وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Palo Alto Next-Generation Firewall Online Training

سرفصل های دوره

In this intermediate Palo Alto skills training, Keith Barker helps learners understand Next-Generation Firewalls (NGF).

All firewalls control traffic with an Access Control List, but next-gen firewalls have a few more bells and whistles. Next-generation firewalls control traffic based on the application and deep packet inspection, which is great. But the thing Palo Alto brings to the table is a firewall that can dynamically learn about threats across the entire internet. The moment a threat is discovered on the internet, that information is communicated to your firewall.


1. Palo Alto Networking Fundamentals
  • 1. Intro to Palo Alto Networking Fundamentals
  • 2. Network Devices
  • 3. Routed vs Routing Protocols
  • 4. Routing Protocol Example
  • 5. Network Types and Topologies
  • 6. Domain Name System
  • 7. Internet of Things IoT

  • 2. Palo Alto Next-gen Firewall Features
  • 1. Intro to Next-gen Firewall Features
  • 2. Next-gen Firewall Overview
  • 3. SSL Decryption
  • 4. User Awareness
  • 5. Application Awareness
  • 6. URL Filtering
  • 7. Threat Prevention
  • 8. WildFire

  • 3. The Cyberattack Lifecycle
  • 1. Intro to the Cyberattack Lifecycle
  • 2. Cyberattack Examples
  • 3. Attacker Profile and Motivations
  • 4. Overview of the Cyberattack Lifecycle
  • 5. Advanced Persistent Threats
  • 6. Preventing a Successful Attack
  • 7. Preventing Port Scanning

  • 4. Vulnerabilities, Exploits, and Risk
  • 1. Intro to Vulnerabilities, Exploits, and Risk
  • 2. Overview of Vulnerabilities, Exploits, and Risk
  • 3. Social Engineering
  • 4. Circumventing Port-Based Firewalls
  • 5. Types of Malware
  • 6. Spamming and Phishing
  • 7. DoS, DDoS, and Botnets
  • 8. Wi-Fi Attacks

  • 5. Cloud Computing and Security
  • 1. Intro to Cloud Computing and Security
  • 2. Cloud Computing and Security Overview
  • 3. SaaS Application Risks
  • 4. Cybersecurity Laws and Regulations
  • 5. User Identification
  • 6. App Identification

  • 6. Strategies for Securing Networks
  • 1. Intro to Strategies for Securing Networks
  • 2. Overview of Strategies for Securing Networks
  • 3. Perimeter-based Network Security
  • 4. Zero Trust and Least Privilege
  • 5. Secure Platform Features
  • 6. Palo Alto Networks Offerings

  • 7. Palo Alto SecOps and DevSecOps
  • 1. Intro to SecOps and DevSecOps
  • 2. Dev, Ops, and Security Overview
  • 3. SecOps Building Blocks
  • 4. Cloud Security Challenges
  • 5. VMs and Containers
  • 6. Serverless Computing
  • 7. Outsourcing Security

  • 8. Build a Palo Alto Firewall Lab in EVE-NG
  • 1. Intro to Building a Lab using EVE-NG
  • 2. Lab Overview
  • 3. Image Prep for EVE-NG
  • 4. LAB design
  • 5. Build the Lab Topology
  • 6. Adding LAB Routing
  • 7. Backup and Snapshots

  • 9. Palo Alto FW Networking Fundamentals
  • 1. Intro to Palo Alto FW Networking
  • 2. Palo Alto FW Networking Overview
  • 3. Initial BootstrapConfig
  • 4. L3 Security Zones
  • 5. L3 Interfaces
  • 6. Virtual Router Overview
  • 7. Adding Static Routes
  • 8. Using Dynamic Routing

  • 10. Palo Alto Source NAT And DHCP
  • 1. Intro to DHCP and NAT
  • 2. Configure DHCP
  • 3. Testing DHCP
  • 4. Troubleshooting a Failed Ping Request
  • 5. NATPAT Overview
  • 6. Configure NATPAT
  • 7. Configure a Basic Security Policy Rule

  • 11. Palo Alto Security Policy Fundamentals
  • 1. Intro to Security Policies
  • 2. Security Policy Overview
  • 3. RAndR (RNR) Review
  • 4. Adding a DMZ
  • 5. Inside to DMZ Security Rule
  • 6. Outside to DMZ Game Plan
  • 7. Destination NAT to DMZ Server
  • 8 .Outside to DMZ Security Rule
  • 9. Testing Outside to DMZ Server

