Vanligvis vil CTRL + + tastene kunne brukes for å øke størrelsen, og CTRL + - for å redusere den.
Har du hjul på musen, kan du bruke CTRL sammen med hjulet for å justere størrelsen. På Mac kan du bruke CMD + + og CMD + -.
Dette kurset har ikke oppført noen dato for studiestart. Bruk skjemaet under for å kontakte leverandør for nærmere informasjon.
Best Practices & Real Life Experience
All of our instructors are security consultants that design, implement, migrate, manage and support Palo Alto Networks solutions all day, every day. It's this experience which they bring into the classroom to explain not only the theory but how to use the FireWall in real-life. Customers tell us that this is most valuable for them and what differentiates our training from most other training partners.
It's impossible to remember everything in live training, which is why we are recording it and share the video with you. If you like to start studying right away, then we can even share the videos of a previous course.
Dedicated Lab Access
For 3 month you will have access to your own dedicated lab which you can use not only during the course, but for full three month. Your virtual lab consists of a Windows Client, Palo Alto Networks FireWall and DMZ Linux Server with a lab guide for practical exercises. As a bonus, which is not officially part of the course, your lab features the Expedition Migration Tool and Minemeld.
Successful completion of this training will enhance the student’s understanding of how to better configure, manage, and monitor PAN-OS® threat prevention features. The student will get hands-on experience configuring, managing, and monitoring threat prevention features in a lab environment.
Module 1: The Cyber-Attack Lifecycle
Module 2: Blocking Packet- and Protocol-Based Attacks
Module 3: Blocking Threats from Known-Bad Sources
Module 4: Blocking Threats Using App-ID™
Module 5: Blocking Threats Using Custom Signatures
Module 6: Creating Custom Threat Signatures
Module 7: Blocking Threats in Encrypted Traffic
Module 8: Blocking Threats in Allowed Traffic
Module 9: Authenticating Firewall User Accounts
Module 10: Blocking Threats from Phishing and Stolen Credentials
Module 11: Viewing Threat and Traffic Information
Kurset tilbys også som bedriftsinternt kurs, og arrangeres hos dere eller i våre lokaler, alt etter hva som passer best. Ta kontakt med oss og vi kan finne en god løsning sammen.
Instructor-Led Virtual - Live Online Training
Participants must complete the Firewall 8.1 Essentials: Configuration and Management course, or have equivalent experience. Students must have a basic familiarity with networking concepts including routing, switching, and IP addressing.
5 x full-day sessions or 10x half-day sessions
Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, Network Engineers, and Support StaffKontakt oss