وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

PCNSA Online Training

سرفصل های دوره

This intermediate Palo Alto PCNSA training prepares learners to take the PCNSA exam, which is the one required exam to earn the Palo Alto Networks Certified Network Security Administrator (PCNSA) certification.

The Palo Alto Networks Certified Network Security Administrator certification isn’t designed just for security professionals — customers, value-add resellers, pre-sale systems engineers, system integrators, and system administrators can get a lot from it too. The PCNSA focuses on installing, maintaining and managing Palo Alto Networks next-generation firewalls to protect networks — so no matter your role or responsibilities, with our PCNSA training, you’ll understand how to use Palo Alto’s cutting edge tools to protect networks from emerging cyber threats. If you need insight into navigating firewalls on Palo Alto’s security operating system, an extensive background in digital security isn’t a prerequisite for our PCNSA training, and afterwards you’ll be a more capable user of any network secured by Palo Alto.


1 Building a Palo Alto Firewall Lab in ESXi
  • 1 Intro to Building a Lab using ESXi
  • 2 ESXi Based Lab Overview
  • 3 Deploy the Firewall VM
  • 4 ESXi Networking
  • 5 Lab Routing with Vyos
  • 6 Setting up Basic FW Management
  • 7 Configure L3 Zones, Virtual Routers, and Interfaces
  • 8 LAB Clients and Servers

  • 2 Configuring Palo Alto Firewall Management Access
  • 9 Intro to Configuring Palo Alto Firewall Management Access
  • 10 Management Access Overview
  • 11 Using the CLI for Management
  • 12 Using the GUI for Management
  • 13 Using APIs for Management
  • 14 Access Restrictions
  • 15 Service Routes

  • 3 Configuring Palo Alto IPv4 FW Routing
  • 16 Intro to Palo Alto IPv4 FW Routing
  • 17 Palo Alto FW IPv4 Routing Overview
  • 18 Adding Directly Connected Routes
  • 19 Adding a Static Default Route
  • 20 Adding a Second Default Route Using ISP-B
  • 21 Using Path Monitoring
  • 22 Dynamic Routing Protocols Overview
  • 23 Configure and Verify RIP
  • 24 Configure and Verify OSPF
  • 25 Configure and Verify BGP

  • 4 Using Source NAT on the Palo Alto FW
  • 26 Intro to Address Translation on the Palo Alto FW
  • 27 Address Translation Overview
  • 28 Source NAT Game Plan
  • 29 Source NAT with Static IP (SIP)
  • 30 Source NAT with Dynamic IP (DIP)
  • 31 Source NAT with Dynamic IP and Port (DIPP)

  • 5 Configuring Multiple Palo Alto FW Admins
  • 32 Into to Multiple Palo Alto FW Admins
  • 33 Multiple Firewall Admins Overview
  • 34 Configure an LDAP Server Profile
  • 35 Configure an Authentication Profile
  • 36 Creating a New Admin Account
  • 37 Using an Authentication Sequence
  • 38 Working with Locks
  • 39 Managing Configurations

  • 6 Understanding Palo Alto FW Security Policy Fundamentals
  • 40 Intro to Security Policy Fundamentals
  • 41 Security Policy Fundamentals Overview
  • 42 Confirm the Lab Topology
  • 43 Create a Basic Security Policy
  • 44 Include IPv4 as Part of the Security Policy Rule
  • 45 Using Address Objects in Security Policy
  • 46 Adding Color Coding to Zones
  • 47 Adding Logging to the Interzone-default Rule
  • 48 Using Applications in Security Policies
  • 49 Stateful Firewalls

  • 7 Using Destination NAT on the Palo Alto FW
  • 50 Intro to Destination NAT
  • 51 Destination NAT Overview
  • 52 Destination NAT Game Plan
  • 53 Destination NAT with Static IP
  • 54 Port-based Destination NAT
  • 55 DNAT for DNS Services Example
  • 56 DNAT Using FQDN (Dynamic IP)

  • 8 Using Palo Alto FW SSLTLS Decryption
  • 57 Intro to SSL Forward Proxy
  • 58 SSL-TLS Decryption Overview
  • 59 SSL Decryption Game Plan
  • 60 Configure FW to Trust Corporate CA
  • 61 Create Signing Cert for FW
  • 62 Create Decryption Profile
  • 63 Create Decryption Policy Rules
  • 64 Testing SSL Decryption
  • 65 Adding a Cert for FW Management

