Palo Alto

Palo Alto

Palo Alto
  • Palo Alto

    Module 0 – Platform overview

    • Understanding on Hardware architecture of next generation firewall 
    • Single pass architecture
    • Flow logic
    • Segregated control plane and data plane
    • Hardware architecture
    • Fast path

    Module 1 – Administration and Management

    • Administration and management of firewall  using GUI, CLI,
    • Overview of REST API
    • ConfigMgmt, PAN-OS, Account Administration

    Module2 – Interface Configuration

    • Understating on various interface types including Tap, v-waire, layer3, HA
    • Security zones overview
    • Designing network security with  layer2, transparent and layer3 deployment

    Module3 – layer3 configuration

    • Overview of layer 3 technologies including Virtual routers , interface management profile and service route configuration
    • Policy based forwarding, Static and dynamic routing protocols
    • Network address translation 
    • Dynamic IP/Port
    • Dynamic IP
    • Static IP
    • Destination NAT Type 
    • Static IP
    • Port forwarding
    • NAT Specific traffic flow
    • Understating  and implementation of NAT policies

    Module 4 – Application –ID

    • Overview of application APP-ID
    • Various component & technologies  of application identification process
    • Application-ID traffic flow
    • Overview of security policy
    • App-id and security policies configuration
    • Advance concepts on application and security policies 
    • Application dependencies
    • Managing policy behavior
    • Custom application signatures
    • Logging and reporting
    • Overview of SSL session setup and underrating on PAKI
    • how to configure firewall for SSL visibility
    • inbound deep packet inspection of SSL traffic  – IPS and other signatures for inbound SSL traffic

    Module 5 – User-ID

    • Overview and understating  on user-id
    • User-id flow & user based policies
    • understating on user-id process
    • Enumerate users and group with Active directory and LDAP
    • User id agent identification method
    • understating  on AD security logs, CAS security logs, shared server sessions and WMI queries
    • Captive portal overview for guest authentication

    Module 6 – Content-ID

    • Overview of content-id modules and security profiles
    • Understanding  on advance deep packet inspection using 
    • Anti-virus profiles
    • Anti-spyware profiles
    • Vulnerability scanning profiles
    • Url filtering profiles
    • File blocking profiles
    • Wild fire profiles
    • Administration of security profiles
    • Zone protection profiles

    Module 7 – VPN 

    • Overview of VPN technologies 
    • SSL VPN
    • IPsec VPN
    • Understating on policy and route based VPN
    • Implementing VPN on PAN oS
    • Advance understanding of SSL VPN technology
    • Global protect Overview
    • Establishing SSL VPN with global protect

    Module 8 – High Availability

    • Overview of redundant architecture and high availability
    • understating on active-active and active-standby HA
    • understating  and managing split brain condition
    • path and link monitoring  configuration to handle failover conditions

    Module 9 – Advance persistence threats

    • Overview of advance persistence threat technology
    • Overview on Cyberthreat trends 
    • Client side attacks
    • Customized/target attack
    • Social engineered attack
    • Understanding attacker motives 
    • Financial crime
    • Cyber Espionage
    • Hacktivism
    • State sponsored
    • Understanding advanced threat tactics 
    • Customized malware
    • Drive-by downloads
    • Watering hole attacks
    • Spear Phishing
    • Zero Day
    • understating modern malware lifecycle and attack stages
    • overview of Palo Alto wildfire services for targeted & persistence attacks
    • understanding wildfire architecture
    • policy configuration on Palo alto firewall for wild fire module

    Module 10 – Threat Management/Prevention

    • Overview of KALI to Launch Network and application based attacks
    • Understanding on Foot printing and Reconnaissance using KALI
    • Hacking web application using SQL injection
    • Understanding on Denial of Service attacks
    • Overview of cyber security best practices 
    • File Blocking best practices – Use of Kali to launch attacks
    • URL filtering best practices
    • Vulnerability Protection best practices
    • Traps best practices
    • Understanding on reducing attack surface
    • Overview on investigating attacks
    • Indicators of Compromise
    • Logs and Reports
    • Log Correlation


ENQUIRY NOW Attractive Discount available !