Palo Alto Networks EDU-220
Panorama: Managing Firewalls at Scale
Description
The Palo Alto Networks Panorama: Managing Firewalls at Scale (EDU-220) course is two days of instructor-led training that should help you
- Learn how to configure and manage the next-generation Panorama management server
- Gain experience configuring templates (including template variables) and device groups
- Gain experience with administration, log collection, and logging and reporting
- Become familiar with planning and design considerations for Panorama deployment
Course Modules
- Module 1-Palo Alto Networks Portfolio and Architecture
- Module 2-Connect to the Management Network
- Module 3-Manage Firewall Configurations
- Module 4-Manage Firewall Administrator Accounts
- Module 5-Connect to Production Networks
- Module 6-The Cyberattack Lifecycle
- Module 7-Block Threats Using Security and NAT Policies
- Module 8-Block Packet-and Protocol-Based Attacks
- Module 9-Block Threats from Known Bad Sources
- Module 10-Block Threats by Identifying Applications
- Module 11-Maintain Application-Based Policies
- Module 12-Block Threats Using Custom Applications
- Module 13-Block Threats by Identifying Users
- Module 14–Block Threats by Identifying Devices
- Module 15 -Block Unknown Threats
- Module 16-Block Threats in Encrypted Traffic
- Module 17-Prevent Use of Stolen Credentials
- Module 18-Block Threats Using Security Profiles
- Module 19-View Threat and Traffic Information
- Module 20-Next Steps
Objectives
Successful completion of this five-day, instructor-led course should enhance the student’s understanding of how to configure and manage Palo Alto Networks Next-Generation Firewalls. The course includes hands-on experience configuring, managing, and monitoring a firewall in a lab environment.
Prerequisites
Students must have completed the Firewall Essentials: Configuration and Management (EDU-210) class. Students must be familiar with Palo Alto Networks next-generation firewall management and basic networking concepts, including routing and IP addressing.
Target Audience
Security Administrators, Security Operations Specialists, Security Analysts, Security Engineers, and Security Architects