Udemy – Palo Alto PanOS V10 Zero to Hero

Udemy – Palo Alto PanOS V10 Zero to Hero
English | Tutorial | Size: 4.27 GB


Learn how to design, deploy, operate, manage, and troubleshoot Palo Alto Networks Next-Generation Firewalls.

What you’ll learn
This course prepare you not only for the PCNSE certification exam but also you will learn how to configure Palo Alto next Generation Firewalls easy and fast.
A defense-in-depth strategy, refers to a cybersecurity approach that uses multiple layers of security for holistic protection.
How to implement Multiple layers of security using Palo Alto NGFW, PanOS v10?
Basic Configurations, Management Interface and Management portal, Useful commands
Relationship between Zones, Interfaces and virtual routers, Inter-VR Routing, Security Policy and it’s different types: Intrazone, Interzone, Universal
Deployment Mode, Interface types: TAP Mode, Layer2 Mode, Virtual Wire(vWire) Mode and Layer3 Mode
Types of NAT and Implementation of different types of NAT: Source Dynamic IP and port NAT, Static Source NAT, Destination NAT and U-turn Destination NAT
SSL and SSH decryption using Palo Alto NGFW firewall: Active directory / CA Installation, SSL Proxy Decryption, SSL Inbound inspection and SSH Decryption
Next-Generation Firewall features: App-ID, User-ID, Anti-Virus, Anti-Spyware, Vulnerability Protection, File Blocking, Data Filtering and Wildfire
Configure Palo Alto NGFW on the Amazon AWS
Zone and Dos Protection, Authentication Portal / Captive Portal, GlobalProtect, High Availability, Panorama
Requirements
General networking, routing and security knowledge
Description
First Question you may ask is Why Palo Alto NGFW? To answer this question, Let’s talk about Defense in depth first.A defense-in-depth strategy, refers to a cybersecurity approach that uses multiple layers of security for holistic protection.A layered defense helps security organizations reduce vulnerabilities, contain threats, and mitigate risk.In simple term, with a defense-in-depth approach, if a cybercriminal breaches one layer of defense, they might be contained by the next layer of defense.To summarize, There isn’t any single measure that will keep your systems safe.Any types of traffic which your network doesn’t use shouldn’t be allowed in.The best protection for unwanted traffics, comes from a next-generation firewall (NGFW), which examines not just packet types but application-specific queries for hostile content.So Why Palo Alto?Because:Palo Alto was recognized by Gartner® for ten consecutive years as a Leader for Network Firewalls.Ability to meet different firewall deployment use casesFirewalls and security services for protection against advanced threatsNewly released features and enhancements across firewall offeringsThis PANOS V10 Zero-to-Hero course is developed to give students a quick and effective overview of Security track and prepare you not only for the PCNSE certification exam but also you will learn how to configure Palo Alto next Generation Firewalls easy and fast.What you will learn during this course?Lab Setup Using Vmware and Eve-ngBasic Configuration and Useful commandsZone, Security Policy and ObjectsDeployment Modes and Interface typesNetwork Address Translation – NATSSL/SSH DecryptionNext-Generation Firewall featuresAWS – Palo Alto SetupZone and Dos ProtectionAuthentication Portal / Captive PortalGlobal ProtectHigh AvailabilityWho this course is for:Anyone who uses Palo Alto Networks products, including network security engineers system engineers systems integrators and support engineers.

Overview

Section 1: Introduction

Lecture 1 Introduction and Overview

Section 2: Lab Setup Using Vmware and Eve-ng

Lecture 2 Lab setup

Section 3: Basic Configuration and Useful commands

Lecture 3 Basic configuration

Lecture 4 Useful commands

Section 4: Zone, Security Policy and Objects

Lecture 5 Security Policy, Zones and Objects (Part One)

Lecture 6 Security Policy, Zones and Objects (Part Two)

Lecture 7 Security Policy, Zones and Objects (Part Three)

Lecture 8 Security Policy, Zones and Objects (Part Four)

Section 5: Deployment Modes and Interface types

Lecture 9 Deployment Mode-Introduction

Lecture 10 TAP Mode

Lecture 11 Layer 2 Mode

Lecture 12 Layer 2 Mode With Vlan-ID

Lecture 13 Virtual Wire Mode

Lecture 14 Layer 3 Mode (Part One)

Lecture 15 Layer 3 Mode (Part Two)

Section 6: Network Address Translation – NAT

Lecture 16 Network Address Translation – Introduction

Lecture 17 Source Dynamic IP and port NAT

Lecture 18 Source Dynamic IP and port NAT With pool

Lecture 19 Static NAT (Part One)

Lecture 20 Static NAT (Part Two)

