Takaisin

PaloAlto Firewall 10.0 Essentials: Configuration and management (EDU-210)

Successful completion of this five-day, instructor-led course should enhance the student’s understanding of how to configure and manage Palo Alto Networks NextGeneration Firewalls. The course includes hands-on experience configuring, managing, and monitoring a firewall in a lab environment.

The Palo Alto Networks Firewall 10.0 Essentials: Configuration and Management (EDU-210) course is five days of instructor-led
training that will help you to:

  • Configure and manage the essential features of Palo Alto Networks next-generation firewalls
  • Configure and manage Security and NAT policies to enable approved traffic to and from zones
  • Configure and manage Threat Prevention strategies to block traffic from known and unknown IP addresses, domains, and URLs
  • Monitor network traffic using the interactive web interface and firewall reports

Scope

  • Course level: Introductory
  • Course duration: 5 days
  • Course format: Combines lecture and hands-on labs
  • Platform support: Palo Alto Networks® nextgeneration enterprise firewalls running the PAN-OS® operating system

Target Audience

Security Engineers, Security Administrators, Security Operations Specialists, SecurityAnalysts, and Support Staff

Prerequisites

Students must have a basic familiarity with networking concepts including routing, switching, and IP addressing. Students also should be familiar with basic security concepts. Experience with other security technologies (IPS, proxy, and content filtering) is a plus.

Koulutus järjestetään yhteistyössä Exclusive Networksin kanssa.

 

Course Modules

1 - Palo Alto Networks Portfolio and Architecture
2 - Connect to the Management Network
3 - Manage Firewall Configurations
4 - Manage Firewall Administrator Accounts
5 - Connect to Production Networks
6 - The Cyberattack Lifecycle
7 - Block Threats Using Security and NAT Policies
8 - Block Packet- and Protocol-Based Attacks
9 - Block Threats from Known Bad Sources
10 - Block Threats by Identifying Applications
11 - Maintain Application-Based Policies
12 - Block Threats Using Custom Applications
13 - Block Threats by Identifying Users
14 – Block Threats by Identifying Devices
15 - Block Unknown Threats
16 - Block Threats in Encrypted Traffic
17 - Prevent Use of Stolen Credentials
18 - Block Threats Using Security Profiles
19 - View Threat and Traffic Information
20 - Next Steps

Exclusive Networks

Kurssi järjestetään yhteistyössä Exclusive Networksin kanssa. Kurssipaikan osoite on Metsänneidonkuja 12, 02130 Espoo.

Ilmoittaudu kurssille

Tietosuoja

Palvelussa voidaan käsitellä Elisan tietosuojaperiaatteissa kuvattuja henkilötietoja, kuten esimerkiksi nimi, yhteystiedot ja palvelun käyttöön liittyvät tiedot. Elisa on palvelussa käsiteltävien henkilötietojen osalta tietosuojalainsäädännössä tarkoitettu henkilötietojen rekisterinpitäjä.

Elisa käsittelee rekisterinpitäjänä henkilötietoja kulloinkin voimassaolevien tietosuojaperiaatteiden mukaisesti (https://elisa.fi/sopimusehdot) ja (https://elisa.fi/tietosuoja).

Elisalla on oikeus käyttää palveluiden tuottamisessa ja henkilötietojen käsittelyssä alihankkijoita.

English:

When using the service, the following types of personal information may be handled; name and contact information, employee information and other information from the client company, end user information, information related to use of the service and customer satisfaction information. This information is needed for the maintenance and development of the service. In terms of the personal information being handled, the customer is the controller as intended in information protection legislation and the service provider is the handler.

The customer's personal information is to be handled in the manner outlined in the agreement and this service description in order to provide and develop the services. Any other handling of the customer's personal information and its effect on costs in accordance with the General Data Protection Regulation are to be agreed upon separately between the parties to the agreement.

The provider or their subcontractor may collect data for the maintenance, improvement or analysis of the service. The provider reserves the right to use subcontractors in the production of their services and sub-handlers in the handling of personal information. The customer has the right to receive information on the provider's subcontractors and sub-handlers upon request.