Live Instructor-led training - 5 halve dager
Kurset i januar: 10.00 - 14.00
Kurset i mars: 15.00 - 19.00 [+]
Successful completion of this course will enhance the student’s understanding of how to better configure, manage, and monitor PAN-OS® threat prevention features. The student will get hands-on experience configuring, managing, and monitoring threat prevention features in a lab environment.
Best Practices & Real Life Experience All of our instructors are security consultants that design, implement, migrate, manage and support Palo Alto Networks solutions all day, every day. It's this experience which they bring into the classroom to explain not only the theory but how to use the FireWall in real-life. Customers tell us that this is most valuable for them and what differentiates our training from most other training partners.
Video Recordings It's impossible to remember everything in live training, which is why we are recording it and share the video with you. If you like to start studying right away, then we can even share the videos of a previous course.
Dedicated Lab AccessFor 3 month you will have access to your own dedicated lab which you can use not only during the course, but for full three month. Your virtual lab consists of a Windows Client, Palo Alto Networks FireWall and DMZ Linux Server with a lab guide for practical exercises. As a bonus, which is not officially part of the course, your lab features the Expedition Migration Tool and Minemeld.
COURSE OBJECTIVESSuccessful completion of this training will enhance the student’s understanding of how to better configure, manage, and monitor PAN-OS® threat prevention features. The student will get hands-on experience configuring, managing, and monitoring threat prevention features in a lab environment.
Course level: Intermediate
Course duration: 4 days
Course format: Combines lecture and hands-on labs
Platform support: Palo Alto Networks® nextgeneration
Language: Undervisningen og dokumentasjon er på engelsk.
Module 1: The Cyber-Attack Lifecycle
Module 2: Blocking Packet- and Protocol-Based Attacks
Module 3: Blocking Threats from Known-Bad Sources
Module 4: Blocking Threats Using App-ID™
Module 5: Blocking Threats Using Custom Signatures
Module 6: Creating Custom Threat Signatures
Module 7: Blocking Threats in Encrypted Traffic
Module 8: Blocking Threats in Allowed Traffic
Module 9: Authenticating Firewall User Accounts
Module 10: Blocking Threats from Phishing and Stolen Credentials
Module 11: Viewing Threat and Traffic Information
Kurset tilbys også som bedriftsinternt kurs, og arrangeres hos dere eller i våre lokaler, alt etter hva som passer best. Ta kontakt med oss og vi kan finne en god løsning sammen. [-]