Lecture 21 Destination NAT

Lecture 22 U-turn Destination NAT

Section 7: SSL/SSH Decryption

Lecture 23 Introduction to Decryption

Lecture 24 Active Directory / CA server installation

Lecture 25 SSL Proxy Decryption (Part One)

Lecture 26 SSL Proxy Decryption (Part Two)

Lecture 27 SSL inbound Inspection (Part One)

Lecture 28 SSL inbound Inspection (Part Two)

Lecture 29 SSH Proxy Decryption (Part One)

Lecture 30 SSH Proxy Decryption (Part Two)

Section 8: Next-Generation Firewall features

Lecture 31 Introduction to Next Generation Firewall

Lecture 32 Application ID (Part One)

Lecture 33 Application ID (Part Two)

Lecture 34 Application ID (Part Three)

Lecture 35 Application Override (Part One)

Lecture 36 Application Override (Part Two)

Lecture 37 User ID (Part One)

Lecture 38 User ID (Part Two)

Lecture 39 User ID (Part Three)

Lecture 40 User ID (Part Four)

Lecture 41 Licensing / Security subscriptions

Lecture 42 AntiVirus Profile

Lecture 43 Anti-Spyware Profile

Lecture 44 Vulnerability Protection

Lecture 45 File Blocking

Lecture 46 Data Filtering

Lecture 47 WildFire analysis

Section 9: AWS – Palo Alto Setup

Lecture 48 AWS-Palo Alto Setup (Part One)

Lecture 49 AWS-Palo Alto Setup (Part Two)

Lecture 50 AWS-Palo Alto Setup (Part Three)

Lecture 51 AWS-Palo Alto Setup (Part Four)

Lecture 52 AWS-Palo Alto Setup (Part Five)

Lecture 53 AWS-Palo Alto Setup (Part Six)

Section 10: Zone and Dos Protection

Lecture 54 Zone-Based Protection

Lecture 55 DoS Protection

Section 11: Authentication Portal / Captive Portal

Lecture 56 Authentication Portal / Captive Portal

Section 12: GlobalProtect

Lecture 57 GlobalProtect GW

Lecture 58 GlobalProtect Portal

Lecture 59 GlobalProtect Clients

Section 13: High Availability

Lecture 60 High Availability

This course is developed to give students a quick and effective overview of Security track and prepare you not only for the PCNSE certification exam but also you will learn how to configure Palo Alto next Generation Firewalls easy and fast.

Buy Long-term Premium Accounts To Support Me & Max Speed


RAPIDGATOR
rapidgator.net/file/a3a101bec77dd2118b807f4e340cb72e/Udemy_-_Palo_Alto_PanOS_V10_Zero_to_Hero.part1.rar.html
rapidgator.net/file/37e76ec610b5c4d09df051102b474bea/Udemy_-_Palo_Alto_PanOS_V10_Zero_to_Hero.part2.rar.html
rapidgator.net/file/9ffe0f9d891f439cb58016c83b805104/Udemy_-_Palo_Alto_PanOS_V10_Zero_to_Hero.part3.rar.html
rapidgator.net/file/bbfd35b6a7b98b51d2c8af21c1158898/Udemy_-_Palo_Alto_PanOS_V10_Zero_to_Hero.part4.rar.html
rapidgator.net/file/4e11168aaf77cebc877d55c97b33d0cb/Udemy_-_Palo_Alto_PanOS_V10_Zero_to_Hero.part5.rar.html
rapidgator.net/file/858d0000e755149e29dd1fc9170a8ca4/Udemy_-_Palo_Alto_PanOS_V10_Zero_to_Hero.part6.rar.html
rapidgator.net/file/60aec444cf2d4391644677fcf8564005/Udemy_-_Palo_Alto_PanOS_V10_Zero_to_Hero.part7.rar.html

1DL
1dl.net/vyik3nmisc6v/Udemy_-_Palo_Alto_PanOS_V10_Zero_to_Hero.part1.rar.html
1dl.net/xmhzo624c557/Udemy_-_Palo_Alto_PanOS_V10_Zero_to_Hero.part2.rar.html
1dl.net/b0cofztdyqul/Udemy_-_Palo_Alto_PanOS_V10_Zero_to_Hero.part3.rar.html
1dl.net/dz3qoh22n5rs/Udemy_-_Palo_Alto_PanOS_V10_Zero_to_Hero.part4.rar.html
1dl.net/mcejceza5akw/Udemy_-_Palo_Alto_PanOS_V10_Zero_to_Hero.part5.rar.html
1dl.net/kiujt05uv77o/Udemy_-_Palo_Alto_PanOS_V10_Zero_to_Hero.part6.rar.html
1dl.net/z8mv4a61n7r2/Udemy_-_Palo_Alto_PanOS_V10_Zero_to_Hero.part7.rar.html

If any links die or problem unrar, send request to goo.gl/aUHSZc

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.