Firewall Essentials: Configuration and Management (EDU-210)

X

Contact Us

We would love to hear from you. Please complete this form to pre-book or request further information about our delivery options.

Subscribe

I'd like to receive emails with the latest updates and promotions from Insoft.

Data Protection & Privacy

I hereby allow Insoft Ltd. to contact me on this topic. Further, I authorise Insoft Ltd. processing, using collecting and storing my personal data for the purpose of these activities. All your data will be protected and secured as outlined in our privacy policy.


Upcoming Dates


Sep 19 - Sep 23, 2022
09:00 - 17:00
Online

Oct 17 - Oct 21, 2022
09:00 - 17:00
Online

Nov 21 - Nov 25, 2022
09:00 - 17:00
Online

Dec 12 - Dec 16, 2022
09:00 - 17:00
Online

Jan 9 - Jan 13, 2023
09:00 - 17:00
Online

Feb 6 - Feb 10, 2023
09:00 - 17:00
Online

Firewall Essentials: Configuration and Management (EDU-210)
5 days  (Instructor Led Online)  |  Network Security

Course Details

(EDU-210) Firewall Essentials: Configuration and Management helps you to:

  • Configure and manage the essential features of Palo Alto Networks next-generation firewalls
  • Configure and manage Security and NAT policies to enable approved traffic to and from zones
  • Configure and manage Threat Prevention strategies to block traffic from known and unknown IP addresses, domains, and URLs
  • Monitor network traffic using the interactive web interface and firewall reports

Objectives

Successful completion enhances participants’ understanding of how to configure and manage Palo Alto Networks Next-Generation Firewalls. The course includes hands-on experience configuring, managing, and monitoring a firewall in a lab environment.

Outline

  • Palo Alto Networks Portfolio and Architecture
  • Configuring Initial Firewall Settings
  • Managing Firewall Configurations
  • Managing Firewall Administrator Accounts
  • Connecting the Firewall to Production Networks with Security Zones
  • Creating and Managing Security Policy Rules
  • Creating and Managing NAT Policy Rules
  • Controlling Application Usage with App-ID
  • Blocking Known Threats Using Security Profiles
  • Blocking Inappropriate Web Traffic with URL Filtering
  • Blocking Unknown Threats with Wildfire
  • Controlling Access to Network Resources with User-ID
  • Using Decryption to Block Threats in Encrypted Traffic
  • Locating Valuable Information Using Logs and Reports
  • What’s Next in Your Training and Certification Journey
Appendix A – Securing Endpoints with GlobalProtect
Appendix B – Providing Firewall Redundancy with High Availability
Appendix C – Connecting Remotes Sites using VPNs
Appendix D – Configuring User-ID Windows Agent

Target Audience

  • Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, and Support Staff

Prerequisites

  • Participants must have a basic familiarity with networking concepts including routing, switching, and IP addressing. Students also should be familiar with basic security concepts. Experience with other security technologies (IPS, proxy, and content filtering) is a plus.