Palo Alto Cortex XDR Training Workshop

Incent Management & Alert Analysis – see Threats in Action and learn how to analyze their behaviour with Cortex XDR

 

Introducing the “Cortex XDR: Prevention, Analysis, and Response” (EDU-260) training course, in this free training workshop, we will give you a taste of the course by teaching two full modules.

Palo Alto Cortex XDR Training Logo

Follow us on LinkedIn to hear when we run the next training workshop or .

What you will learn

  • The value of the “Cortex XDR: Prevention, Analysis, and Response” (EDU-260) training course – we will show you with some examples and use cases what you can learn in this course and how it can make your job easier
  • Incent Management & Alert Analysis – The instructor will teach the modules on Incident Management and Alert Analysis from the official Palo Alto Cortex XDR training course (EDU-260). He will demonstrate real-life use cases of how malware tries to infiltrate corporate networks and how you can identify such malicious behaviour using Cortex XDR.

Need Help?

Contact us or give us a call +353 (1) 5241014 / +1 (650) 407-1995​ – ​We are a Palo Alto Networks Certified Professional Service Provider (CPSP) and the Next-Generation Security Platform with Cortex XDR is what we do all day every day. Let us share our experience with you to make your Next-Generation Security project a smooth experience but most importantly a peace of mind by truly securing your valuable IT assets.

Palo Alto Certified Professional Service Provider (CPSP) Logo
Creative Commons Attribution ShareAlike for training courses

This document is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. You are free to share and adapt this document as long as you give appropriate credit to the author Lars Meyer. If you remix, transform or build upon the material, you must distribute your contributions under the same license as the original.

Disclaimer: Consigas Limited accepts no liability for the content of this blog post, or for the consequences of any actions taken on the basis of the information provided. Any views or opinions presented in this document are solely those of the author and do not necessarily represent those of Palo Alto Networks.


FireWall Troubleshooting – Demystifying the Flow Logic

​Introducing the “Firewall Troubleshooting” (EDU-330) course.

 

On Tuesday, 26th of January 2021, we run this training workshop for Palo Alto Networks. It gives a taste of the “Firewall Troubleshooting” (EDU-330) course by teaching a full module.

Palo Alto Training FireWall Troubleshooting EDU-330 Logo

Follow us on LinkedIn to hear when we run the next training workshop or .

What you will learn

  • The value of the “Firewall Troubleshooting” (EDU-330) course – we will show you with some examples and use cases what you can learn in this course and how it can make your job easier
  • Troubleshooting Security Policy match – troubleshooting why the desired security policy does not match can be highly frustrating. We will show you the Tipps and Tricks to find out what’s wrong.
  • Behind the scenes “The Flow Logic” – Did you ever wondered why certain traffic doesn’t show up in the traffic logs? We will explain to you the underlying architecture of the Next-Generation FireWall and what happens to a packet when it is being processed.

Need Help?

Contact us or give us a call +353 (1) 5241014 / +1 (650) 407-1995​ – ​We are a Palo Alto Networks Certified Professional Service Provider (CPSP) and the Next-Generation Security Platform is what we do all day every day. Let us share our experience with you to make your Next-Generation Security project a smooth experience but most importantly a peace of mind by truly securing your valuable IT assets.

Palo Alto Certified Professional Service Provider (CPSP) Logo
Creative Commons Attribution ShareAlike for training courses

This document is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. You are free to share and adapt this document as long as you give appropriate credit to the author Lars Meyer. If you remix, transform or build upon the material, you must distribute your contributions under the same license as the original.

Disclaimer: Consigas Limited accepts no liability for the content of this blog post, or for the consequences of any actions taken on the basis of the information provided. Any views or opinions presented in this document are solely those of the author and do not necessarily represent those of Palo Alto Networks.


Cortex XDR – Incident Management

Consigas’ Technical Director, Lars Meyer, presented this deep dive training session on Cortex XDR Incident Management at Palo Alto Networks Ignite’20

 

Learn more about Cortex XDR by joining the official training “Cortex XDR: Prevention, Analysis, and Response” (EDU-260)

Palo Alto Cortex XDR Training Logo

Follow us on LinkedIn to hear when we publish the next best practice video or .

Need Help?

