Palo Alto Firewalls for Network Protection

Paths

Palo Alto Firewalls for Network Protection

Author: Craig Stansbury

Palo Alto Networks Next-Generation Firewalls are integral in allowing network security engineers to prevent successful cyberattacks. This path will teach fundamental concepts and... Read more

Course breakdown:

  1. Deploy, Administer, and Secure Palo Alto Firewalls
  2. Configure NAT and VPNs Using Palo Alto Firewalls
  3. Prevent Threats Using Palo Alto Firewalls
  4. Decrypt Traffic on the Palo Alto Firewall
  5. Manage Palo Alto Firewalls with Panorama and Implement High Availability
  6. Implement User-ID on Palo Alto Firewalls
  7. Configure Palo Alto Firewalls in a Home Lab

Pre-requisites

This skill path does not require prerequisites

Implementing Palo Alto Firewalls for Network Protection

This path will teach fundamental concepts and skills required for security engineers to design, deploy. operate, manage, and trouble shoot Palo Alto Firewalls.

Deploy, Administer, and Secure Palo Alto Firewalls

by Craig Stansbury

Jun 17, 2021 / 4h 5m

4h 5m

Start Course
Description

With today’s sophisticated attacks, networks without a next generation firewall are less secure than networks that properly deploy them. In this course, Deploy, Administer, and Secure Palo Alto Firewalls, you’ll learn to properly configure a Palo Alto Networks next-generation firewall. First, you’ll explore the different products that Palo Alto Networks provides and how they all work together. Next, you’ll discover how to bootstrap the Palo Alto Firewall and configure basic administrative settings. Finally, you’ll learn how to configure objects and security polices to help shape traffic and secure your network. When you’re finished with this course, you’ll have the skills and knowledge of deploying a Palo Alto Networks next-generation firewall needed to secure your network from modern day attacks.

Table of contents
  1. Course Overview
  2. Understand How Palo Alto Networks Products Work Together
  3. Initialize and License the Palo Alto Firewall
  4. Administer the Palo Alto Firewall
  5. Update the Palo Alto Firewall
  6. Configure Security Zones and Layer 3 Interfaces
  7. Understand App-ID and Other Objects
  8. Shape Traffic Using Security Policy Rules
  9. Implement Palo Alto Networks’ Best Practices to Security Rules

Configuring NAT and VPN’s Using Palo Alto Firewalls

by Craig Stansbury

May 10, 2019 / 2h 23m

2h 23m

Start Course
Description

At the core of network-security engineering is a thorough knowledge of NAT translations and VPN connections. In this course, Configuring NAT and VPN's Using Palo Alto Firewalls, you'll learn how to shape traffic using Palo Alto’s Next Generation Firewall. First, you’ll learn how to configure various types of NAT. Next, you’ll explore how to deploy site-to-site VPNs using both pre-shared keys and digital certificates. Finally, you’ll discover how to set up remote access VPNs using GlobalProtect. When you’re finished with this course, you’ll have a foundational knowledge of configuring NAT and VPNs on a Palo Alto firewall that will help you as you move forward to engineer enterprise network security. Software required: PAN-OS 8.1 (physical or virtual), Network Equipment (physical or virtual), Operating system (physical or virtual).

Table of contents
  1. Course Overview
  2. Changing IP Addresses Using Network Address Translation
  3. Configuring NAT on the Palo Alto Firewall
  4. Understanding the Concepts of VPNs
  5. Configuring S2S VPNs on the Palo Alto Firewall
  6. Using Global Connect to Configure Remote Access VPNs

Preventing Threats Using Palo Alto Firewalls

by Craig Stansbury

Aug 14, 2019 / 2h 46m

2h 46m

Start Course
Description

The number of threats that will disrupt business activities is continuing to grow and evolve, and they are becoming harder to detect partly because they are lurking inside of encrypted traffic that most devices cannot see into. In this course, Preventing Threats Using Palo Alto Firewalls, you will gain the ability to stop malicious and unsanctioned traffic, whether or not it is inside encrypted traffic. First, you will learn how to configure various security profiles such as Antivirus, Anti-Spyware, and Denial of Service mitigations. Next, you will discover how to leverage Palo Alto’s WildFire® and AutoFocus™ to stop zero-day attacks, even if no one else has seen the malicious content before. Finally, you will explore how to decrypt the traffic that flows through your organization’s network so you can apply these threat prevention mechanisms to all traffic. When you’re finished with this course, you will have the skills and knowledge of using the Palo Alto firewall to prevent various threats, even if they are inside of encrypted traffic -- which is needed to secure your network from today’s advanced threats.

Table of contents
  1. Course Overview
  2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection
  3. Integrating with WildFire® and AutoFocus™
  4. Joining the Enterprise PKI Infrastructure
  5. Decrypting Traffic on the Palo Alto Firewall

Coming Soon

Configure Palo Alto Firewalls in a Home Lab

Coming Soon

by Craig Stansbury