وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Palo Alto Next-Generation Firewall Online Training

سرفصل های دوره

In this intermediate Palo Alto skills training, Keith Barker helps learners understand Next-Generation Firewalls (NGF).

All firewalls control traffic with an Access Control List, but next-gen firewalls have a few more bells and whistles. Next-generation firewalls control traffic based on the application and deep packet inspection, which is great. But the thing Palo Alto brings to the table is a firewall that can dynamically learn about threats across the entire internet. The moment a threat is discovered on the internet, that information is communicated to your firewall.


1. Palo Alto Networking Fundamentals
  • 1. Intro to Palo Alto Networking Fundamentals
  • 2. Network Devices
  • 3. Routed vs Routing Protocols
  • 4. Routing Protocol Example
  • 5. Network Types and Topologies
  • 6. Domain Name System
  • 7. Internet of Things IoT

  • 2. Palo Alto Next-gen Firewall Features
  • 1. Intro to Next-gen Firewall Features
  • 2. Next-gen Firewall Overview
  • 3. SSL Decryption
  • 4. User Awareness
  • 5. Application Awareness
  • 6. URL Filtering
  • 7. Threat Prevention
  • 8. WildFire

  • 3. The Cyberattack Lifecycle
  • 1. Intro to the Cyberattack Lifecycle
  • 2. Cyberattack Examples
  • 3. Attacker Profile and Motivations
  • 4. Overview of the Cyberattack Lifecycle
  • 5. Advanced Persistent Threats
  • 6. Preventing a Successful Attack
  • 7. Preventing Port Scanning

  • 4. Vulnerabilities, Exploits, and Risk
  • 1. Intro to Vulnerabilities, Exploits, and Risk
  • 2. Overview of Vulnerabilities, Exploits, and Risk
  • 3. Social Engineering
  • 4. Circumventing Port-Based Firewalls
  • 5. Types of Malware
  • 6. Spamming and Phishing
  • 7. DoS, DDoS, and Botnets
  • 8. Wi-Fi Attacks

  • 5. Cloud Computing and Security
  • 1. Intro to Cloud Computing and Security
  • 2. Cloud Computing and Security Overview
  • 3. SaaS Application Risks
  • 4. Cybersecurity Laws and Regulations
  • 5. User Identification
  • 6. App Identification

  • 6. Strategies for Securing Networks
  • 1. Intro to Strategies for Securing Networks
  • 2. Overview of Strategies for Securing Networks
  • 3. Perimeter-based Network Security
  • 4. Zero Trust and Least Privilege
  • 5. Secure Platform Features
  • 6. Palo Alto Networks Offerings

  • 7. Palo Alto SecOps and DevSecOps
  • 1. Intro to SecOps and DevSecOps
  • 2. Dev, Ops, and Security Overview
  • 3. SecOps Building Blocks
  • 4. Cloud Security Challenges
  • 5. VMs and Containers
  • 6. Serverless Computing
  • 7. Outsourcing Security

  • 8. Build a Palo Alto Firewall Lab in EVE-NG
  • 1. Intro to Building a Lab using EVE-NG
  • 2. Lab Overview
  • 3. Image Prep for EVE-NG
  • 4. LAB design
  • 5. Build the Lab Topology
  • 6. Adding LAB Routing
  • 7. Backup and Snapshots

  • 9. Palo Alto FW Networking Fundamentals
  • 1. Intro to Palo Alto FW Networking
  • 2. Palo Alto FW Networking Overview
  • 3. Initial BootstrapConfig
  • 4. L3 Security Zones
  • 5. L3 Interfaces
  • 6. Virtual Router Overview
  • 7. Adding Static Routes
  • 8. Using Dynamic Routing

  • 10. Palo Alto Source NAT And DHCP
  • 1. Intro to DHCP and NAT
  • 2. Configure DHCP
  • 3. Testing DHCP
  • 4. Troubleshooting a Failed Ping Request
  • 5. NATPAT Overview
  • 6. Configure NATPAT
  • 7. Configure a Basic Security Policy Rule

  • 11. Palo Alto Security Policy Fundamentals
  • 1. Intro to Security Policies
  • 2. Security Policy Overview
  • 3. RAndR (RNR) Review
  • 4. Adding a DMZ
  • 5. Inside to DMZ Security Rule
  • 6. Outside to DMZ Game Plan
  • 7. Destination NAT to DMZ Server
  • 8 .Outside to DMZ Security Rule
  • 9. Testing Outside to DMZ Server