Contact us or give us a call +353 (1) 5241014 / +1 (650) 407-1995​ – ​We are a Palo Alto Networks Certified Professional Service Provider (CPSP) and the Next-Generation Security Platform is what we do all day every day. Let us share our experience with you to make your Next-Generation Security project a smooth experience but most importantly a peace of mind by truly securing your valuable IT assets.

Palo Alto Certified Professional Service Provider (CPSP) Logo
Creative Commons Attribution ShareAlike for training courses

This document is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. You are free to share and adapt this document as long as you give appropriate credit to the author Lars Meyer. If you remix, transform or build upon the material, you must distribute your contributions under the same license as the original.

Disclaimer: Consigas Limited accepts no liability for the content of this blog post, or for the consequences of any actions taken on the basis of the information provided. Any views or opinions presented in this document are solely those of the author and do not necessarily represent those of Palo Alto Networks.


Firewall Hardening Best Practices for Palo Alto Networks

Introducing the all-new “Improving Security Posture and Hardening PAN-OS Firewalls” (EDU-214) course.

 

On Tuesday, 27th of October 2020, we run this training workshop for Palo Alto Networks. It gives a taste of the new course by teaching a full module. Learn how to leverage the full potential of your Next-Generation FireWall by improving the security posture and harden PAN-OS.

Palo Alto Training FireWall Best Practices EDU-214 Logo

Follow us on LinkedIn to hear when we publish the next best practice video or .

What you will learn

  • Best Practices – we show you the real thing so that you learn something valuable as a takeaway, no marketing fluff
  • ​Content – BPA using Expedition Tool, Policy Optimizer, Application-centric rules, Categorizing traffic into flows

Need Help?

Contact us or give us a call +353 (1) 5241014 / +1 (650) 407-1995​ – ​We are a Palo Alto Networks Certified Professional Service Provider (CPSP) and the Next-Generation Security Platform is what we do all day every day. Let us share our experience with you to make your Next-Generation Security project a smooth experience but most importantly a peace of mind by truly securing your valuable IT assets.

Palo Alto Certified Professional Service Provider (CPSP) Logo
Creative Commons Attribution ShareAlike for training courses

This document is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. You are free to share and adapt this document as long as you give appropriate credit to the author Lars Meyer. If you remix, transform or build upon the material, you must distribute your contributions under the same license as the original.

Disclaimer: Consigas Limited accepts no liability for the content of this blog post, or for the consequences of any actions taken on the basis of the information provided. Any views or opinions presented in this document are solely those of the author and do not necessarily represent those of Palo Alto Networks.


Security Best Practices Checklist for Palo Alto Networks Next-Generation FireWalls

Over 300 Best Practices to secure your network

Security Best Practices Checklist for Palo Alto Networks

​If implemented and managed correctly, the Palo Alto Networks Next-Generation FireWall is one of the few security solutions that can truly protect enterprises from modern cyber threats without negatively affecting their operation. We have put our over 10 years’ experience in working with Palo Alto Networks together and compiled this list of Best Practices to help you to secure your network by leveraging the full potential of your Palo Alto Networks Next-Generation FireWall. Besides our own, it incorporates security best practices recommended by Palo Alto Networks “BPA” as well as the Center for Internet Security “CIS Controls”.

Need Help?

Contact us or give us a call +353 (1) 5241014 / +1 (650) 407-1995​ – ​We are a Palo Alto Networks Certified Professional Service Provider (CPSP) and the Next-Generation Security Platform is what we do all day every day. Let us share our experience with you to make your Next-Generation Security project a smooth experience but most importantly a peace of mind by truly securing your valuable IT assets.

Palo Alto Certified Professional Service Provider (CPSP) Logo

security-best-practises-worksheet.xlsx

Download File

Palo Alto FireWall Best Practices Worksheet

url-filtering-categories-for-web-access-policy.xlsx

Download File

Palo Alto FireWall Best Practices Worksheet

Think this is useful ?
Follow us on LinkedIn

Creative Commons Attribution ShareAlike for training courses

This document is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. You are free to share and adapt this document as long as you give appropriate credit to the author Lars Meyer. If you remix, transform or build upon the material, you must distribute your contributions under the same license as the original.

Disclaimer: Consigas Limited accepts no liability for the content of this blog post, or for the consequences of any actions taken on the basis of the information provided. Any views or opinions presented in this document are solely those of the author and do not necessarily represent those of Palo Alto Networks.