Palo Alto Firewall Pcnsa V11 Training

0dayddl

U P L O A D E R

a93da5809b8a31167d22f08bfe1ae3c5.jpg

Palo Alto Firewall Pcnsa V11 Training
Published 10/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 14.14 GB | Duration: 19h 40m​

Learn Palo Alto Firewall PCNSA PAN-OS Version 11 with Step-by-Step Lab Workbook

What you'll learn

Introduction and Initial Configuration

Palo Alto Firewall Installation

Configure and work with Palo Alto Firewall

Palo Alto Firewall NAT configuration

Configuring security policies

Configuring security policies

Palo Alto Architecture

Managing Firewall Configurations

Interface Configuration

Managing Firewall Administrator Accounts

Security Zones

Different Zone Types

App-ID (Application Identity)

Security Profiles

URL Filtering

Encryption and Decryption

Monitoring and Reporting

Backup and Restore

Introduction to Panorama

Dynamic Updates

Requirements

Firewall Essentials: Configuration and Management (EDU-210) course

Palo Alto Firewall Version 11 Essentials Training

Description

PCNSA Version 11:Successful completion of this course should enhance the student's understanding of how to configure and manage Palo Alto Networks next-generation firewalls. The student should learn and get hands-on experience installing, configuring, managing, maintaining and monitoring Palo Alto Networks next-generation firewalls to protect the networks.PCNSA Course Description:This training is the most important course as it covers all the fundamentals to understand the Next-Generation Firewall from the ground up. Even experienced firewall engineers take a lot out of this course as it includes, besides the architecture and management essentials, topics like Application Identification, Content ID (IPS, Anti-Virus/-Spyware, URL Filtering, File Blocking), SSL Decryption and User Identification which are all features usually not supported by legacy firewalls.Outline:01. Introduction and Initial Configuration02. Palo Alto Architecture03. Configuring Initial Firewall Settings04. Managing Firewall Configurations05. Interface Configuration06. Managing Firewall Administrator Accounts07. Connecting Firewall to Production Networks08. Security Zones09. Different Zone Types10. Creating and Managing Security Policy Rules11. Creating and Managing NAT Policy Rules12. App-ID (Application Identity)13. Security Profiles14. Objects15. URL Filtering16. WildFire17. User-ID (User Identity)18. Encryption and Decryption19. Monitoring and Reporting20. Backup and Restore21. Introduction to Panorama22. Dynamic UpdatesProduct Versions:palo Alto Firewall Version 11.0.0Objectives:After completing this course, you should be able to:eek: Install and configure new Palo Alto Networks Next-Generation Firewalls.o Manage the Palo Alto Next-generation Firewall's configurations.o Configure the Firewall to connect to your production network.o Manage the Security Policy Rules used to protect your network.o Maintain and enhance the configuration of a virtual or logical router.o Create and apply security zones to policies.o Maintain firewall configurations.o Manage Network Address Translation (NAT) Rules.o Configure and manage Palo Alto Networks next-generation firewalls.o Configuring, managing, and monitoring a firewall in a lab environment.o Configure & manage essential features of Palo Alto next-generation firewalls.o Configure and manage Security and NAT policies to enable approved.o Configure and manage Threat Prevention strategies to block traffic.o Configure Policy based on application (App-ID) and user identity (User-ID).o Configure SSL Decryption on Firewall to inspect & control decrypted sessions.o Monitor network traffic using the interactive web interface and firewall reports.Prerequisites:Students must be familiar with networking concepts, including routing, switching, and IP addressing. Students also should be familiar with basic security concepts. Experience with other security technologies (IPS, proxy, and content filtering) is a plus. Recommended training includes the Firewall Essentials: Configuration and Management (EDU-210) course.Exam Blueprint:Management and Services 22%Managing Objects 20%Policy Evaluation and Management 28%Securing Traffic 30%

