Sample Video and Course Outline

Do you want to learn how to block certain applications within Facebook like writing posts or chatting? Do you want to learn how to decrypt a secure web page a user may access to inspect it further? Do you want to learn how to block certain files uploaded towards the Internet? In this video series you will learn how to do many of these things and much more.

Palo Alto Networks is a Next-Generation Firewall that is focused on application inspection where you can control what a user can access within a specific application. We have a range of basic to advanced topics that will show you how to deploy the PAN appliance step-by-step in a simple and practical implementation.

Sample Video

Course Outline

  1. Overview, Concepts, and Design
    1. Update Announcement
    2. Fundamentals
    3. Design
  2. Initial Access and General Configuration
    1. Initial Access into PAN
    2. Registering the PAN
    3. Management Interface
    4. General Settings and Services
  3. Interfaces
    1. Security Zones
    2. Virtual Routers
    3. Interfaces (LAN, WAN)
    4. Guest Services – 802.1Q, VLAN, and DHCP
    5. Virtual Link
  4. IP Routing
    1. Static Routes / Default Route
    2. OSPF Routing
    3. BGP Routing
  5. Firewall Operations
    1. Upgrading the PAN-OS
    2. Configuration Formats
  6. Network Address Translations (NAT)
  7. Firewall Policies: URL, App-ID, SSL Decryption
    1. Security Policies
    2. Outbound SSL Decryption
    3. URL Filtering
    4. App-ID, Blocking Skype and BitTorrent Applications
  8. VPN and Remote Access
    1. GlobalProtect (Client VPN Solution)
    2. Site-to-Site VPN Tunnel (VTI)
  9. Network Management Services
    1. Sending Logs to Syslog
    2. SNMPv3
    3. NetFlow
  10. Advanced Security Features
    1. File Blocking
    2. Anti-Virus Blocking
    3. DoS Protection (Zone Protection)
    4. Dynamic Block List
    5. Vulnerability Protection (IPS)
    6. Custom IPS Signatures
    7. Data Filtering
    8. IP Block List Feeds
  11. High Availability
    1. HA using Active/Passive
  12. Firewall Policies: User Identification (User-ID)
    1. Captive Portal
    2. User Identification (User-ID) using AD (without Agent)