Palo Alto Networks Essentials 2: Extended Firewall Management Training

Print Friendly, PDF & Email

Introduction:

Learn the essentials of firewall installation, configuration, and management with this Palo Alto Networks Essentials 2: Extended Firewall Management Training

In this Palo Alto Networks Essentials 2: Extended Firewall Management Training course, you will expand on Essentials 1 course topics. You will also be introduced to new features and functions of Palo Alto Networks Next-Generation firewalls

Customize It

● If you are familiar with some aspects of this Palo Alto Networks Essentials 2: Extended Firewall Management Training course, we can omit or shorten their discussion.
● We can adjust the emphasis placed on the various topics or build the course around the mix of technologies of interest to you (including technologies other than those included in this outline).
● If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the course in manner understandable to lay audiences.

Audience / Target Group

This Palo Alto Networks Essentials 2: Extended Firewall Management Training course is intended for Security Engineers, Network Engineers, and Support staff

Palo Alto Networks Essentials 2: Extended Firewall Management Training (PAN205) Related Courses

Duration: 2 days

Objectives:

After completing this Palo Alto Networks Essentials 2: Extended Firewall Management Training course, attendees will be able to:

◾Install, configure, manage, and perform basic troubleshooting on the entire line of Palo Alto Networks Next-Generation firewalls
◾Basics of implementing and managing GlobalProtect and Active/Active High Availability
◾Optimize their visibility and control over applications, users, and content

Course Content:

Administration and Management
◾Password Management
◾Certificate Management
◾Log Forwarding

Interface Configuration
◾VLAN Objects
◾QoS

Layer 3
◾NAT
◾Policy Based Forwarding
◾Routing Protocols (OSPF)

App-ID™
◾Defining new Application Signatures
◾Application Override

Content-ID™
◾Custom Threat Signatures
◾Data Filtering
◾DoS Protection
◾Botnet Report

User-ID™
◾Captive Portal
◾Terminal Server Agent
◾XML API
◾Dynamic Address Objects

VPN
◾w
◾Configuring the Portal, Gateway, and Agent
◾Host Checks
◾Logs

High Availability
◾Configuring Active/Active HA

Request More Information

Time Frame: 0-3 Months4-12 Months

No Comments Yet.

Leave a comment

0