  • 12. Palo Alto Virtual Wire and Tap Interfaces
  • 1. Intro to Virtual Wire and Tap Interfaces
  • 2. Interface Type Overview
  • 3. Tap Interface Overview
  • 4. Implement a Tap Interface
  • 5. Virtual Wire Overview
  • 6. Implement a Virtual Wire
  • 7. Security Policy Rules for V-Wire
  • 8. Layer 2 Interfaces

  • 13. Build a Palo Alto Firewall Lab in ESXi
  • 1. Intro to Building a Lab using ESXi
  • 2. ESXi Based Lab Overview
  • 3. Lab Components
  • 4. ESXi Networking
  • 5. Lab Routing with Vyos
  • 6. Setting up Lab VMs

  • 14. Palo Alto App-ID
  • 1. Intro to App-ID
  • 2. App-ID Fundamentals
  • 3. App-ID Dependencies
  • 4. Application Groups
  • 5. Application Filters
  • 6. Convert to App-ID Security Rules
  • 7. Updates to App-ID

  • 15. Palo Alto SSLTLS Decryption
  • 1. Intro to SSL-TLS Decryption
  • 2. SSL-TLS Decryption Overview
  • 3. Generate a Self-signed Cert
  • 4. Adding a Trusted CA to Clients
  • 5. Implement Decryption Policy Rules
  • 6. Verify Decryption Policy
  • 7. Add a Decryption Policy to PA-FW2

  • 16. Palo Alto Site-to-Site VPNs
  • 1. Intro to Site to Site VPNs
  • 2. Site to Site VPNs Overview
  • 3. Ingredients for Palo Alto Site to Site VPN
  • 4. Site to Site Game Plan
  • 5. Implement Site to Site VPN
  • 6. VPNs and Routing
  • 7. Security Policy Rules for VPN

  • 17. Palo Alto User-ID
  • 1. Intro to Palo Alto User-ID
  • 2. User-ID Fundamentals
  • 3. User-ID Game Plan
  • 4. User-ID Setup
  • 5. LDAP and Group Mapping
  • 6. Security Policies with User-ID
  • 7. User-ID Example And Review

  • 18. Palo Alto URL Filtering
  • 1. Intro to URL Filtering
  • 2. URL Filtering Overview
  • 3. URLs in Rules
  • 4. Custom URL Categories
  • 5. External Dynamic Lists (EDL)
  • 6. URL Security Profiles

  • 19. Palo Alto Threat Prevention
  • 1. Intro to Threat Prevention
  • 2. Threat Prevention Overview
  • 3. Licensing and Updates
  • 4. Vulnerability Protection Profiles
  • 5. Antivirus Security Profiles
  • 6. Anti-Spyware Security Profiles

  • 20. Palo Alto WildFire Malware Analysis
  • 1. Intro to Palo Alto WildFire
  • 2. WildFire Overview
  • 3. WildFire Files and Flowchart
  • 4. WildFire Initial Configuration
  • 5. Testing WildFire Submissions
  • 6. Monitoring WildFire

  • 21. Palo Alto Firewall Management
  • 1. Intro to Firewall Management
  • 2. Cyber Attack Lifecycle
  • 3. Configuration Management
  • 4. Managing Administrators
  • 5. Monitoring

  • 22. Palo Alto FW High Availability
  • 1. Introduction to Firewall HA
  • 2. HA Overview
  • 3. HA Pair InterfacesLinks
  • 4. ActivePassive Game Plan
  • 5. Configure Active-Passive HA
  • 6. Configurations on Active Firewall
  • 7. Testing the HA Pair

  • 23. Using Panorama for FW Mgmt
  • 1. Intro to Panorama
  • 2. Panorama Overview
  • 3. Deploying Panorama
  • 4. Adding FWs to Panorama
  • 5. Device Groups
  • 6. Templates
  • 7. Import FW Configuration
  • 8. Verifying FW Mgmt

  • 24. Palo Alto Zone, Buffer, and DoS Protection
  • 1. Intro to Zone, Buffer, and DoS Protection
  • 2. Protection Overview
  • 3. Packet Buffer Protection
  • 4. Zone Protection
  • 5. DoS Protection Profile and Policy

  • 25. Palo Alto FW Routing
  • 1. Intro to Palo Alto FW Routing
  • 2. IP Routing Overview
  • 3. Static Routing
  • 4. RIP Routing
  • 5. OSPF Routing
  • 6. BGP Routing
  • 7. Service Routes

