Takaisin

PaloAlto Firewall 8.1 Essentials: Configuration and management (EDU-210)

The Palo Alto Networks Firewall 8.0 Essentials: Configuration and Management (EDU-210) course is five days of instructor-led training that will enable you to: 

  • Configure and manage the essential features of Palo Alto Networks® nextgeneration firewalls
  • Configure and manage GlobalProtect to protect systems that are located outside of the data center perimeter
  • Configure and manage firewall high availability
  • Monitor network traffic using the interactive web interface and firewall reports.

Course Objectives

Successful completion of this five-day, instructor-led course will enhance the student’s understanding of how to configure and manage Palo Alto Networks® next-generation firewalls. The student will learn and get hands-on experience configuring, managing, and monitoring a firewall in a lab environment.

Scope

  • Course level: Introductory
  • Course duration: 5 days
  • Course format: Combines lecture and hands-on labs
  • Platform support: Palo Alto Networks® nextgeneration enterprise firewalls running the PAN-OS® operating system

 

Target Audience

Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, Network Engineers, and Support Staff Prerequisites Students must have a basic familiarity with networking concepts including routing, switching, and IP addressing. Students also should be familiar with basic security concepts. Experience with other security technologies (IPS, proxy, and content filtering) is a plus.

Prerequisites

Students must have a basic familiarity with networking concepts including routing, switching, and IP addressing. Students also should be familiar with basic security concepts. Experience with other security technologies (IPS, proxy, and content filtering) is a plus.

  • Module 1: NextGeneration Security Platform
  • Module 2: Virtual and Cloud Deployment
  • Module 3: Initial Configuration
  • Module 4: Interface Configuration
  • Module 5: Security and NAT Policies
  • Module 6: App-ID™
  • Module 7: Content-ID™
  • Module 8: Filtering
  • Module 9: Decryption
  • Module 10: Wildfire
  • Module 11: User-ID™
  • Module 12: GlobalProtect™
  • Module 13: Site-to-Site VPNs
  • Module 14: Monitoring and Reporting
  • Module 15: Active/Passive High Availability
  • Module 16: NextGeneration Security Practices

Exclusive Networks

Kurssi järjestetään yhteistyössä Exclusive Networksin kanssa Spektri Business Parkissa.

Ilmoittaudu kurssille

Tietosuoja

Palvelussa voidaan käsitellä Elisan tietosuojaperiaatteissa kuvattuja henkilötietoja, kuten esimerkiksi nimi, yhteystiedot ja palvelun käyttöön liittyvät tiedot. Elisa on palvelussa käsiteltävien henkilötietojen osalta tietosuojalainsäädännössä tarkoitettu henkilötietojen rekisterinpitäjä.

Elisa käsittelee rekisterinpitäjänä henkilötietoja kulloinkin voimassaolevien tietosuojaperiaatteiden mukaisesti (https://elisa.fi/sopimusehdot) ja (https://elisa.fi/tietosuoja).

Elisalla on oikeus käyttää palveluiden tuottamisessa ja henkilötietojen käsittelyssä alihankkijoita.

English:

When using the service, the following types of personal information may be handled; name and contact information, employee information and other information from the client company, end user information, information related to use of the service and customer satisfaction information. This information is needed for the maintenance and development of the service. In terms of the personal information being handled, the customer is the controller as intended in information protection legislation and the service provider is the handler.

The customer's personal information is to be handled in the manner outlined in the agreement and this service description in order to provide and develop the services. Any other handling of the customer's personal information and its effect on costs in accordance with the General Data Protection Regulation are to be agreed upon separately between the parties to the agreement.

The provider or their subcontractor may collect data for the maintenance, improvement or analysis of the service. The provider reserves the right to use subcontractors in the production of their services and sub-handlers in the handling of personal information. The customer has the right to receive information on the provider's subcontractors and sub-handlers upon request.