  • 12. Palo Alto Virtual Wire and Tap Interfaces
  • 1. Intro to Virtual Wire and Tap Interfaces
  • 2. Interface Type Overview
  • 3. Tap Interface Overview
  • 4. Implement a Tap Interface
  • 5. Virtual Wire Overview
  • 6. Implement a Virtual Wire
  • 7. Security Policy Rules for V-Wire
  • 8. Layer 2 Interfaces

  • 13. Build a Palo Alto Firewall Lab in ESXi
  • 1. Intro to Building a Lab using ESXi
  • 2. ESXi Based Lab Overview
  • 3. Lab Components
  • 4. ESXi Networking
  • 5. Lab Routing with Vyos
  • 6. Setting up Lab VMs

  • 14. Palo Alto App-ID
  • 1. Intro to App-ID
  • 2. App-ID Fundamentals
  • 3. App-ID Dependencies
  • 4. Application Groups
  • 5. Application Filters
  • 6. Convert to App-ID Security Rules
  • 7. Updates to App-ID

  • 15. Palo Alto SSLTLS Decryption
  • 1. Intro to SSL-TLS Decryption
  • 2. SSL-TLS Decryption Overview
  • 3. Generate a Self-signed Cert
  • 4. Adding a Trusted CA to Clients
  • 5. Implement Decryption Policy Rules
  • 6. Verify Decryption Policy
  • 7. Add a Decryption Policy to PA-FW2

  • 16. Palo Alto Site-to-Site VPNs
  • 1. Intro to Site to Site VPNs
  • 2. Site to Site VPNs Overview
  • 3. Ingredients for Palo Alto Site to Site VPN
  • 4. Site to Site Game Plan
  • 5. Implement Site to Site VPN
  • 6. VPNs and Routing
  • 7. Security Policy Rules for VPN

  • 17. Palo Alto User-ID
  • 1. Intro to Palo Alto User-ID
  • 2. User-ID Fundamentals
  • 3. User-ID Game Plan
  • 4. User-ID Setup
  • 5. LDAP and Group Mapping
  • 6. Security Policies with User-ID
  • 7. User-ID Example And Review

  • 18. Palo Alto URL Filtering
  • 1. Intro to URL Filtering
  • 2. URL Filtering Overview
  • 3. URLs in Rules
  • 4. Custom URL Categories
  • 5. External Dynamic Lists (EDL)
  • 6. URL Security Profiles

  • 19. Palo Alto Threat Prevention
  • 1. Intro to Threat Prevention
  • 2. Threat Prevention Overview
  • 3. Licensing and Updates
  • 4. Vulnerability Protection Profiles
  • 5. Antivirus Security Profiles
  • 6. Anti-Spyware Security Profiles

  • 20. Palo Alto WildFire Malware Analysis
  • 1. Intro to Palo Alto WildFire
  • 2. WildFire Overview
  • 3. WildFire Files and Flowchart
  • 4. WildFire Initial Configuration
  • 5. Testing WildFire Submissions
  • 6. Monitoring WildFire

  • 21. Palo Alto Firewall Management
  • 1. Intro to Firewall Management
  • 2. Cyber Attack Lifecycle
  • 3. Configuration Management
  • 4. Managing Administrators
  • 5. Monitoring

  • 22. Palo Alto FW High Availability
  • 1. Introduction to Firewall HA
  • 2. HA Overview
  • 3. HA Pair InterfacesLinks
  • 4. ActivePassive Game Plan
  • 5. Configure Active-Passive HA
  • 6. Configurations on Active Firewall
  • 7. Testing the HA Pair

  • 23. Using Panorama for FW Mgmt
  • 1. Intro to Panorama
  • 2. Panorama Overview
  • 3. Deploying Panorama
  • 4. Adding FWs to Panorama
  • 5. Device Groups
  • 6. Templates
  • 7. Import FW Configuration
  • 8. Verifying FW Mgmt

  • 24. Palo Alto Zone, Buffer, and DoS Protection
  • 1. Intro to Zone, Buffer, and DoS Protection
  • 2. Protection Overview
  • 3. Packet Buffer Protection
  • 4. Zone Protection
  • 5. DoS Protection Profile and Policy

  • 25. Palo Alto FW Routing
  • 1. Intro to Palo Alto FW Routing
  • 2. IP Routing Overview
  • 3. Static Routing
  • 4. RIP Routing
  • 5. OSPF Routing
  • 6. BGP Routing
  • 7. Service Routes

