instructor-led training

(EDU-210) Firewall Essentials: Configuration and Management

Level
Introductory
Duration
5 Days
Format
Instructor-Led Training
Supported Platforms
Palo Alto Networks Next-Generation Firewalls

(EDU-210) Firewall Essentials: Configuration and Management helps you to:

  • Configure and manage the essential features of Palo Alto Networks next-generation firewalls
  • Configure and manage Security and NAT policies to enable approved traffic to and from zones
  • Configure and manage Threat Prevention strategies to block traffic from known and unknown IP addresses, domains, and URLs
  • Monitor network traffic using the interactive web interface and firewall reports

Objectives

Successful completion enhances participants’ understanding of how to configure and manage Palo Alto Networks Next-Generation Firewalls. The course includes hands-on experience configuring, managing, and monitoring a firewall in a lab environment.

Target Audience

Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, and Support Staff

Prerequisites

Participants must have a basic familiarity with networking concepts including routing, switching, and IP addressing. Students also should be familiar with basic security concepts. Experience with other security technologies (IPS, proxy, and content filtering) is a plus.

Training credit information

Palo Alto Networks Training Credits allow you a single point of purchase for training for use throughout the year. Training credits are redeemable by all employees within an organization for any Palo Alto Networks open enrollment, private on-site, or online course offered by our Authorized Training Partners (ATPs).

Course Modules

  1. Palo Alto Networks Portfolio and Architecture
  2. Configuring Initial Firewall Settings
  3. Managing Firewall Configurations
  4. Managing Firewall Administrator Accounts
  5. Connecting the Firewall to Production Networks with Security Zones
  6. Creating and Managing Security Policy Rules
  7. Creating and Managing NAT Policy Rules
  8. Controlling Application Usage with App-ID
  9. Blocking Known Threats Using Security Profiles
  10. Blocking Inappropriate Web Traffic with URL Filtering
  11. Blocking Unknown Threats with Wildfire
  12. Controlling Access to Network Resources with User-ID
  13. Using Decryption to Block Threats in Encrypted Traffic
  14. Locating Valuable Information Using Logs and Reports
  15. What's Next in Your Training and Certification Journey

Supplemental Materials:
Securing Endpoints with GlobalProtect
Providing Firewall Redundancy with High Availability
Connecting Remote Sites using VPNs
Blocking Common Attacks Using Zone Protection

Authorized Training Partners

Europe

Europe, Middle East, Africa

Secure Shield

Want updates and announcements?