Course Overview
The Palo Alto Networks Firewall Essentials: Configuration and Management (EDU-210) course is five days of instructor-led training that will help you to:
- Configure and manage the essential features of Palo Alto Networks next-generation firewalls
 - Configure and manage Security and NAT policies to enable approved traffic to and from zones
 - Configure and manage Threat Prevention strategies to block traffic from known and unknown IP addresses, domains, and URLs
 - Monitor network traffic using the interactive web interface and firewall reports
 
Exclusive to Fast Lane / ITLS:
Additional Palo Alto Labs and extended lab hours after the course
- 2 Palo Alto Networks Firewalls for High Availability Solutions
 - Global Protect Remote Access VPN Lab
 - Site-to-Site VPN Lab
 - Destination NAT Lab
 - Captive Portal & User-ID Lab
 - Optional Lab for Expedition Tool (BPA)
 
Who should attend
Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts and Support Staff
Certifications
This course is part of the following Certifications:
Prerequisites
- Participants must be familiar with networking concepts, including routing, switching, and IP addressing.
 - Participants also should be familiar with basic security concepts.
 - Experience with other security technologies (IPS, proxy, andcontent filtering) is a plus.
 
Course Objectives
Successful completion of this five-day, instructor-led course should enhance the student’s understanding of how to configure and manage Palo Alto Networks next-generation firewalls. The student should learn and get hands-on experience configuring, managing, and monitoring a firewall in a lab environment .
Follow On Courses
Outline: Firewall Essentials: Configuration and Management (EDU-210)
- 1 - Palo Alto Networks Portfolio and Architecture
 - 2 - Configuring Initial Firewall Settings
 - 3 - Managing Firewall Configurations
 - 4 - Managing Firewall Administrator Accounts
 - 5 - Connecting the Firewall to Production Networks with Security Zones
 - 6 - Creating and Managing Security Policy Rules
 - 7 - Creating and Managing NAT Policy Rules
 - 8 - Controlling Application Usage with App-ID
 - 9 - Blocking Known Threats Using Security Profiles
 - 10 - Blocking Inappropriate Web Traffic with URL Filtering
 - 11 - Blocking Unknown Threats with Wildfire
 - 12 - Controlling Access to Network Resources with User-ID
 - 13 - Using Decryption to Block Threats in Encrypted Traffic
 - 14 - Locating Valuable Information Using Logs and Reports
 - 15 - What's Next in Your Training and Certification Journey 
- Supplemental Materials
 - Securing Endpoints with GlobalProtect
 - Providing Firewall Redundancy with High Availability
 - Connecting Remotes Sites using VPNs
 - Blocking Common Attacks Using Zone Protection