  • 26. Palo Alto GlobalProtect
  • 1. Intro to Palo Alto GlobalProtect
  • 2. GlobalProtect Overview
  • 3. GlobalProtect Game Plan
  • 4. Certificates for GlobalProtect
  • 5. GlobalProtect Authentication
  • 6. GlobalProtect Portal
  • 7. GlobalProtect Gateway
  • 8. Testing GlobalProtect
  • 9. Logging and Troubleshooting

  • 27. Panorama HA, Logging, and Troubleshooting
  • 1. Intro to Panorama HA, Logging, And Troubleshooting
  • 2. Overview of Panorama HA
  • 3. Configure HA
  • 4. Automated Commit Recovery
  • 5. Panorama Log Collection
  • 6. Configure Panorama Mode
  • 7. Forwarding Logs to Panorama
  • 8. Forwarding From Panorama
  • 9. Troubleshooting

  • 28. Palo Alto Decryption Strategies
  • 1. Intro to Decryption Strategies
  • 2. Decryption Overview
  • 3. Game Plan for SSL Forward Proxy
  • 4. Configure SSL Forward Proxy
  • 5. Game Plan for SSL Inbound Inspection
  • 6. Verify Routing, NAT, and Rights
  • 7. Configure Certificates
  • 8. Configure SSL Inbound Inspection
  • 9. SSH Proxy

  • 29. Digital Certificates and Palo Alto
  • 1. Intro to Digital Certificates and Palo Alto
  • 2. Digital Certificate Overview
  • 3. Enterprise CA
  • 4. Master Key
  • 5. SSLTLS Service Profiles
  • 6. Additional Certificate Tidbits

  • 30. Palo Alto NAT, PAT, And Security
  • 1. Intro to NAT, PAT, And Security Best Practices
  • 2. Best Practices Overview
  • 3. Begin with No
  • 4. Permitting Apps
  • 5. Temporary Tuning Rules
  • 6. Using Tags In Security Policy Rules
  • 7. NAT, PAT, and Security Rules

  • 31. Palo Alto Quality of Service (QoS)
  • 1. Intro to Palo Alto QoS
  • 2. QoS Overview
  • 3. Palo Alto QoS Components
  • 4. QoS Game Plan
  • 5. Create a QoS Profile
  • 6. Create a QoS Policy
  • 7. Apply QoS to Interfaces
  • 8. Modifying QoS

  • 32. Palo Alto Interface Types
  • 1. Intro to Interface Types
  • 2. Interface Type Overview
  • 3. Tap Interface Configuration
  • 4. Virtual Wire
  • 5. Layer 2 Interfaces
  • 6. VLAN Interfaces
  • 7. Layer 3 Sub-interfaces

  • 33. Palo Alto Advanced App-ID
  • 1. Into to Advanced App-ID
  • 2. App-ID Overview
  • 3. Apps, Groups, And Filters
  • 4. Custom Apps and Overrides
  • 5. New or Modified App-IDs
  • 6. App Filters for New App-IDs
  • 7. Monitoring New App-IDs
  • 8. Resolving App Dependencies

  • 34. Palo Alto Authentication Portal
  • 1. Intro to Authentication Portal
  • 2. Authentication Portal Overview
  • 3. Certificates
  • 4. Authentication Settings
  • 5. Interface Profile
  • 6. Authentication Portal Settings
  • 7. Authentication Policy Rules
  • 8. Testing Authentication Portal
  • 9. Multi Factor Authentication Overview

  • 35. Palo Alto Dynamic Groups
  • 1. Intro to Dynamic Groups
  • 2. Overview of Dynamic Groups
  • 3. Game Plan for DAG
  • 4. Log Forwarding Profile
  • 5. Create a Dynamic Address Group (DAG)
  • 6. Using the DAG in Policy
  • 7. Dynamic User Groups
  • 8. Dynamic Tag Removal

  • 36. Palo Alto Firewall Best Practices
  • 1. Intro to Best Practices
  • 2. Tools for Best Practices
  • 3. Core Admin Documentation
  • 4. Decryption Best Practices
  • 5. User-ID Best Practices
  • 6. Internet Gateway Best Practices
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 15460
    حجم: 18138 مگابایت
    مدت زمان: 2070 دقیقه
    تاریخ انتشار: 4 تیر 1402
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید