Course Curriculum - Firewall: Configuration and Management (EDU-210)
Module 0: Introduction 1. Core Features 2. The Threat Landscape - How a device gets compromised 3. Threat Prevention Techniques - How to protect end-user devices 4. Threat Prevention Techniques - How to protect a datacentre |
|
Module 1: Platforms and Architecture
1. Next-Generation FireWall Architecture - Concept 2. FireWall Platforms - Overview 3. Zero Trust Security Model - Concept 4. Public Cloud Security - Overview 5. Basic Troubleshooting Methodologies |
Module 2: Initial Configuration
1. Administrative Controls - Overview 2. CLI - Overview and HowTo 3. Initial Access to the System - HowTo 4. Maintenance Mode and Password Recovery - HowTo 5. Configuration Management - Concept and HowTo 6. Committing a Config and Transaction Locks - Concept and HowTo 7. Config Audit and Configuration Log - Concept and HowTo 8. Licensing - Overview and HowTo 9. Software Updates - HowTo 10. PAN-OS and Dynamic Updates - Best Practices 11. Software Updates - Troubleshooting 12. Using Log files for Troubleshooting 13. Service Route - Concept, Best-Practices and Configuration 14. Account Administration - Concept and Configuration 15. Account Administration - Best Practices 16. Account Administration - Troubleshooting 17. Viewing and Filtering Logs - Overview and HowTo |
|
|
Module 3: Interface Configuration
1. Flow Logic and Deployment Options - Concept and Overview 2. Security Zones and Interfaces - Concept 3. Layer 3 interfaces - Concept and Use Cases 4. Layer 3 interface - Configuration 5. Layer 3 Subinterfaces - Concept and Use Cases 6. Layer 3 Subinterfaces - Configuration and Best Practices 7. Interface Management Profile - Concept 8. Interface Management Profile - Configuration and Best Practices 9. Virtual-Wire - Concept and Use Cases 10. Virtual-Wire - Configuration 11. Tap interfaces - Concept and Use Cases 12. Tap interface - Configuration 13. Layer 2 interfaces - Concept and Use Cases 14. Layer 2 interface - Configuration 15. Virtual Router - Concept 16. Virtual Router - Configuration 17. Virtual Router - Troubleshooting 18. PBF - Concept and Use Cases 19. Route Path Monitoring - Configuration 20. PBF - Configuration and Best Practices 21. PBF - Troubleshooting |
Module 4: Security and NAT Policies
1. Security Policy Fundamentals - Concept 2. Security Policy Administration - HowTo 3. NAT Overview and Flow Logic - Concept 4. Source NAT - Concept 5. Source NAT - Configuration 6. Source NAT with Static or Dynamic mapping - Concept and Configuration 7. Destination NAT - Concept 8. Destination NAT - Configuration 9. Destination NAT with Port Forwarding - Concept and Configuration 10. Bi-Directional NAT - Concept and Configuration 11. NAT Troubleshooting |
|
|
Module 5: Application Identification
1. Application Identification - Overview 2. Application Identification Flow Logic - Concept 3. Using App-ID in a Security Policy - Concept and HowTo 4. Updating App-ID - HowTo 5. Security Policy and App-ID - Troubleshooting |
Module 6: Content-ID
1. Content-ID - Overview 2. AntiVirus - Concept Configuration and HowTo 3. AntiSpyware - Configuration and Log HowTo 4. Vulnerability Protection - Configuration and Log HowTo 5. File Blocking - Configuration and Log HowTo 6. External Dynamic Lists - Concept and Configuration 7. Security Profile - Best Practices 8. DoS Protection - Concept 9. DoS Zone Protection - Configuration 10. DoS Protection Policy - Configuration 11. DoS Protection - Best Practices |
|
|
Module 7: URL Filtering
1. URL Filtering - Overview 2. URL Filtering - Configuration |
Module 8: Decryption
1. SSL - Concept 2. SSL Outbound Decryption - Concept 3. SSL Outbound Decryption - Configuration |
|
|
Module 9: Wildfire
1. Wildfire - Concepts 2. Wildfire - Configuration and Reporting |
Module 10: User Identification
1. User-ID - Concept 2. Terminal Services Agent - Concept 3. Active Directory Integration - Concepts and Best Practices 4. User-ID - Configuration and Best Practices 5. User-ID and Group Mapping - Troubleshooting |
|
|
Module 11: GlobalProtect
1. GlobalProtect - Concept 2. GlobalProtect - Configuration and Best Practices |
Module 12: Site-to-Site VPN
1. Site to Site VPN - Concept 2. Site to Site VPN - Configuration and Best Practices 3. Site to Site VPN - Troubleshooting |
|
|
Module 13: Monitoring and Reporting
1. ACC - HowTo |
Module 14: High Availability
1. High Availability - Overview 2. Active/Passive High Availability - Concept 3. Active/Passive High Availability - Configuration and Best Practices |
|
|
Module 15: Security Best Practices
1. Network Security Framework - Concept 2. Migration Strategy - Concept 3. Migration Tool - HowTo 4. Designing a Web Access Policy - Concept and Configuration 5. Threat Investigation Reporting - HowTo 6. Threat Investigation Analysis - HowTo |
Recommended follow on courses
Firewall: Optimizing FireWall Threat Prevention (EDU-214)
Firewall: Troubleshooting (EDU-330)
Firewall: Optimizing FireWall Threat Prevention (EDU-214)
Firewall: Troubleshooting (EDU-330)
Learn more effectively by focusing on what is relevant to your job role
As part of our training we provide you with over 100 short videos of about 15-30min that allow you to pick and choose the content that is most relevant to you and your job role. When booking the course, you will get access to all videos and in order to learn most effectively we have developed the below curriculum which are customized around specific job profiles to give you some guidance on what videos to focus on in order to make best use of your time.
- Next-Generation FireWall for Solution Architects (check out the detailed curriculum)
- Next-Generation FireWall for FireWall Administrator (check out the detailed curriculum)
- Next-Generation FireWall for SOC Security Analysts and Threat Researcher (check out the detailed curriculum)
- Next-Generation FireWall for IT Manager and Security Officer (check out the detailed curriculum)