Traps 3.4: Install, Configure, and Manage

X

Contact Us

We would love to hear from you. Please complete this form to pre-book or request further information about our delivery options.

Subscribe

I'd like to receive emails with the latest updates and promotions from Insoft.

Data Protection & Privacy

I hereby allow Insoft Ltd. to contact me on this topic. Further, I authorise Insoft Ltd. processing, using collecting and storing my personal data for the purpose of these activities. All your data will be protected and secured as outlined in our privacy policy.


  • 2 Days Course
    Network Management/Design

    Classroom + Online

    Course Details

    The Traps: Install, Configure, and Manage training provides you with skills on Palo Alto Networks Traps Advanced Endpoint Protection and teaches you how to prevent sophisticated vulnerability exploits and unknown malware-driven attacks.

    The successful completion of this two-day, instructor-led course equips the student to install Traps in basic configurations.

     

    See other Palo Alto courses

    Objectives

    With the Palo Alto Traps training, students will learn how Traps protects against exploits and malware-driven attacks.

    In hands-on lab exercises, students will install and configure the Endpoint Security Manager (ESM) and Traps endpoint components; build rules; enable and disable process protections; and integrate Traps with Palo Alto Networks WildFireâ„¢, which provides prevention and detection of zero-day malware.

    Outline

    Module 1: Traps Overview

    • How sophisticated attacks work today
    • The design approach of Traps
    • Main features of Traps
    • Traps resources

    Module 2: Installing Traps

    • Planning the installation
    • Installing ESM Server and database
    • Installing the ESM Console
    • Installing agents
    • Managing content updates
    • Upgrading Traps

    Module 3: Malicious Software Overview

    • Exploitation techniques and their prevention
    • Malware techniques and their prevention

    Module 4: Consoles Overview

    • Introduction to ESM Console
    • Introduction to the Traps Agent Console

    Module 5: Traps Protection Against Exploits

    • Architecture and overview
    • Configuring exploit protection

    Module 6: Traps Protection Against Malware (including WildFire)

    • Architecture and Overview
    • WildFire
    • Local Analysis
    • Trusted Publishers
    • Malware Restrictions and Malware Protection Modules

    Module 7: Managing Traps

    • System monitoring
    • License administration
    • Important server and agent settings
    • Agent actions

    Module 8: Traps Forensics

    • Forensic information retrieval
    • Responding to prevention events

    Module 9: Basic Traps Troubleshooting

    • Troubleshooting Resources
    • Working with Technical Support
    • Troubleshooting scenarios

    Target Audience

    • Security Engineers, System Administrators, and Technical Support Engineers

    Prerequisites

    • Students must have Windows system administration skills and familiarity with enterprise security concepts