  • 9 Using Palo Alto FW URL Filtering
  • 66 Intro to URL Filtering
  • 67 URL Filtering Overview
  • 68 URL Category Directly in Security Policy Rule
  • 69 Custom URL Categories
  • 70 External Dynamic Lists
  • 71 URL Filtering Security Profiles
  • 72 Modifying the URL Filtering Profile

  • 10 Using a Palo Alto FW Virtual Wire
  • 73 Intro to Palo Alto FW Virtual Wire
  • 74 Virtual Wire Overview
  • 75 Virtual Wire Between Clients and a Server
  • 76 Permitting Traffic Through the Virtual Wire
  • 77 Adding NAT to the Virtual Wire
  • 78 Virtual Wire Between Clients Their Gateway
  • 79 Creating a Security Policy Rule
  • 80 Troubleshooting Virtual Wire and DHCP

  • 11 Using Palo Alto FW App IDs
  • 81 Intro to Palo Alto FW App-IDs
  • 82 App-ID Overview
  • 83 Application Object Fundamentals
  • 84 App-IDs in Security Policy Rules
  • 85 Application Groups in Security Policy Rules
  • 86 Application Filters
  • 87 Grouping Rules by Tag
  • 88 Rule Shadowing

  • 12 Using Palo Alto FW Antivirus and WildFire
  • 89 Intro to Palo Alto FW Antivirus and WildFire
  • 90 Antivirus and Wildfire Overview
  • 91 Game Plan for AV and WildFire
  • 92 Creating an Antivirus Profile
  • 93 Using the Antivirus Profile in a Security Policy
  • 94 Creating a WildFire Analysis Profile
  • 95 Using the WildFire Analysis Profile in Policy
  • 96 Configure WildFire Settings
  • 97 Antivirus and WildFire Updates
  • 98 Verifying WildFire Analysis

  • 13 Using PA FW Anti-Spyware and Protection Profiles
  • 99 Intro to Anti-Spyware And Vuln. Protection
  • 100 Anti-Spyware and Vuln. Protection Overview
  • 101 Add Access to DMZ from Outside
  • 102 Injection Attack Demonstration
  • 103 Create a Vulnerability Protection Profile
  • 104 Testing a Vulnerability Protection Profile
  • 105 Anti-Spyware Profiles

  • 14 Managing Palo Alto FW Updates
  • 106 Intro to Managing Palo Alto FW Updates
  • 107 Firewall Updates Overview
  • 108 Bringing Up a New FW
  • 109 Installing Dynamic Updates
  • 110 Using Application Filters for New App-IDs
  • 111 Update PAN-OS on the FW

  • 15 Using Palo Alto FW L2, TAP, And VLAN Interfaces
  • 112 Intro to L2, VLAN, And Sub-Interfaces
  • 113 L2, VLAN, And Sub-Interfaces Overview
  • 114 Create VLANs and Zones
  • 115 Create L2 and Sub-Interfaces
  • 116 Create Security Policy Rules
  • 117 Create VLAN L3 Interfaces
  • 118 Testing VLAN Interfaces
  • 119 TAP Interfaces

  • 16 Using Panorama to Manage Palo Alto FWs
  • 120 Intro to Panorama
  • 121 Panorama Overview
  • 122 Deploying the Panorama VM
  • 123 Using a Cert for Management
  • 124 Adding Firewalls to Panorama
  • 125 Creating Templates
  • 126 Creating Template Stacks
  • 127 Using Objects in Devices Groups
  • 128 Policies in Device Groups
  • 129 Importing FW Configurations

  • 17 Configuring Palo Alto FW User-ID
  • 130 Intro to Palo Alto FW User-ID
  • 131 User-ID Overview
  • 132 User-ID Game Plan
  • 133 Setting up User-ID
  • 134 Adding User-ID in Security Policy Rules
  • 135 Add LDAP and Group Mapping
  • 136 Using Groups in Security Policy

  • 18 Optimizing Palo Alto FW Security Policies
  • 137 Intro to Optimizing PA FW Security Policies
  • 138 Policy Optimization Overview
  • 139 Adding Deny Rules Matching Dynamic Lists
  • 140 Testing Policy Matches
  • 141 The Policy Optimizer
  • 142 Using Temporary Rules
  • 143 Using Logs and Reports
  • 144 Using the Application Command Center (ACC)
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 15459
    حجم: 13295 مگابایت
    مدت زمان: 1053 دقیقه
    تاریخ انتشار: 4 تیر 1402
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید