Tags
Language
Tags
October 2025
Su Mo Tu We Th Fr Sa
28 29 30 1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31 1
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Palo Alto Panos V10 Zero To Hero

    Posted By: ELK1nG
    Palo Alto Panos V10 Zero To Hero

    Palo Alto Panos V10 Zero To Hero
    Published 8/2022
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 4.27 GB | Duration: 7h 48m

    Learn how to design, deploy, operate, manage, and troubleshoot Palo Alto Networks Next-Generation Firewalls.

    What you'll learn
    This course prepare you not only for the PCNSE certification exam but also you will learn how to configure Palo Alto next Generation Firewalls easy and fast.
    A defense-in-depth strategy, refers to a cybersecurity approach that uses multiple layers of security for holistic protection.
    How to implement Multiple layers of security using Palo Alto NGFW, PanOS v10?
    Basic Configurations, Management Interface and Management portal, Useful commands
    Relationship between Zones, Interfaces and virtual routers, Inter-VR Routing, Security Policy and it's different types: Intrazone, Interzone, Universal
    Deployment Mode, Interface types: TAP Mode, Layer2 Mode, Virtual Wire(vWire) Mode and Layer3 Mode
    Types of NAT and Implementation of different types of NAT: Source Dynamic IP and port NAT, Static Source NAT, Destination NAT and U-turn Destination NAT
    SSL and SSH decryption using Palo Alto NGFW firewall: Active directory / CA Installation, SSL Proxy Decryption, SSL Inbound inspection and SSH Decryption
    Next-Generation Firewall features: App-ID, User-ID, Anti-Virus, Anti-Spyware, Vulnerability Protection, File Blocking, Data Filtering and Wildfire
    Configure Palo Alto NGFW on the Amazon AWS
    Zone and Dos Protection, Authentication Portal / Captive Portal, GlobalProtect, High Availability, Panorama
    Requirements
    General networking, routing and security knowledge
    Description
    First Question you may ask is Why Palo Alto NGFW? To answer this question, Let's talk about Defense in depth first.A defense-in-depth strategy, refers to a cybersecurity approach that uses multiple layers of security for holistic protection.A layered defense helps security organizations reduce vulnerabilities, contain threats, and mitigate risk.In simple term, with a defense-in-depth approach, if a cybercriminal breaches one layer of defense, they might be contained by the next layer of defense.To summarize, There isn’t any single measure that will keep your systems safe.Any types of traffic which your network doesn’t use shouldn’t be allowed in.The best protection for unwanted traffics, comes from a next-generation firewall (NGFW), which examines not just packet types but application-specific queries for hostile content.So Why Palo Alto?Because:Palo Alto was recognized by Gartner® for ten consecutive years as a Leader for Network Firewalls.Ability to meet different firewall deployment use casesFirewalls and security services for protection against advanced threatsNewly released features and enhancements across firewall offeringsThis PANOS V10 Zero-to-Hero course is developed to give students a quick and effective overview of Security track and prepare you not only for the PCNSE certification exam but also you will learn how to configure Palo Alto next Generation Firewalls easy and fast.What you will learn during this course?Lab Setup Using Vmware and Eve-ngBasic Configuration and Useful commandsZone, Security Policy and ObjectsDeployment Modes and Interface typesNetwork Address Translation - NATSSL/SSH DecryptionNext-Generation Firewall featuresAWS - Palo Alto SetupZone and Dos ProtectionAuthentication Portal / Captive PortalGlobal ProtectHigh AvailabilityWho this course is for:Anyone who uses Palo Alto Networks products, including network security engineers system engineers systems integrators and support engineers.

    Overview

    Section 1: Introduction

    Lecture 1 Introduction and Overview

    Section 2: Lab Setup Using Vmware and Eve-ng

    Lecture 2 Lab setup

    Section 3: Basic Configuration and Useful commands

    Lecture 3 Basic configuration

    Lecture 4 Useful commands

    Section 4: Zone, Security Policy and Objects

    Lecture 5 Security Policy, Zones and Objects (Part One)

    Lecture 6 Security Policy, Zones and Objects (Part Two)

    Lecture 7 Security Policy, Zones and Objects (Part Three)

    Lecture 8 Security Policy, Zones and Objects (Part Four)

    Section 5: Deployment Modes and Interface types

    Lecture 9 Deployment Mode-Introduction

    Lecture 10 TAP Mode

    Lecture 11 Layer 2 Mode

    Lecture 12 Layer 2 Mode With Vlan-ID

    Lecture 13 Virtual Wire Mode

    Lecture 14 Layer 3 Mode (Part One)

    Lecture 15 Layer 3 Mode (Part Two)

    Section 6: Network Address Translation - NAT

    Lecture 16 Network Address Translation - Introduction

    Lecture 17 Source Dynamic IP and port NAT

    Lecture 18 Source Dynamic IP and port NAT With pool

    Lecture 19 Static NAT (Part One)

    Lecture 20 Static NAT (Part Two)

    Lecture 21 Destination NAT

    Lecture 22 U-turn Destination NAT

    Section 7: SSL/SSH Decryption

    Lecture 23 Introduction to Decryption

    Lecture 24 Active Directory / CA server installation

    Lecture 25 SSL Proxy Decryption (Part One)

    Lecture 26 SSL Proxy Decryption (Part Two)

    Lecture 27 SSL inbound Inspection (Part One)

    Lecture 28 SSL inbound Inspection (Part Two)

    Lecture 29 SSH Proxy Decryption (Part One)

    Lecture 30 SSH Proxy Decryption (Part Two)

    Section 8: Next-Generation Firewall features

    Lecture 31 Introduction to Next Generation Firewall

    Lecture 32 Application ID (Part One)

    Lecture 33 Application ID (Part Two)

    Lecture 34 Application ID (Part Three)

    Lecture 35 Application Override (Part One)

    Lecture 36 Application Override (Part Two)

    Lecture 37 User ID (Part One)

    Lecture 38 User ID (Part Two)

    Lecture 39 User ID (Part Three)

    Lecture 40 User ID (Part Four)

    Lecture 41 Licensing / Security subscriptions

    Lecture 42 AntiVirus Profile

    Lecture 43 Anti-Spyware Profile

    Lecture 44 Vulnerability Protection

    Lecture 45 File Blocking

    Lecture 46 Data Filtering

    Lecture 47 WildFire analysis

    Section 9: AWS - Palo Alto Setup

    Lecture 48 AWS-Palo Alto Setup (Part One)

    Lecture 49 AWS-Palo Alto Setup (Part Two)

    Lecture 50 AWS-Palo Alto Setup (Part Three)

    Lecture 51 AWS-Palo Alto Setup (Part Four)

    Lecture 52 AWS-Palo Alto Setup (Part Five)

    Lecture 53 AWS-Palo Alto Setup (Part Six)

    Section 10: Zone and Dos Protection

    Lecture 54 Zone-Based Protection

    Lecture 55 DoS Protection

    Section 11: Authentication Portal / Captive Portal

    Lecture 56 Authentication Portal / Captive Portal

    Section 12: GlobalProtect

    Lecture 57 GlobalProtect GW

    Lecture 58 GlobalProtect Portal

    Lecture 59 GlobalProtect Clients

    Section 13: High Availability

    Lecture 60 High Availability

    This course is developed to give students a quick and effective overview of Security track and prepare you not only for the PCNSE certification exam but also you will learn how to configure Palo Alto next Generation Firewalls easy and fast.