• Training & Courses
    • Configuration ​(210)
    • FireWall Hardening (214)
    • Troubleshooting (330)
    • Panorama (220)
    • Prisma Access ​(318)
    • Cortex XDR (260)
    • Lab Rental
  • Dates & Pricing
  • Consulting
    • Best Practice Audit
  • Best Practices
  • Testimonials
  • About Us
    • News
    • Brand
  • Contact
  • Training & Courses
    • Configuration ​(210)
    • FireWall Hardening (214)
    • Troubleshooting (330)
    • Panorama (220)
    • Prisma Access ​(318)
    • Cortex XDR (260)
    • Lab Rental
  • Dates & Pricing
  • Consulting
    • Best Practice Audit
  • Best Practices
  • Testimonials
  • About Us
    • News
    • Brand
  • Contact

Course Curriculum - Firewall: Configuration and Management (EDU-210)


​Module 0: Introduction
     1. Core Features
     2. The Threat Landscape - How a device gets compromised
     3. Threat Prevention Techniques - How to protect end-user devices
     4. Threat Prevention Techniques - How to protect a datacentre
​
 
Module 1: Platforms and Architecture 
     1. Next-Generation FireWall Architecture - Concept
     2. FireWall Platforms - Overview
     3. Zero Trust Security Model - Concept
     4. Public Cloud Security - Overview
     5. Basic Troubleshooting Methodologies
​

Module 2: Initial Configuration
     1. Administrative Controls - Overview

     2. CLI - Overview and HowTo
     3. Initial Access to the System - HowTo
     4. Maintenance Mode and Password Recovery - HowTo
     5. Configuration Management - Concept and HowTo
     6. Committing a Config and Transaction Locks - Concept and HowTo
     7. Config Audit and Configuration Log - Concept and HowTo
     8. Licensing - Overview and HowTo
     9. Software Updates - HowTo
     10. PAN-OS and Dynamic Updates - Best Practices
     11. Software Updates - Troubleshooting
     12. Using Log files for Troubleshooting
     13. Service Route - Concept, Best-Practices and Configuration
     14. Account Administration - Concept and Configuration
     15. Account Administration - Best Practices
     16. Account Administration - Troubleshooting
     ​17. Viewing and Filtering Logs - Overview and HowTo
​

 
 
Module 3: Interface Configuration
     1. Flow Logic and Deployment Options - Concept and Overview

     2. Security Zones and Interfaces - Concept
     3. Layer 3 interfaces - Concept and Use Cases
     4. Layer 3 interface - Configuration
     5. Layer 3 Subinterfaces - Concept and Use Cases
     6. Layer 3 Subinterfaces - Configuration and Best Practices
     7. Interface Management Profile - Concept
     ​8. Interface Management Profile - Configuration and Best Practices
     9. Virtual-Wire - Concept and Use Cases
     10. Virtual-Wire - Configuration
     11. Tap interfaces - Concept and Use Cases
     12. Tap interface - Configuration
     13. Layer 2 interfaces - Concept and Use Cases
     14. Layer 2 interface - Configuration
     15. Virtual Router - Concept
     16. Virtual Router - Configuration
     17. Virtual Router - Troubleshooting
     18. PBF - Concept and Use Cases
     19. Route Path Monitoring - Configuration
     20. PBF - Configuration and Best Practices
     ​21. PBF - Troubleshooting
​

Module 4: Security and NAT Policies
     1. Security Policy Fundamentals - Concept

     2. Security Policy Administration - HowTo
     3. NAT Overview and Flow Logic - Concept
     4. Source NAT - Concept
     5. Source NAT - Configuration
     6. Source NAT with Static or Dynamic mapping - Concept and Configuration
     7. Destination NAT - Concept
     8. Destination NAT - Configuration
     9. Destination NAT with Port Forwarding - Concept and Configuration
     10. Bi-Directional NAT - Concept and Configuration
     ​11. NAT Troubleshooting
​

 
 
Module 5: Application Identification
     1. Application Identification - Overview

     2. Application Identification Flow Logic - Concept
     3. Using App-ID in a Security Policy - Concept and HowTo
     4. Updating App-ID - HowTo
     ​5. Security Policy and App-ID - Troubleshooting
​

Module 6: Content-ID
     1. Content-ID - Overview

     2. AntiVirus - Concept Configuration and HowTo
     3. AntiSpyware - Configuration and Log HowTo
     4. Vulnerability Protection - Configuration and Log HowTo
     5. File Blocking - Configuration and Log HowTo
     6. External Dynamic Lists - Concept and Configuration
     7. Security Profile - Best Practices
     8. DoS Protection - Concept
     9. DoS Zone Protection - Configuration
     10. DoS Protection Policy - Configuration
     11. DoS Protection - Best Practices
​

 
 
Module 7: URL Filtering
     1. URL Filtering - Overview
     2. URL Filtering - Configuration
​


​

Module 8: Decryption
     1. SSL - Concept

     2. SSL Outbound Decryption - Concept
     ​3. SSL Outbound Decryption - Configuration
​

​

 
 
Module 9: Wildfire
     1. Wildfire - Concepts
     2. Wildfire - Configuration and Reporting


​
​
Module 10: User Identification
     1. User-ID - Concept

     2. Terminal Services Agent - Concept
     3. Active Directory Integration - Concepts and Best Practices
     4. User-ID - Configuration and Best Practices
     ​5. User-ID and Group Mapping - Troubleshooting
​

 
 
Module 11:  GlobalProtect
     1. GlobalProtect - Concept
     2. GlobalProtect - Configuration and Best Practices



​

Module 12: Site-to-Site VPN
     1. Site to Site VPN - Concept

     2. Site to Site VPN - Configuration and Best Practices
     ​3. Site to Site VPN - Troubleshooting


​

 
 
Module 13: Monitoring and Reporting
     1. ACC - HowTo




​

Module 14: High Availability
     1. High Availability - Overview

     2. Active/Passive High Availability - Concept
     ​3. Active/Passive High Availability - Configuration and Best Practices


​

 
 
Module 15: Security Best Practices
     1. Network Security Framework - Concept

     2. Migration Strategy - Concept
     3. Migration Tool - HowTo
     4. Designing a Web Access Policy - Concept and Configuration
     5. Threat Investigation Reporting - HowTo
     6. Threat Investigation Analysis - HowTo
Recommended follow on courses
Firewall: Optimizing FireWall Threat Prevention (EDU-214)
Firewall: Troubleshooting (EDU-330)

​
Let's Go for It
Learn more effectively by focusing on what is relevant to your job role
As part of our training we provide you with over 100 short videos of about 15-30min that allow you to pick and choose the content that is most relevant to you and your job role. When booking the course, you will get access to all videos and in order to learn most effectively we have developed the below curriculum which are customized around specific job profiles to give you some guidance on what videos to focus on in order to make best use of your time.
  • Next-Generation FireWall for Solution Architects (check out the detailed curriculum)
  • Next-Generation FireWall for FireWall Administrator (check out the detailed curriculum)
  • Next-Generation FireWall for SOC Security Analysts and Threat Researcher (check out the detailed curriculum)
  • Next-Generation FireWall for IT Manager and Security Officer (check out the detailed curriculum)
Privacy Policy

​© 2021 Copyright Consigas Ltd. All Rights Reserved
Consigas Limited is registered in Ireland under company number 524218

​Registered office is 6-9 Trinity Street, Dublin, D02 EY47​, Ireland