وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
2

Palo Alto Networks PCNSE Complete Course + Exam

سرفصل های دوره

Learn by Example and pass the PCNSE Exam


1. Introduction
  • 1. Overview
  • 2. What it takes to pass PCNSE

  • 2. How To Set Up Lab Environment
  • 1. Setting Up EVE-NG Community PART 1
  • 2. Setting Up EVE-NG Community PART 2
  • 3. EVE-NG Installation with Linux
  • 4. How to assigned a static IP to EVE-NG
  • 5. How to add Palo Alto to EVE-NG
  • 6. How to Add a Cisco Router
  • 7. Connect To Palo Alto Firewall GUI with EVE-NG
  • 8. Add a cisco Switch to EVE
  • 9. Palo Alto Networks with AWS

  • 3. Basic Palo Alto
  • 1. Traffic Processing Sequence
  • 2. How the commit works
  • 3. Creating Dynamic Admin Account
  • 4. Creating Custom Role-Based Account
  • 5. Non-Local Administrator Accounts

  • 4. Securirty Operating Platform And Architecture
  • 1. Cortex
  • 2. Securing the Enterprise
  • 3. Primary Next Generation Features

  • 5. Interfaces
  • 1. Intro
  • 2. Security Zones
  • 3. Security Policy
  • 4. Tap Mode
  • 5. Virtual Wire Lab simple
  • 6. Virtual Wire Lab Advanced
  • 7. L2 Lab Simple
  • 8. L2 Lab Advanced with no Sub Interfaces
  • 9. L2 Deployment With Sub interfaces
  • 10. L2 Deployment With Sub interfaces and Router on a Stick
  • 11. L3 Lab Simple
  • 12. L3 Lab Advanced
  • 13. Layer 3 Subinterfaces with Firewall on a Stick
  • 14. Tap, Virtual Wire, L2, and L3
  • 15. Interface Management Profile
  • 16. Virtual Routers
  • 17. Virtual Routers with multiple VRs Lab
  • 18. Routing Protocols
  • 19. OSPF
  • 20. OSPF Between PAN, Cisco Router and Juniper Firewall
  • 21. Capture traffic on the management interface
  • 22. Interfaces.html

  • 6. Security Policies
  • 1. Intro
  • 2. Controlling the traffic
  • 3. Palo Alto is StateFul
  • 4. Security Rule Types
  • 5. Creating a Security Policy
  • 6. Edit the Policies Tab
  • 7. Schedule a Policy
  • 8. Creating Objects
  • 9. Tags
  • 10. NAT Types
  • 11. Source NAT
  • 12. Source NAT LAB
  • 13. Destination NAT
  • 14. Creating Network Diagram
  • 15. Diagram.html
  • 16. LAB
  • 17. Lab 1 - Granular Security Policy
  • 18. Lab 2 - Granular Security Policy
  • 19. Intro to QoS
  • 20. QoS Components
  • 21. Easy QoS Configuration
  • 22. Time-Based QoS Configuration

  • 7. App-ID
  • 1. Intro
  • 2. What is App-ID
  • 3. How does App-Id Works
  • 4. Application Shift
  • 5. Application Shift Lab
  • 6. Implicit Applications
  • 7. Implicit Applications Lab
  • 8. Application Filters
  • 9. Application Groups
  • 10. Application Groups Lab
  • 11. Creating Custom Service Lab
  • 12. Updating App-ID

  • 8. Content-ID
  • 1. Intro
  • 2. Content ID
  • 3. Vulnerability Protection Default
  • 4. Cloning A Vulnerability Protection
  • 5. Creating A Vulnerability Protection
  • 6. Vulnerability Protection Exceptions
  • 7. Antivirus Profile Intro + Default
  • 8. Clone and add exceptions to Antivirus Profile
  • 9. Anti-Spyware Profile Intro + Default
  • 10. Clone and add exception for a new Anti-Spyware
  • 11. Anti-Spyware DNS Signatures and Sinkhole
  • 12. Anti-Spyware Sinkhole, DNS Signature and Exceptions
  • 13. File Blocking Profile
  • 14. Creating File Blocking Profile
  • 15. Blocking Multi-Level Encoding
  • 16. Data Filtering Profiles
  • 17. Data Filtering Profiles Demo
  • 18. Security Profile Group Demo
  • 19. Telemetry
  • 20. Dos Protection
  • 21. DoS Protection Part Deux
  • 22. DoS Protection Policies
  • 23. URL Filtering
  • 24. URL Filtering profile
  • 25. Safe Search
  • 26. Block Website with Custom URL Category
  • 27. URL Filtering Profile With Continue, Blocked, and Override
  • 28. Content-ID.html

