Add to Wishlist

PALO ALTO Firewall Advance Training online

Get course

Palo Alto course in Delhi/ncr. Best training of Palo Alto is provided by NG Networks. This program is specially designed for the network engineer to become a competent L2 & L2+ network security resource. The program is designed based on the generic skills set as an L2 & L2+ should possess.

Duration

WeeklyMon-Fri2 hours1 Month
WeekendSat-sun4 hours1.5 months

 

Objectives

Successful completion of this course should enhance the participant’s understanding of how to configure and manage Palo Alto Networks next-generation firewalls. The student should learn and get hands-on experience configuring, managing, and monitoring a firewall in a lab environment.

Prerequisite

  • Participants must have a basic familiarity with networking concepts including routing, switching, and IP addressing. Students also should be familiar with basic security concepts. Experience with other security technologies (IPS, proxy, and content filtering) is a plus.

FREE DEMO CLASSES

1
Introduction To NG Networks
7 Minutes
2
Introdution to PALO ALTO Firewall

PAID CLASSES

Understanding Firewall Fundamentals

1
Firewall Intro, Packet Filtering, Proxy Server, Stateful

Understanding Palo Alto Firewall Basics

1
Integrate the Firewall into Your Management Network
2
Register the Firewall
3
Activate Licenses and Subscriptions
4
Install Content and Software Updates
5
Interfaces and Zones
6
Set Up a Basic Security Policy
7
Assess Network Traffic
8
Monitor Network Traffic
9
Enable Basic Threat Prevention Features
10
Enable Basic WildFire Forwarding
11
Scan Traffic for Threats
12
Control Access to Web Content

Firewall Administration

1
Management Interfaces
2
Launch the Web Interface
3
Configure Banners, Message of the Day, and Logos
4
Commit, Validate, and Preview Firewall Configuration Changes
5
Manage Locks for Restricting Configuration Changes
6
Manage Locks for Restricting Configuration Changes
7
Manage Firewall Administrators (Admin Roles, Profile, Types, Account create
8
Use Global Find to Search the Firewall or Panorama Management Server
9
Configure an Admin Role Profile
10
Administrative Authentication
11
Configure Administrative Accounts and Authentication
12
Configure an Administrative Account
13
Reference: Port Number Usage
14
Ports Used for Management Functions
15
Ports Used for HA
16
Ports Used for Global Protect
17
Ports Used for User-ID
18
Reset the Firewall to Factory Default Settings

Authentication

1
Configure an Authentication Profile and Sequence
2
Local Database Authentication Profile
3
RADIUS Authentication Profile
4
TACACS Authentication Profile
5
LDAP Authentication Profile

Certificate Management

1
Obtain Certificates
2
Create a Self-Signed Root CA Certificate
3
Generate a Certificate
4
Import a Certificate and Private Key
5
Configure a Certificate Profile
6
Configure an SSL/TLS Service Profile
7
Obtain a Certificate from an External CA

High Availability

1
HA Overview.
2
HA Concepts
3
HA Modes
4
HA Links and Backup Links
5
HA Failover
6
Set Up Active/Passive HA
7
Prerequisites for Active/Passive HA
8
Configuration Guidelines for Active/Passive HA
9
Configure Active/Passive HA
10
Define HA Failover Conditions
11
Verify Failover
12
Set Up Active/Active HA
13
Prerequisites for Active/Active HA
14
Configure Active/Active HA

Monitoring

1
Use the Dashboard
2
Use the Application Command Centre
3
ACC—First Look
4
ACC Tabs
5
ACC Widgets
6
Widget Descriptions
7
ACC Filters
8
Interact with the ACC
9
Use Case: ACC—Path of Information Discovery
10
App Scope
11
PDF Reports (Threat, Change, Network, Traffic)
12
Manage PDF Summary Reports
13
Packet Capture
14
Monitor Applications and Threats
15
Monitor and Manage Logs (Threat, Traffic, URL, etc.)
16
Manage Reporting
17
Use External Services for Monitoring
18
Configure Log Forwarding
19
Configure Email Alerts
20
Configure Syslog
21
SNMP Monitoring and Traps.