Overview

Section 1: Introduction

Lecture 1 PCNSA course Overview

Lecture 2 Basic Terminology

Lecture 3 CIA Triad Concepts

Lecture 4 Core Security Concepts

Section 2: Firewall Technologies

Lecture 5 Firewall Technologies Fundamentals

Lecture 6 Next Generation Firewalls

Lecture 7 Introduction to WAF

Lecture 8 Overview of Palo Alto Networks

Lecture 9 Zero Trust Security Principles

Lecture 10 Architecture of PA Firewalls

Section 3: EVE-NG LAB Setup

Lecture 11 Installing EVE-NG Version 6

Lecture 12 Adding SW images in EVE-NG

Lecture 13 Adding Other Images in EVE-NG

Lecture 14 Adding PA Firewall in EVE-NG

Lecture 15 Adding Panorama in EVE-NG

Lecture 16 Setting Up PCNSA Lab

Lecture 17 Importing Labs into EVE-NG

Section 4: Device & Network Configuration

Lecture 18 Configuring Devices

Lecture 19 Configuring DMZ Switch

Lecture 20 Configuring NTP Server

Lecture 21 Initial Configuration of PA

Lecture 22 Initial Configuration of HQ-FW

Lecture 23 Methods of Access PA Firewall

Lecture 24 Access PA Firewall Through API

Section 5: Palo Alto Networks Firewall

Lecture 25 PA Dashboard Walk-Through

Lecture 26 PA CLI Modes and Commands

Lecture 27 Configuring DNS & NTP in PA

Lecture 28 Concepts of Security Zones

Lecture 29 Practical Lab of Security Zones

Lecture 30 Concepts of Virtual Routers

Lecture 31 Practical Lab on Virtual Routers

Lecture 32 Interfaces of Palo Alto Firewall

Lecture 33 Layer 3 Network Interfaces

Lecture 34 PA Interface MGMT

Lecture 35 Practical Lab of VR Default Router

Lecture 36 Route Monitoring Overview

Lecture 37 Practical Lab of Path Monitoring

Section 6: Security Policies and NAT

Lecture 38 Concepts of Security Policies

Lecture 39 Practical Lab of Security Policies

Lecture 40 Understanding NAT

Lecture 41 Overview of Source NAT

Lecture 42 Overview of Destination NAT

Lecture 43 Practical Lab of Source NAT

Lecture 44 Practical Lab of Destination NAT

Section 7: SSL Decryption & Certificates

Lecture 45 SSL Decryption Overview

Lecture 46 Using Self-Signed Certificates

Lecture 47 Installing Certificate

Lecture 48 Practical Lab of Decryption Policies

Lecture 49 Verifying Decryption Policy

Section 8: Security Profiles

Lecture 50 Security Profiles Overview

Lecture 51 Security Profiles Deep Dive

Lecture 52 Practical Lab of Antivirus Profile

Lecture 53 Practical Lab of Anti-Spyware Profile

Lecture 54 Practical Lab of Vulnerability Profile

Lecture 55 Practical Lab of File Blocking Profile

Lecture 56 Practical Lab of WildFire Profile

Lecture 57 Practical Lab of Data Filtering Profile

Lecture 58 Security Group Overview

Lecture 59 Practical Lab on Security Groups

Section 9: URL Filtering Profile

Lecture 60 Overview of URL Filtering

Lecture 61 Malicious URLs Through Security Policy

Lecture 62 Malicious URLs Through URL Filtering

Lecture 63 Custom URL Category-Security Policy

Lecture 64 EDL to Block URL-Security Policy

Lecture 65 EDL & Custom URL-URL Filtering Profile

Section 10: DNS Security

Lecture 66 Overview of DNS Security

Lecture 67 Practical Lab of DNS Security

Section 11: APP-ID (Application Identification)

Lecture 68 Understanding App-ID

Lecture 69 App-ID Identification Methods

Lecture 70 App-ID Operation

Lecture 71 Application Shifts

Lecture 72 Application Window

Lecture 73 Dependent Applications

Lecture 74 Implicitly Use Application

Lecture 75 Application Groups

Lecture 76 Application Filters

Lecture 77 Application Block Page

Lecture 78 Identify Apps in SSL Traffic

Lecture 79 Policy Optimizer

Lecture 80 Application-ID Lab

Lecture 81 Port-Base to App-Base

Section 12: Tags and Groups

Lecture 82 Overview of Tags in PA

Lecture 83 Practical Lab of Tags

Lecture 84 Overview of Shadow Rule

Lecture 85 Static and Dynamic Group

Section 13: Service Route

Lecture 86 Overview of Service Route

Lecture 87 Service Route Configuration

Section 14: User-ID (User Identification)

Lecture 88 Overview of User-ID

Lecture 89 User Mapping Methods

Lecture 90 User-ID Agent Forms

Lecture 91 User-ID Operation DC

Lecture 92 Overview of Captive Portal

Lecture 93 Lab of Captive Portal

Lecture 94 AD Server Configuration

Lecture 95 Configuring Windows AD

Lecture 96 Configuring DNS Server

Lecture 97 User and Groups in AD

Lecture 98 PC1 Windows 11 Join AD

Lecture 99 Overview of User-ID Lab Setup

Lecture 100 Setting Up Service Account in AD

Lecture 101 Enable User-ID on The Inside Zone

Lecture 102 Configure LDAP Server Profile

Lecture 103 Configure User-ID Group Mapping

Lecture 104 Configure Integrated FW Agent

Lecture 105 Create User-ID Security Policy

Lecture 106 Test Security Policy with User-ID

Lecture 107 Verify The User-ID Configuration

Section 15: Administrator Accounts

Lecture 108 Overview of Administrator Accounts

Lecture 109 Administrator Roles

Lecture 110 Admin Authentication Methods

Lecture 111 Custom Admin Roles Lab

Lecture 112 Admin LDAP Authentication Lab

Lecture 113 Admin RADIUS Authentication Lab

Lecture 114 Admin Password Profiles

Lecture 115 Authentication Sequence

Section 16: Logs and Reports

Lecture 116 Palo Alto Firewall Logs

Lecture 117 Practical Lab of Logs

Lecture 118 Reports in PA Firewall Part-1

Lecture 119 Reports in PA Firewall Part-2

Lecture 120 Overview of Session Browser

Lecture 121 Overview of App Scope

Lecture 122 Dashboard for Recent Information

Lecture 123 ACC (Application Command Center) Tab

Security Analysts,Support Staff,Security Engineers,Security Administrators,Security Operations Specialists,Pre-sale System Engineers,System Admin,System Integrators,Resellers

RVNRuata_o.jpg


DDownload
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
RapidGator
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
FileStore
TurboBit
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
FileAxa
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
 
Kommentar

In der Börse ist nur das Erstellen von Download-Angeboten erlaubt! Ignorierst du das, wird dein Beitrag ohne Vorwarnung gelöscht. Ein Eintrag ist offline? Dann nutze bitte den Link  Offline melden . Möchtest du stattdessen etwas zu einem Download schreiben, dann nutze den Link  Kommentieren . Beide Links findest du immer unter jedem Eintrag/Download.

Data-Load.me | Data-Load.ing | Data-Load.to | Data-Load.in

Auf Data-Load.me findest du Links zu kostenlosen Downloads für Filme, Serien, Dokumentationen, Anime, Animation & Zeichentrick, Audio / Musik, Software und Dokumente / Ebooks / Zeitschriften. Wir sind deine Boerse für kostenlose Downloads!

Ist Data-Load legal?

Data-Load ist nicht illegal. Es werden keine zum Download angebotene Inhalte auf den Servern von Data-Load gespeichert.
Oben Unten