Course Overview
The Palo Alto Networks Firewall Essentials: Configuration and Management (EDU-210) course is five days of instructor-led training that will help you to:
- Configure and manage the essential features of Palo Alto Networks next-generation firewalls
- Configure and manage Security and NAT policies to enable approved traffic to and from zones
- Configure and manage Threat Prevention strategies to block traffic from known and unknown IP addresses, domains, and URLs
- Monitor network traffic using the interactive web interface and firewall reports
Exclusive to Fast Lane / ITLS:
Additional Palo Alto Labs and extended lab hours after the course
- 2 Palo Alto Networks Firewalls for High Availability Solutions
- Global Protect Remote Access VPN Lab
- Site-to-Site VPN Lab
- Destination NAT Lab
- Captive Portal & User-ID Lab
- Optional Lab for Expedition Tool (BPA)
Who should attend
Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts and Support Staff
Certifications
This course is part of the following Certifications:
Prerequisites
- Participants must be familiar with networking concepts, including routing, switching, and IP addressing.
- Participants also should be familiar with basic security concepts.
- Experience with other security technologies (IPS, proxy, andcontent filtering) is a plus.
Course Objectives
Successful completion of this five-day, instructor-led course should enhance the student’s understanding of how to configure and manage Palo Alto Networks next-generation firewalls. The student should learn and get hands-on experience configuring, managing, and monitoring a firewall in a lab environment .
Follow On Courses
Outline: Firewall Essentials: Configuration and Management (EDU-210)
- 1 - Palo Alto Networks Portfolio and Architecture
- 2 - Configuring Initial Firewall Settings
- 3 - Managing Firewall Configurations
- 4 - Managing Firewall Administrator Accounts
- 5 - Connecting the Firewall to Production Networks with Security Zones
- 6 - Creating and Managing Security Policy Rules
- 7 - Creating and Managing NAT Policy Rules
- 8 - Controlling Application Usage with App-ID
- 9 - Blocking Known Threats Using Security Profiles
- 10 - Blocking Inappropriate Web Traffic with URL Filtering
- 11 - Blocking Unknown Threats with Wildfire
- 12 - Controlling Access to Network Resources with User-ID
- 13 - Using Decryption to Block Threats in Encrypted Traffic
- 14 - Locating Valuable Information Using Logs and Reports
- 15 - What's Next in Your Training and Certification Journey
- Supplemental Materials
- Securing Endpoints with GlobalProtect
- Providing Firewall Redundancy with High Availability
- Connecting Remotes Sites using VPNs
- Blocking Common Attacks Using Zone Protection