Vanligvis vil CTRL + + tastene kunne brukes for å øke størrelsen, og CTRL + - for å redusere den.
Har du hjul på musen, kan du bruke CTRL sammen med hjulet for å justere størrelsen. På Mac kan du bruke CMD + + og CMD + -.
|08||17.02.2020||20.02.2020||17.02.2020||Nettkurs||09:00 - 12:30||Norsk|
|22||26.05.2020||29.05.2020||26.05.2020||Nettkurs||09:00 - 12:30||Norsk|
NB! Kursene kjøres:
Successful completion of this course will enhance the student’s understanding of how to better configure, manage, and monitor PAN-OS® threat prevention features. The student will get hands-on experience configuring, managing, and monitoring threat prevention features in a lab environment.
Best Practices & Real Life Experience
All of our instructors are security consultants that design, implement, migrate, manage and support Palo Alto Networks solutions all day, every day. It's this experience which they bring into the classroom to explain not only the theory but how to use the FireWall in real-life. Customers tell us that this is most valuable for them and what differentiates our training from most other training partners.
It's impossible to remember everything in live training, which is why we are recording it and share the video with you. If you like to start studying right away, then we can even share the videos of a previous course.
Dedicated Lab Access
For 3 month you will have access to your own dedicated lab which you can use not only during the course, but for full three month. Your virtual lab consists of a Windows Client, Palo Alto Networks FireWall and DMZ Linux Server with a lab guide for practical exercises. As a bonus, which is not officially part of the course, your lab features the Expedition Migration Tool and Minemeld.
Successful completion of this training will enhance the student’s understanding of how to better configure, manage, and monitor PAN-OS® threat prevention features. The student will get hands-on experience configuring, managing, and monitoring threat prevention features in a lab environment.
Module 1: The Cyber-Attack Lifecycle
Module 2: Blocking Packet- and Protocol-Based Attacks
Module 3: Blocking Threats from Known-Bad Sources
Module 4: Blocking Threats Using App-ID™
Module 5: Blocking Threats Using Custom Signatures
Module 6: Creating Custom Threat Signatures
Module 7: Blocking Threats in Encrypted Traffic
Module 8: Blocking Threats in Allowed Traffic
Module 9: Authenticating Firewall User Accounts
Module 10: Blocking Threats from Phishing and Stolen Credentials
Module 11: Viewing Threat and Traffic Information
Kurset tilbys også som bedriftsinternt kurs, og arrangeres hos dere eller i våre lokaler, alt etter hva som passer best. Ta kontakt med oss og vi kan finne en god løsning sammen.
Våre kurslokaler er på Ryen i Oslo. Vi ligger sentralt ved E-6. I tillegg til parkeringsplasser har vi vi gode forbindelser med buss og T-bane fra Oslo sentrum. Se veibeskrivelse her
Participants must complete the Firewall 8.1 Essentials: Configuration and Management course, or have equivalent experience. Students must have a basic familiarity with networking concepts including routing, switching, and IP addressing.
Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, Network Engineers, and Support StaffSend meg gratis info