EDU-210: Firewall Essentials: Configuration and Management

Description

Duration: 5 Days

About this Course

The Palo Alto Networks Firewall 10.2 Essentials: Configuration and Management (EDU-210) course is five days of instructor-led training that will help you to:

  • Configure and manage the essential features of Palo Alto Networks next-generation firewalls
  • Configure and manage Security and NAT policies to enable approved traffic to and from zones
  • Configure and manage Threat Prevention strategies to block traffic from known and unknown IP addresses, domains, and URLs
  • Monitor network traffic using the interactive web interface and firewall reports

Audience Profile

Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts and Support Staff

At Course Completion

Successful completion of this five-day, instructor-led course should enhance the student’s understanding of how to configure and manage Palo Alto Networks next-generation firewalls. The student should learn and get hands-on experience configuring, managing, and monitoring a firewall in a lab environment.

Prerequisites

Students must have a basic familiarity with networking concepts including routing, switching, and IP addressing. Students also should be familiar with basic security concepts. Experience with other security technologies (IPS, proxy, and content filtering) is a plus.

What’s included?

  • Authorized Courseware
  • Intensive Hands on Skills Development with an Experienced Subject Matter Expert
  • Hands-on practice on real Servers and extended lab support 1.800.482.3172
  • Examination Vouchers  & Onsite Certification Testing- (excluding 1-day Adobe, 1-day MS Office and PMP Boot Camps)
  • Academy Code of Honor: Test Pass Guarantee
  • Optional: Package for Hotel Accommodations, Lunch and Transportation

With several convenient training delivery methods offered, The Code Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Code Academy for an engaging and effective learning experience.

Methods

  • Instructor-Led (the best training format we offer)
  • Live Online Classroom – Online Instructor-Led
  • Self-Paced Video

Speak to an Admissions Representative for complete details

StartFinishPublic PricePublic Enroll Private PricePrivate Enroll
9/23/20249/27/2024
10/14/202410/18/2024
11/4/202411/8/2024
11/25/202411/29/2024
12/16/202412/20/2024
1/6/20251/10/2025
1/27/20251/31/2025
2/17/20252/21/2025
3/10/20253/14/2025
3/31/20254/4/2025
4/21/20254/25/2025
5/12/20255/16/2025
6/2/20256/6/2025
6/23/20256/27/2025
7/14/20257/18/2025
8/4/20258/8/2025
8/25/20258/29/2025
9/15/20259/19/2025
10/6/202510/10/2025
10/27/202510/31/2025
11/17/202511/21/2025
12/8/202512/12/2025
12/29/20251/2/2026

Outline

  • 1 – Palo Alto Networks Portfolio and Architecture
  • 2 – Configuring Initial Firewall Settings
  • 3 – Managing Firewall Configurations
  • 4 – Managing Firewall Administrator Accounts
  • 5 – Connecting the Firewall to Production Networks with Security Zones
  • 6 – Creating and Managing Security Policy Rules
  • 7 – Creating and Managing NAT Policy Rules
  • 8 – Controlling Application Usage with App-ID
  • 9 – Blocking Known Threats Using Security Profiles
  • 10 – Blocking Inappropriate Web Traffic with URL Filtering
  • 11 – Blocking Unknown Threats with Wildfire
  • 12 – Controlling Access to Network Resources with User-ID
  • 13 – Using Decryption to Block Threats in Encrypted Traffic
  • 14 – Locating Valuable Information Using Logs and Reports
  • 15 – What’s Next in Your Training and Certification Journey
  • Appendix A – Securing Endpoints with GlobalProtect
  • Appendix B – Providing Firewall Redundancy with High Availability
  • Appendix C – Connecting Remotes Sites using VPNs
  • Appendix D – Configuring User-ID Windows Agent