We offer professional, authorized trainings with various levels of advancement, prepared for specialists in information systems security.
We wish you effective learning, which will undoubtedly increase your professional skills, Welcome!
Certifications
Highest quality
Adaptation to needs
Certifications
Highest quality
Adaptation to needs
(EDU-210) Firewall Essentials: Configuration and ManagementObjectives Successful completion enhances participants’ understanding of how to configure and manage Palo Alto Networks Next-Generation Firewalls. The course includes hands-on experience configuring, managing, and monitoring a firewall in a lab environment.https://clico.hu/trainings/templates/edu-210-firewall-essentials-configuration-and-management-enghttps://clico.hu/logo.png
(EDU-210) Firewall Essentials: Configuration and Management
Objectives Successful completion enhances participants’ understanding of how to configure and manage Palo Alto Networks Next-Generation Firewalls. The course includes hands-on experience configuring, managing, and monitoring a firewall in a lab environment.
(EDU-210) Firewall Essentials: Configuration and Management (ENG)
Palo Alto Networks
5
3 950,0
USD
nem
igen
Target Audience
Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, and Support Staff
Prerequisites
Participants must have a basic familiarity with networking concepts including routing, switching, and IP addressing. Students also should be familiar with basic security concepts. Experience with other security technologies (IPS, proxy, and content filtering) is a plus.
Managing Firewall Administrator Accounts
Connecting the Firewall to Production Networks with Security Zones
Creating and Managing Security Policy Rules
9:00 - 17:00
Creating and Managing NAT Policy Rules
Controlling Application Usage with App-ID
Blocking Known Threats Using Security Profiles
9:00 - 17:00
Blocking Inappropriate Web Traffic with URL Filtering
Blocking Unknown Threats with Wildfire
Controlling Access to Network Resources with User-ID
9:00-17:00
Using Decryption to Block Threats in Encrypted Traffic
Locating Valuable Information Using Logs and Reports
What's Next in Your Training and Certification Journey