Detailed Course Outline
- Module 1- Palo Alto Networks Portfolio and Architecture
- Module 2- Connect to the Management Network
- Module 3- Manage Firewall Configurations
- Module 4- Manage Firewall Administrator Accounts
- Module 5- Connect to Production Networks
- Module 6- The Cyberattack Lifecycle
- Module 7- Block Threats Using Security and NAT Policies
- Module 8- Block Packet- and Protocol-Based Attacks
- Module 9- Block Threats from Known Bad Sources
- Module 10- Block Threats by Identifying Applications
- Module 11- Maintain Application-Based Policies
- Module 12- Block Threats Using Custom Applications
- Module 13- Block Threats by Identifying Users
- Module 14- Block Threats by Identifying Devices
- Module 15- Block Unknown Threats
- Module 16- Block Threats in Encrypted Traffic
- Module 17- Prevent Use of Stolen Credentials
- Module 18- Block Threats Using Security Profiles
- Module 19- View Threat and Traffic Information
- Module 20- Next Steps