  • 26. Palo Alto GlobalProtect
  • 1. Intro to Palo Alto GlobalProtect
  • 2. GlobalProtect Overview
  • 3. GlobalProtect Game Plan
  • 4. Certificates for GlobalProtect
  • 5. GlobalProtect Authentication
  • 6. GlobalProtect Portal
  • 7. GlobalProtect Gateway
  • 8. Testing GlobalProtect
  • 9. Logging and Troubleshooting

  • 27. Panorama HA, Logging, and Troubleshooting
  • 1. Intro to Panorama HA, Logging, And Troubleshooting
  • 2. Overview of Panorama HA
  • 3. Configure HA
  • 4. Automated Commit Recovery
  • 5. Panorama Log Collection
  • 6. Configure Panorama Mode
  • 7. Forwarding Logs to Panorama
  • 8. Forwarding From Panorama
  • 9. Troubleshooting

  • 28. Palo Alto Decryption Strategies
  • 1. Intro to Decryption Strategies
  • 2. Decryption Overview
  • 3. Game Plan for SSL Forward Proxy
  • 4. Configure SSL Forward Proxy
  • 5. Game Plan for SSL Inbound Inspection
  • 6. Verify Routing, NAT, and Rights
  • 7. Configure Certificates
  • 8. Configure SSL Inbound Inspection
  • 9. SSH Proxy

  • 29. Digital Certificates and Palo Alto
  • 1. Intro to Digital Certificates and Palo Alto
  • 2. Digital Certificate Overview
  • 3. Enterprise CA
  • 4. Master Key
  • 5. SSLTLS Service Profiles
  • 6. Additional Certificate Tidbits

  • 30. Palo Alto NAT, PAT, And Security
  • 1. Intro to NAT, PAT, And Security Best Practices
  • 2. Best Practices Overview
  • 3. Begin with No
  • 4. Permitting Apps
  • 5. Temporary Tuning Rules
  • 6. Using Tags In Security Policy Rules
  • 7. NAT, PAT, and Security Rules

  • 31. Palo Alto Quality of Service (QoS)
  • 1. Intro to Palo Alto QoS
  • 2. QoS Overview
  • 3. Palo Alto QoS Components
  • 4. QoS Game Plan
  • 5. Create a QoS Profile
  • 6. Create a QoS Policy
  • 7. Apply QoS to Interfaces
  • 8. Modifying QoS

  • 32. Palo Alto Interface Types
  • 1. Intro to Interface Types
  • 2. Interface Type Overview
  • 3. Tap Interface Configuration
  • 4. Virtual Wire
  • 5. Layer 2 Interfaces
  • 6. VLAN Interfaces
  • 7. Layer 3 Sub-interfaces

  • 33. Palo Alto Advanced App-ID
  • 1. Into to Advanced App-ID
  • 2. App-ID Overview
  • 3. Apps, Groups, And Filters
  • 4. Custom Apps and Overrides
  • 5. New or Modified App-IDs
  • 6. App Filters for New App-IDs
  • 7. Monitoring New App-IDs
  • 8. Resolving App Dependencies

  • 34. Palo Alto Authentication Portal
  • 1. Intro to Authentication Portal
  • 2. Authentication Portal Overview
  • 3. Certificates
  • 4. Authentication Settings
  • 5. Interface Profile
  • 6. Authentication Portal Settings
  • 7. Authentication Policy Rules
  • 8. Testing Authentication Portal
  • 9. Multi Factor Authentication Overview

  • 35. Palo Alto Dynamic Groups
  • 1. Intro to Dynamic Groups
  • 2. Overview of Dynamic Groups
  • 3. Game Plan for DAG
  • 4. Log Forwarding Profile
  • 5. Create a Dynamic Address Group (DAG)
  • 6. Using the DAG in Policy
  • 7. Dynamic User Groups
  • 8. Dynamic Tag Removal

  • 36. Palo Alto Firewall Best Practices
  • 1. Intro to Best Practices
  • 2. Tools for Best Practices
  • 3. Core Admin Documentation
  • 4. Decryption Best Practices
  • 5. User-ID Best Practices
  • 6. Internet Gateway Best Practices
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 15460
    حجم: 18138 مگابایت
    مدت زمان: 2070 دقیقه
    تاریخ انتشار: ۴ تیر ۱۴۰۲
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید