Course Overview
The Palo Alto Networks Firewall 9.1: Optimizing Firewall Threat Prevention (EDU-214) course is four days of instructor-led training that emphasizes the PAN-OS® threat prevention capabilities. After completing this course, you should be able to:
- Describe the cyber-attack lifecycle and recognize common forms of attack
- Describe PAN-OS® threat prevention capabilities
- Use firewall logs and reports to make better configuration decisions
- Configure the firewall to detect, block, and record threats
Course Objectives
Successful completion of this four-day, instructor-led course should enhance the student’s understanding of how to better configure, manage, and monitor PAN-OS® threat protection features. The student will get hands-on experience configuring, managing, and monitoring threat protection features in a lab environment.
Who Should Attend?
Participants must complete the Firewall 9.1 Essentials: Configuration and Management course or have equivalent experience. Students must have a basic familiarity with routing, switching, and IP addressing.
- Top-rated instructors: Our crew of subject matter experts have an average instructor rating of 4.8 out of 5 across thousands of reviews.
- Authorized content: We maintain more than 35 Authorized Training Partnerships with the top players in tech, ensuring your course materials contain the most relevant and up-to date information.
- Interactive classroom participation: Our virtual training includes live lectures, demonstrations and virtual labs that allow you to participate in discussions with your instructor and fellow classmates to get real-time feedback.
- Post Class Resources: Review your class content, catch up on any material you may have missed or perfect your new skills with access to resources after your course is complete.
- Private Group Training: Let our world-class instructors deliver exclusive training courses just for your employees. Our private group training is designed to promote your team’s shared growth and skill development.
- Tailored Training Solutions: Our subject matter experts can customize the class to specifically address the unique goals of your team.
Course Prerequisites
There are no prerequisites for this course.
Agenda
1 - Course Outline
- The Cyberattack Lifecycle
- Blocking Packet- and Protocol-Based Attacks
- Blocking Threats from Known-Bad Sources
- Blocking Threats Using App-ID
- Blocking Threats Using Custom Applications
- Creating Custom Threat Signatures
- Blocking Threats in Encrypted Traffic
- Blocking Threats in Allowed Traffic
- Blocking Threats from Stolen Credentials
- Viewing Threat and Traffic Information
- Next Steps