Palo Alto Training

Palo Alto Training

This training is about Palo Alto firewalls, the market leader in next generation firewalls. This training is aimed at providing in‐depth knowledge required to install, configure, manage and troubleshoot a Palo Alto firewall.

What are Palo Alto Firewalls?

Palo Alto firewalls are next generation firewalls that can be deployed to increase the security of your network. Compared to traditional firewalls that rely on port and protocol information, Palo Alto firewalls allow traffic to be controlled based on application, user and content identification.

Who should attend this training?

  • Network administrators
  • PCNSE certification seekers
  • Students interested in learning Palo Alto

Why should you attend?

Being the market leader in next generation firewalls, more customers are moving their security infrastructure to Palo Alto. This training will equip you with the skills and knowledge needed to successfully deploy, configure and manage a Palo Alto firewall.

This training will also prepare you for the PCNSE certification.

After attending this training, you’ll be able to:

  • Identify the requirements to deploy Palo Alto in your network
  • Deploy a Palo Alto firewall in your network
  • Configure a Palo Alto firewall
  • Configure the next generation firewall features of Palo Alto
  • Troubleshoot issues with Palo Alto installation

Prerequisites

Basic knowledge of networking concepts

Course Duration

2 Days

Course Contents

  • Single-pass architecture
  • Flow logic
  • Initial access
  • Licensing and software updates
  • Security zones
  • Physical and logical interfaces
  • Virtual routers
  • Static routes
  • Routing protocols
  • Security policies
  • NAT configuration
  • App-ID overview
  • Application groups
  • Anti-virus
  • Anti-spyware
  • URL Filtering
  • Certificate management
  • SSL Decryption
  • Enumerating users
  • User-ID agent
  • Captive Portal
  • Log management
  • Basic reports
  • Panorama
  • Configuring Active/Passive HA
  • GlobalProtect configuration

Ethical Hacking Training

This course goes deep down into depths of networking, systems, web applications, actual exploitation & helps beginners to take their confident first step towards information security field.

  • 6 Weeks Comprehensive Training
  • Built by Experienced Professionals
  • Regularly update on tools, techniques in course content