in AD
  • 11 -PC1 Windows 11 Join AD
  • 12 -Overview of User-ID Lab Setup
  • 13 -Setting Up Service Account in AD
  • 14 -Enable User-ID on The Inside Zone
  • 15 -Configure LDAP Server Profile
  • 16 -Configure User-ID Group Mapping
  • 17 -Configure Integrated FW Agent
  • 18 -Create User-ID Security Policy
  • 19 -Test Security Policy with User-ID
  • 20 -Verify The User-ID Configuration

  • 15 - Administrator Accounts
  • 1 -Overview of Administrator Accounts
  • 2 -Administrator Roles
  • 3 -Admin Authentication Methods
  • 4 -Custom Admin Roles Lab
  • 5 -Admin LDAP Authentication Lab
  • 6 -Admin RADIUS Authentication Lab
  • 7 -Admin Password Profiles
  • 8 -Authentication Sequence

  • 16 - Logs and Reports
  • 1 -Palo Alto Firewall Logs
  • 2 -Practical Lab of Logs
  • 3 -Reports in PA Firewall Part-1
  • 4 -Reports in PA Firewall Part-2
  • 5 -Overview of Session Browser
  • 6 -Overview of App Scope
  • 7 -Dashboard for Recent Information
  • 8 -ACC (Application Command Center) Tab
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 44462
    حجم: 10848 مگابایت
    مدت زمان: 1181 دقیقه
    تاریخ انتشار: ۲۰ اردیبهشت ۱۴۰۴
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید