Firewall: Optimizing FireWall Threat Prevention (EDU-214)

Live Instructor-led training
The EDU-214 is a 5 half day course


Successful completion of this course will enhance the student’s understanding of how to better configure, manage, and monitor PAN-OS® threat prevention features. The student will get hands-on experience configuring, managing, and monitoring threat prevention features in a lab environment.

Best Practices & Real Life Experience 

All of our instructors are security consultants that design, implement, migrate, manage and support Palo Alto Networks solutions all day, every day. It's this experience which they bring into the classroom to explain not only the theory but how to use the FireWall in real-life. Customers tell us that this is most valuable for them and what differentiates our training from most other training partners.


Video Recordings 

It's impossible to remember everything in live training, which is why we are recording it and share the video with you. If you like to start studying right away, then we can even share the videos of a previous course. 


Dedicated Lab Access

You will have access to your own dedicated lab for the week of the training plus the week after. Your virtual lab consists of a Windows Client, Palo Alto Networks FireWall and DMZ Linux Server with a lab guide for practical exercises. As a bonus, which is not officially part of the course, your lab features the Expedition Migration Tool and Minemeld.

It is possible to get additional three months of lab access. The price for this is €150,-.

Course datasheet


Target group

Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, Network Engineers, and Support Staff


The purpose of the course

  • Describe the cyber-attack lifecycle and recognize common forms of attack

  • Describe PAN-OS® threat prevention capabilities

  • Use firewall logs and reports to make better configuration decisions

  • Configure the firewall to detect, block, and record threats



Module 1: The Cyber-Attack Lifecycle

Module 2: Blocking Packet- and Protocol-Based Attacks

Module 3: Blocking Threats from Known-Bad Sources

Module 4: Blocking Threats Using App-ID™

Module 5: Blocking Threats Using Custom Signatures

Module 6: Creating Custom Threat Signatures

Module 7: Blocking Threats in Encrypted Traffic

Module 8: Blocking Threats in Allowed Traffic

Module 9: Authenticating Firewall User Accounts

Module 10: Blocking Threats from Phishing and Stolen Credentials

Module 11: Viewing Threat and Traffic Information



Participants must complete the Firewall Essentials: Configuration and Management course, or have equivalent experience. Students must have a basic familiarity with networking concepts including routing, switching, and IP addressing.


For mer informasjon

Kontakt Kristin Eilertsen, mobil 99 55 77 19 eller



Trykk her for påmelding



Praktisk informasjon

01.03 - 05.03
24.05 - 28.05
Kurs mars: 15.00 - 19.00
Kurs mai: 15.00-19.00

Flere kurs