User-ID

1
User-ID Overview
2
User-ID Concepts
3
Enable User-ID
4
Group Mapping
5
User Mapping
6
Map Users to Groups
7
Enable Policy for Users with Multiple Accounts
8
Verify the User-ID Configuration
9
Configure User Mapping Using the Windows User-ID Agent
10
Configure User Mapping Using the PAN-OS Integrated User-ID Agent
11
Enable User- and Group-Based Policy

App-ID

1
App-ID Overview
2
Manage Custom or Unknown Applications
3
Use Application Objects in Policy
4
Create an Application Group
5
Create an Application Filter
6
Create a Custom Application
7
Create an Application Group
8
Create a Custom Application
9
Review New App-IDs
10
Disable or Enable App-IDs

Threat Prevention

1
Set Up Security Profiles and Policies
2
Set Up Antivirus, Anti-Spyware, and Vulnerability Protection
3
Set Up Data Filtering
4
Set Up File Blocking
5
Prevent Brute Force Attacks
6
DNS Sinkholing
7
Configure DNS Sinkholing
8
DoS Protection against Flooding of New Sessions
9
Configure DoS Protection against Flooding of New Sessions

Decryption

1
Decryption Overview
2
Decryption Concepts
3
Keys and Certificates for Decryption Policies
4
SSL Forward Proxy
5
SSL Inbound Inspection
6
SSH Proxy
7
Define Traffic to Decrypt
8
Create a Decryption Profile
9
Create a Decryption Policy Rule

URL Filtering

1
URL Filtering Concepts
2
URL Categories
3
URL Filtering Profile
4
URL Filtering Profile Actions
5
URL Category Exception Lists
6
Basic Guidelines for URL Category Exception Lists
7
External Dynamic List for URLs
8
Configure URL Filtering
9
Customize the URL Filtering Response Pages
10
Configure URL Admin Override
11
Troubleshoot URL Filtering
12
Use an External Dynamic List in a URL Filtering Profile
13
Monitor Web Activity
14
Determine URL Filtering Policy Requirements

Quality of Service

1
QoS Overview
2
QoS Concepts
3
Configure QoS
4
QoS for Applications and Users QoS Policy
5
QoS Profile
6
QoS Classes

VPN

1
VPN Deployments
2
Site-to-Site VPN Overview
3
Site-to-Site VPN Concepts
4
IKE Gateway
5
Tunnel Interface
6
Tunnel Monitoring
7
Internet Key Exchange (IKE) for VPN
8
IKEv2
9
Set Up Site-to-Site VPN
10
Site-to-Site VPN Quick Configuration

Networking

1
Interface Deployments
2
Virtual Wire Deployments
3
Layer 2 Deployments Layer 3 Deployments
4
Tap Mode Deployments
5
Use Interface Management Profiles to Restrict Access Virtual Routers
6
Static Routes
7
DHCP
8
DHCP Overview
9
Firewall as a DHCP Server and Client
10
DNS
11
DNS Overview
12
DNS Proxy Object
13
DNS Server Profile

Network Address Translation

1
NAT Policy Rules
2
Source NAT and Destination NAT
3
NAT Rule Capacities
4
Dynamic IP and Port NAT
5
NAT Configuration
6
U-Turn NAT
7
PAT

Policy

1
Policy Types
2
Security Policy
3
Components of a Security Policy Rule
4
Security Policy Actions
5
Create a Security Policy Rule
6
Policy Objects
7
Security Profile
8
Antivirus Profiles
9
Anti-Spyware Profiles
10
Vulnerability Protection Profiles
11
URL Filtering Profiles
12
Data Filtering Profiles
13
File Blocking Profiles
14
WildFire Analysis Profiles
15
DoS Protection Profiles
16
Zone Protection Profiles
17
Security Profile Group
18
Best Practice for Security policies
19
Policy-Based Forwarding
20
PBF
21
Create a Policy-Based Forwarding Rule

Setup

Global Protect

1
OS Upgrade
2
Software Upgrade
3
Global Protect Updates
4
Licences
5
Config Audit
6
GP Portal Configuration
7
GP Gateway Configuration
8
HIP profile Configuration
Well, you can never miss any single class with NG Networks. When learners miss their live online session then we provide pre-recorded lectures to the students so that they can learn whenever they have time.
Yes, we will help you grab the job as per your calibre as we offer placement assistance facility. We will build your professional resume and help in the hunt for the best opportunities for you.
We offer 24*7 Support to all students for a lifetime. So you can ask your question whenever you have any doubt.
For complete access, you need to sign up and enroll yourself for the course. As soon as you successfully enroll yourself for a complete course, you will get access to lectures videos, notes, presentations, worksheet, and assessment papers of the course. Even you will get 24X7 help and support so that you can clear your doubts anytime.
Yes, you can access the content whenever you want as the access is permitted for a lifetime.
Each course is packed with lecture videos, online classroom training sessions, study notes, slides, quizzes, assessments question and some additional resources. To enhance learner’s experience we also offer 24X7 support so that he can clear his doubts, whenever he wants.
Yes! If you have a doubt about our course quality then you can start with a course preview option and watch a few lectures before going for the complete access.
In case if you are not satisfied with the course content then you can ask for a refund within 7 days of purchase. Kindly note that the refund will not be applicable in the following situations: • Requesting refund beyond 7 days of purchase • Accessed more than 25% of the course content • Downloaded the course content • Attended online classroom sessions for more than 1 day
No announcements at this moment.

Be the first to add a review.

Please, login to leave a review