top of page
top

Home >>

EDU-210

EDU-210

Firewall Essentials: Configuration and Management

pan_gatp_logo_in-cooperation.jpg

Price
Duration

USD 3,290 excl. VAT

5 days

network.jpeg
“Fast Lane is an Authorized Global Training Partner in cooperation with Consigas”.

Who Should Attend

Security Engineers, Security Administrators, Security Operations Specialists,

Security Analysts, and Support Staff

What you will learn

What you will Learn

The Palo Alto Networks Firewall Essentials: Configuration and Management (EDU-210) course is five days of instructor-led training that will help you to:
• Configure and manage the essential features of Palo Alto Networks next-generation firewalls

• Configure and manage Security and NAT policies to enable approved traffic to and from zones
• Configure and manage Threat Prevention strategies to block traffic from known and unknown IP addresses, domains, and URLs
• Monitor network traffic using the interactive web interface and firewall reports

Prerequisits

Prerequisites

Students must be familiar with networking concepts, including routing, switching, and IP addressing. Students also should be familiar with

basic security concepts. Experience with other security technologies (IPS, proxy, and content filtering) is a plus

Objectives

Course Objectives

Successful completion of this five-day, instructor-led course should enhance the student’s understanding of configuring and managing Palo Alto Networks Next-Generation Firewalls.

The course includes hands-on experience configuring, managing, and monitoring a firewall in a lab environment.

Outlines

Course Outline

1 - Palo Alto Networks Portfolio and Architecture
2 - Configuring Initial Firewall Settings
3 - Managing Firewall Configurations
4 - Managing Firewall Administrator Accounts
5 - Connecting the Firewall to Production Networks with Security Zones
6 - Creating and Managing Security Policy Rules
7 - Creating and Managing NAT Policy Rules
8 - Controlling Application Usage with App-ID
9 - Blocking Known Threats Using Security Profiles

10 - Blocking Inappropriate Web Traffic with URL Filtering
11 - Blocking Unknown Threats with Wildfire
12 - Controlling Access to Network Resources with User-ID
13 - Using Decryption to Block Threats in Encrypted Traffic Supplemental Materials Securing Endpoints with GlobalProtect Scope
14 - Locating Valuable Information Using Logs and Reports
15 - What's Next in Your Training and Certification Journey Providing Firewall Redundancy with High Availability Connecting Remotes Sites using VPNs Blocking Common Attacks Using Zone Protection

Schedule
pan_gatp_logo_in-cooperation.jpg
pan_gatp_logo_in-cooperation.jpg
pan_gatp_logo_in-cooperation.jpg
pan_gatp_logo_in-cooperation.jpg
pan_gatp_logo_in-cooperation.jpg
pan_gatp_logo_in-cooperation.jpg
reg1
Anchor 1
Anchor 1

Thanks for registering. our team will contact you soon !

Registration

ILT/VILT

Thanks for registering. our team will contact you soon !

Registration

ILT/VILT

Thanks for registering. our team will contact you soon !

Registration

ILT/VILT

Thanks for registering. our team will contact you soon !

Registration

ILT/VILT

Thanks for registering. our team will contact you soon !

Registration

ILT/VILT

Thanks for registering. our team will contact you soon !

Registration

ILT/VILT
bottom of page