Firewall 11.1 Essentials: Configuration and Management (EDU-210)

The Palo Alto Networks Firewall Essentials: Configuration and Management (EDU-210) course is five days of instructor-led training that will help you to:

  • Configure and manage the essential features of Palo Alto Networks next-generation firewalls
  • Configure and manage Security and NAT policies to enable approved traffic to and from zones
  • Configure and manage Threat Prevention strategies to block traffic from known and unknown IP addresses, domains, and URLs
  • Monitor network traffic using the interactive web interface and firewall reports


Objectives

Successful completion of this five-day, instructor-led course should enhance the student’s understanding of how to configure and manage Palo Alto Networks Next-Generation Firewalls. The course includes hands-on experience configuring, managing, and monitoring a firewall in a lab environment.


Target Audience

  • Security Engineers
  • Security Administrators
  • Security Operations Specialists
  • Security Analysts
  • Support Staff 


Prerequisites

  • Participants must be familiar with networking concepts, including routing, switching, and IP addressing.
  • Participants also should be familiar with basic security concepts.
  • Experience with other security technologies (IPS, proxy, and content filtering) is a plus. 


Scope

  • Level: Introductory
  • Duration: 5 days
  • Format: Lecture and hands-on labs
  • Platform support: Palo Alto Networks next-generation firewalls running the PAN-OS® 11.1 operating system 
Show details


Course Modules

  1. - Palo Alto Networks Portfolio and Architecture
  2. - Configuring Initial Firewall Settings
  3. - Managing Firewall Configurations
  4. - Managing Firewall Administrator Accounts
  5. - Connecting the Firewall to Production Networks with Security Zones
  6. - Creating and Managing Security Policy Rules
  7. - Creating and Managing NAT Policy Rules
  8. - Controlling Application Usage with App-ID
  9. - Blocking Known Threats Using Security Profiles
  10. - Blocking Inappropriate Web Traffic with URL Filtering
  11. - Blocking Unknown Threats with Wildfire
  12. - Controlling Access to Network Resources with User-ID
  13. - Using Decryption to Block Threats in Encrypted Traffic
  14. - Locating Valuable Information Using Logs and Reports
  15. - What's Next in Your Training and Certification Journey


Supplemental Materials

  • Securing Endpoints with GlobalProtect
  • Providing Firewall Redundancy with High Availability
  • Connecting Remotes Sites using VPNs
  • Blocking Common Attacks Using Zone Protection