Firewall 11.1 Essentials: Configuration and Management
(EDU-210)
The Palo Alto Networks Firewall Essentials: Configuration and Management (EDU-210) course is five days of instructor-led training that will help you to:
- Configure and manage the essential features of Palo Alto Networks next-generation firewalls
- Configure and manage Security and NAT policies to enable approved traffic to and from zones
- Configure and manage Threat Prevention strategies to block traffic from known and unknown IP addresses, domains, and URLs
- Monitor network traffic using the interactive web interface and firewall reports
Objectives
Successful completion of this five-day, instructor-led course should enhance the student’s understanding of how to configure and manage Palo Alto Networks Next-Generation Firewalls. The course includes hands-on experience configuring, managing, and monitoring a firewall in a lab environment.
Target Audience
- Security Engineers
- Security Administrators
- Security Operations Specialists
- Security Analysts
- Support Staff
Prerequisites
- Participants must be familiar with networking concepts, including routing, switching, and IP addressing.
- Participants also should be familiar with basic security concepts.
- Experience with other security technologies (IPS, proxy, and content filtering) is a plus.
Scope
- Level: Introductory
- Duration: 5 days
- Format: Lecture and hands-on labs
- Platform support: Palo Alto Networks next-generation firewalls running the PAN-OS® 11.1 operating system
Course Modules
- - Palo Alto Networks Portfolio and Architecture
- - Configuring Initial Firewall Settings
- - Managing Firewall Configurations
- - Managing Firewall Administrator Accounts
- - Connecting the Firewall to Production Networks with Security Zones
- - Creating and Managing Security Policy Rules
- - Creating and Managing NAT Policy Rules
- - Controlling Application Usage with App-ID
- - Blocking Known Threats Using Security Profiles
- - Blocking Inappropriate Web Traffic with URL Filtering
- - Blocking Unknown Threats with Wildfire
- - Controlling Access to Network Resources with User-ID
- - Using Decryption to Block Threats in Encrypted Traffic
- - Locating Valuable Information Using Logs and Reports
- - What's Next in Your Training and Certification Journey
Supplemental Materials
- Securing Endpoints with GlobalProtect
- Providing Firewall Redundancy with High Availability
- Connecting Remotes Sites using VPNs
- Blocking Common Attacks Using Zone Protection