Firewall: Optimizing FireWall Threat Prevention (EDU-214)
Live Instructor-led training
The EDU-214 is a 8 half day course (4 days x 2)
Successful completion of this course will enhance the student’s understanding of how to better configure, manage, and monitor PAN-OS® threat prevention features. The student will get hands-on experience configuring, managing, and monitoring threat prevention features in a lab environment.
Best Practices & Real Life Experience
All of our instructors are security consultants that design, implement, migrate, manage and support Palo Alto Networks solutions all day, every day. It's this experience which they bring into the classroom to explain not only the theory but how to use the FireWall in real-life. Customers tell us that this is most valuable for them and what differentiates our training from most other training partners.
It's impossible to remember everything in live training, which is why we are recording it and share the video with you. If you like to start studying right away, then we can even share the videos of a previous course.
Dedicated Lab Access
You will have access to your own dedicated lab for the week of the training plus the week after. Your virtual lab consists of a Windows Client, Palo Alto Networks FireWall and DMZ Linux Server with a lab guide for practical exercises. As a bonus, which is not officially part of the course, your lab features the Expedition Migration Tool and Minemeld.
It is possible to get additional three months of lab access. The price for this is €150,-.
Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, Network Engineers, and Support Staff
The purpose of the course
Describe the cyber-attack lifecycle and recognize common forms of attack
Describe PAN-OS® threat prevention capabilities
Use firewall logs and reports to make better configuration decisions
Configure the firewall to detect, block, and record threats
Module 1: The Cyber-Attack Lifecycle
Module 2: Blocking Packet- and Protocol-Based Attacks
Module 3: Blocking Threats from Known-Bad Sources
Module 4: Blocking Threats Using App-ID™
Module 5: Blocking Threats Using Custom Signatures
Module 6: Creating Custom Threat Signatures
Module 7: Blocking Threats in Encrypted Traffic
Module 8: Blocking Threats in Allowed Traffic
Module 9: Authenticating Firewall User Accounts
Module 10: Blocking Threats from Phishing and Stolen Credentials
Module 11: Viewing Threat and Traffic Information
Participants must complete the Firewall Essentials: Configuration and Management course, or have equivalent experience. Students must have a basic familiarity with networking concepts including routing, switching, and IP addressing.
For mer informasjon
Kontakt Kristin Eilertsen, mobil 99 55 77 19 eller email@example.com