Takaisin

PaloAlto Firewall 8.1: Optimizing Firewall Threat Prevention (EDU-214)

UUTUUS! The Palo Alto Networks Firewall 8.1: Optimizing Firewall Threat Prevention (EDU-214) course is four days of instructor-led training that emphasizes the PAN-OS® threat prevention capabilities. After completing this course, you should be able to:

  • Describe the cyber-attack lifecycle and recognize common forms of attack
  • Describe PAN-OS® threat prevention capabilities
  • Use firewall log information to make better configuration decisions
  • Configure the firewall to detect, block, and record threats

Course Objectives

Successful completion of this four-day, instructor-led course will enhance the student’s understanding of how to better configure, manage, and monitor PAN-OS® threat prevention features. The student will get hands-on experience configuring, managing, and monitoring threat prevention features in a lab environment.

Scope

• Course level: Intermediate

• Course format: Combines lecture and hands-on labs

• Platform support: Palo Alto Networks® nextgeneration enterprise firewalls running the PAN-OS® operating system

Target Audience

Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, Network Engineers, and Support Staff

Prerequisites

Participants must complete the Firewall 8.1 Essentials: Configuration and Management course, or equivalent experience. Students must have a basic familiarity with networking concepts including routing, switching, and IP addressing.

Module 1: The Cyber-Attack Lifecycle

Module 2: Blocking Packet- and Protocol-Based Attacks

Module 3: Blocking Threats from Known-Bad Sources

Module 4: Blocking Threats Using AppID™

Module 5: Blocking Threats Using Custom Signatures

Module 6: Creating Custom Threat Signatures

Module 7: Blocking Threats in Encrypted Traffic

Module 8: Blocking Threats in Allowed Traffic

Module 9: Authenticating Firewall User Accounts

Module 10: Blocking Threats from Phishing and Stolen Credentials

Module 11: Viewing Threat and Traffic Information

 

Näytä lisää Sulje
Exclusive Networks

Kurssi järjestetään yhteistyössä Exclusive Networksin kanssa Spektri Business Parkissa.

Ilmoittaudu kurssille

Tietosuoja

Palvelussa voidaan käsitellä Elisan tietosuojaperiaatteissa kuvattuja henkilötietoja, kuten esimerkiksi nimi, yhteystiedot ja palvelun käyttöön liittyvät tiedot. Elisa on palvelussa käsiteltävien henkilötietojen osalta tietosuojalainsäädännössä tarkoitettu henkilötietojen rekisterinpitäjä.

Elisa käsittelee rekisterinpitäjänä henkilötietoja kulloinkin voimassaolevien tietosuojaperiaatteiden mukaisesti (https://elisa.fi/sopimusehdot) ja (https://elisa.fi/tietosuoja).

Elisalla on oikeus käyttää palveluiden tuottamisessa ja henkilötietojen käsittelyssä alihankkijoita.

English:

When using the service, the following types of personal information may be handled; name and contact information, employee information and other information from the client company, end user information, information related to use of the service and customer satisfaction information. This information is needed for the maintenance and development of the service. In terms of the personal information being handled, the customer is the controller as intended in information protection legislation and the service provider is the handler.

The customer's personal information is to be handled in the manner outlined in the agreement and this service description in order to provide and develop the services. Any other handling of the customer's personal information and its effect on costs in accordance with the General Data Protection Regulation are to be agreed upon separately between the parties to the agreement.

The provider or their subcontractor may collect data for the maintenance, improvement or analysis of the service. The provider reserves the right to use subcontractors in the production of their services and sub-handlers in the handling of personal information. The customer has the right to receive information on the provider's subcontractors and sub-handlers upon request.