  • 9. Decryption
  • 1. Intro
  • 2. SSLTLS Overview
  • 3. Firewall Decryption Types
  • 4. PKI, CA, Root CA
  • 5. Looking at a real Certificate
  • 6. CA Certificate Choices
  • 7. Generate Certificate Lab
  • 8. Forward Proxy Decryption
  • 9. Configuring a Forward Trusted Certificate
  • 10. Configuring Forward Untrusted Certificate
  • 11. Configure SSL Forward Proxy Policy
  • 12. Configure SSL Forward Proxy Profile
  • 13. SSL Inbound Inspection
  • 14. SSL Inbound Inspection Lab
  • 15. Decryption.html

  • 10. WildFire
  • 1. Intro
  • 2. WildFire Intro
  • 3. WildFire Email Protection
  • 4. WildFire License
  • 5. WF-500
  • 6. Configuring WildFire Settings
  • 7. WildFire Analysis Profile
  • 8. Creating a WildFire Profile
  • 9. WildFire.html

  • 11. User-ID
  • 1. Intro
  • 2. Intro to User-ID
  • 3. User Mapping Methods
  • 4. Syslog Monitoring
  • 5. DC Monitoring ans Session Monitoring
  • 6. Steps to configure User-ID
  • 7. Active Directory and PC Enrollment
  • 8. Configuring PAN-OS Integrated User-ID Agent
  • 9. Windows Based Agent Configuration Steps
  • 10. BONUS - Authenticating User with Domain Controller
  • 11. User-ID.html

  • 12. GlobalProtect
  • 1. GlobalProtect Intro
  • 2. GlobalProtect Connection Sequence
  • 3. Prima Access
  • 4. Clientless VPN
  • 5. Preparing the Firewall for GlobalProtect
  • 6. GlobalProtect Configuration
  • 7. GlobalProtect.html

  • 13. Site-to-Site VPNs
  • 1. Intro
  • 2. Site-to-site VPN
  • 3. IKE Phase 1
  • 4. IKE Phase 2
  • 5. How does it work
  • 6. Site to Site VPN Configuration
  • 7. Site to Site VPN Depth
  • 8. IPsec Tunnel Troubleshooting
  • 9. IPsec Tunnel Troubleshooting Example
  • 10. Palo Alto to ASA Site to site VPN
  • 11. Palo Alto to Cisco Router Site to Site VPN
  • 12. Site-to-Site.html

  • 14. Monitoring and Reporting
  • 1. Intro
  • 2. Dashboard Tab
  • 3. Application Command Center (ACC)
  • 4. Application Command Center (ACC) LAB
  • 5. Filters
  • 6. Predefined Reports
  • 7. Custome Reports
  • 8. PDF Summary Report
  • 9. SaaS Application Usage Report
  • 10. Report Group
  • 11. Emailing Reports
  • 12. Syslog
  • 13. Add a Syslog Server Profile
  • 14. SNMP
  • 15. Monitoring and Reporting.html

  • 15. High Availibility
  • 1. Intro
  • 2. High availability Overview
  • 3. ActivePassive
  • 4. ActiveActive
  • 5. HA Prerequisites
  • 6. Components and Operations
  • 7. HA Backup Links
  • 8. Designating a Firewall
  • 9. Detecting Failure
  • 10. HA ActivePasisve Configuration
  • 11. Configuring Link Groups
  • 12. Configuring Link Groups Lab
  • 13. Path Monitoring
  • 14. Path Monitoring Lab
  • 15. HA.html

  • 16. Panorama
  • 1. Initial Configuration
  • 2. Set Panorama Management Interface
  • 3. Device Groups and Template

  • 17. Exam Review
  • 1. Application Override
  • 2. Custom Application
  • 3. Security Profile
  • 4. Phishing and Credential Detection
  • 5. DoS and Zone Protection Profiles
  • 6. Security Policy, Security Zones and Traffic Processing Sequence
  • 7. Decryption Policy
  • 8. Logs
  • 9. Applications Traversing
  • 10. Traffic Not Passing as expected
  • 11. Management Plane vs Data Plane
  • 12. HA-Lite

  • 18. Practice Test
  • 1. Plan.html
  • 2. Deploy and Configure Operate.html
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 33503
    حجم: 8559 مگابایت
    مدت زمان: 1072 دقیقه
    تاریخ انتشار: ۷ فروردین ۱۴۰۳
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید