Takaisin

PaloAlto Firewall 10.0: Improving Security Posture and Hardening PAN-OS Firewalls (EDU-214)

Successful completion of this three-day, instructor-led course will assist the student in being able to manage and maintain an existing Palo Alto Networks Firewall protected environment. The student will learn how to improve non-greenfield environments and will be better equipped at ensuring configurations match security best practice. The student will also be able to develop their own operational strategy to maintain a high level of compliance.

The Palo Alto Networks Firewall 10.0: Improving Security Posture and Hardening PAN-OS (EDU-214) course is three days of
instructor-led training that will help you to:

  • Determine the efficacy of your current security policies
  • Develop workflows for managing your security posture
  • Identify rule usage across security policy sets
  • Modify your existing policy set to implement Security Best Practices
  • Monitor network traffic using the interactive web interface and firewall reports
  • Utilize tools such as the BPA tool to further understand your environment

Scope

• Course level: Intermediate

• Course format: Combines lecture and hands-on labs

• Platform support: Palo Alto Networks® nextgeneration enterprise firewalls running the PAN-OS® operating system

Target Audience

Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, Network Engineers, and Support Staff

Prerequisites

Students must have completed the “Firewall Essentials: Configuration and Management” course. Students also should be familiar with basic security concepts. Experience with other security technologies (IPS, proxy, and content filtering) is an
advantage.

Course Modules
1 - Introduction
2 – Security Profile Revision
3 – Daily Operations and Maintenance
4 – Establish Initial Baseline Visibility
5 – Analyze and Update Security Rules Passing Traffic
6 – Inbound Security Rules Best Practices and Analysis
7 - Outbound Security Rules Best Practices and Analysis
8 - Internal Security Rules Best Practices and Analysis
9 – Administratively Hardening PAN-OS
10 – Reducing Policy set and Simplification

 

Exclusive Networks

Kurssi järjestetään yhteistyössä Exclusive Networksin kanssa. Kurssipaikan osoite on Metsänneidonkuja 12, 02130 Espoo.

Ilmoittaudu kurssille

Tietosuoja

Palvelussa voidaan käsitellä Elisan tietosuojaperiaatteissa kuvattuja henkilötietoja, kuten esimerkiksi nimi, yhteystiedot ja palvelun käyttöön liittyvät tiedot. Elisa on palvelussa käsiteltävien henkilötietojen osalta tietosuojalainsäädännössä tarkoitettu henkilötietojen rekisterinpitäjä.

Elisa käsittelee rekisterinpitäjänä henkilötietoja kulloinkin voimassaolevien tietosuojaperiaatteiden mukaisesti (https://elisa.fi/sopimusehdot) ja (https://elisa.fi/tietosuoja).

Elisalla on oikeus käyttää palveluiden tuottamisessa ja henkilötietojen käsittelyssä alihankkijoita.

English:

When using the service, the following types of personal information may be handled; name and contact information, employee information and other information from the client company, end user information, information related to use of the service and customer satisfaction information. This information is needed for the maintenance and development of the service. In terms of the personal information being handled, the customer is the controller as intended in information protection legislation and the service provider is the handler.

The customer's personal information is to be handled in the manner outlined in the agreement and this service description in order to provide and develop the services. Any other handling of the customer's personal information and its effect on costs in accordance with the General Data Protection Regulation are to be agreed upon separately between the parties to the agreement.

The provider or their subcontractor may collect data for the maintenance, improvement or analysis of the service. The provider reserves the right to use subcontractors in the production of their services and sub-handlers in the handling of personal information. The customer has the right to receive information on the provider's subcontractors and sub-handlers upon request.