Learning Objectives
Successful completion of this five-day, instructor-led course should enhance the student’s understanding of how to configure and manage Palo Alto Networks Next-Generation Firewalls. The course includes hands-on experience configuring, managing, and monitoring a firewall in a lab environment.
Scope
- Course level: Introductory
- Course duration: 5 days
- Course format: Combines lecture and hands-on labs
- Platform support: Palo Alto Networks next-generation firewalls running PAN-OS® operating system version 11.0
Who Should Attend?
- Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, and Support Staff
Prerequisites & Exams
Recommended Prerequisites:
- Participants with a min of Diploma from ITE or Polytechnic is recommended.
- Participants must have a basic familiarity with networking concepts including routing, switching, and IP addressing.
- Students also should be familiar with basic security concepts.
- Experience with other security technologies (IPS, proxy, and content filtering) is a plus.
Certification Exam:
- The Firewall Configuration and Management (PAN EDU 210) course covers all the content required for the PCNSA “Palo Alto Networks Certified Network Security Administrator” certification.
- The recommended enablement path for the PCNSE certification is first to take the [EDU-210] SF – Palo Alto Firewall 11.0 Essentials: Configuration & Management course, followed by the [EDU-220] Palo Alto Panorama 11.0: Managing Firewalls at Scale and the [EDU-330] Palo Alto Firewall 11.0: Troubleshooting in either order.
Course Outline
- Palo Alto Networks Portfolio and Architecture
- Configuring Initial Firewall Settings
- Managing Firewall Configurations
- Managing Firewall Administrator Accounts
- Connecting the Firewall to Production Networks with Security Zones
- Creating and Managing Security Policy Rules
- Creating and Managing NAT Policy Rules
- Controlling Application Usage with App-ID
- Blocking Known Threats Using Security Profiles
- Blocking Inappropriate Web Traffic with URL Filtering
- Blocking Unknown Threats with WildFire
- Controlling Access to Network Resources with User-ID
- Using Decryption to Block Threats in Encrypted Traffic
- Locating Valuable Information Using Logs and Reports
- What’s Next in Your Training and Certification Journey
Appendix A – Securing Endpoints with GlobalProtect
Appendix B – Providing Firewall Redundancy with High Availability
Appendix C – Connecting Remotes Sites using VPNs
Appendix D – Blocking Common Attacks Using Zone Protection