lessphp fatal error: load error: failed to find /eno2-website/wp-content/themes/theme49141/bootstrap/less/bootstrap.lesslessphp fatal error: load error: failed to find /eno2-website/wp-content/themes/theme49141/style.less Palo Alto Networks: Advanced Threat Management Training Tutorial

Palo Alto Networks: Advanced Threat Management Training

Print Friendly, PDF & Email

Introduction:

Learn how to manage advanced threats with this Palo Alto Networks: Advanced Threat Management Training

In this Palo Alto Networks: Advanced Threat Management Training course, you will learn strategies in defense against advanced threats to better understand the threat landscape. With Palo Alto Networks: Advanced Threat Management Training, you will also learn the use of Palo Alto Networks next-generation firewalls, including the WildFire™ product.

Customize It

● If you are familiar with some aspects of this Palo Alto Networks: Advanced Threat Management Training course, we can omit or shorten their discussion.
● We can adjust the emphasis placed on the various topics or build the course around the mix of technologies of interest to you (including technologies other than those included in this outline).
● If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the course in manner understandable to lay audiences.

Audience / Target Group

This course is intended for Security Engineers, Network Engineers, and Support staff

Palo Alto Networks: Advanced Threat Management Training Related Courses

Duration: 2 days

Objectives:

After completing this Palo Alto Networks: Advanced Threat Management Training course, attendees will be able to:

◾Manage advanced threats using security policies, profiles, and signatures to protect networks against emerging threats

Course Content:

Threat Landscape
◾Palo Alto Networks Technologies
◾WildFire Architecture
◾Advanced Persistent Threats
◾Threat Management Strategies

Integrated Approach to Threat Protection
◾Apply Best Practices
◾Reduce the Attack Surface
◾Control Attack Methodology

Handling Known Threats
◾Configuring Security Profiles
◾Zone and DoS Protection
◾Control Advance Threat Enablers
◾Handling Drive-By Downloads

Investigating Attacks
◾Threat Vault
◾Wildfire Logs and Reports
◾Log Correlation
◾Using AppScope
◾Creating Custom App-IDs

Dealing with Zero-Day Attacks
◾Researching Threat Events
◾Identifying Unknown Threats
◾Finding Infected Hosts

Creating Custom Threat Signatures
◾Build Custom Signatures
◾Create Emerging Threat Signature

Request More Information

Time Frame: 0-3 Months4-12 Months

No Comments Yet.

Leave a comment

0