After successful completion of this three-day, instructor-led course, you will understand how to manage and maintain an existing Palo Alto Networks Firewall protected environment. You will learn how to improve non-green field environments and will be better equipped at ensuring configurations match security best practice. You will also be able to develop your own operational strategy to maintain a high level of compliance.
Palo Alto Networks: Firewall: Improving Security Posture and Hardening PAN-OS Firewalls (PAN-EDU-214)
Schedule
- T85757
- 5 days
- 12/16/2024 - 12/20/2024*
- 8:00 AM
- (GMT -06:00) Central Standard Time
- Presented via WebEx
- VC
Virtual Classroom
Attend any of our instructor-led classes virtually regardless of your physical location.
- VC
- PC
Private Class
Privately train a group of your employees at your facility, virtually, or any of our locations.
- PC
- LCLive Classroom
Live Classroom
Learn and interact with your instructor and peers in-person in our classrooms. - VCVirtual Classroom
Virtual Classroom
Attend any of our instructor-led classes virtually regardless of your physical location. - PCPrivate Class
Private Class
Privately train a group of your employees at your facility, virtually, or any of our locations. - GTRGuaranteed to Run
Guaranteed to Run
GTR classes are guaranteed to run as promised and delivered.
*event may not be applicable to special offers or promotions.
Course Summary
Show All
Description
Objectives
- Determine the efficacy of your current security policies
- Develop workflows for managing your security posture
- Identify rule usage across security policy sets
- Modify your existing policy set to implement Security Best Practices
- Monitor network traffic using the interactive web interface and firewall reports
- Utilize tools such as the BPA tool to further understand your environment
Prerequisites
Students must have completed the Palo Alto Network: Firewall Essentials: Configuration and Management course. Students also should be familiar with basic security concepts. Experience with other security technologies (IPS, proxy, and content filtering) is a plus.
Who Should Attend
- Security Engineers
- System Administrators
- Security Operations Specialists
- Security Analysts
- Network Engineers
- Support Staff
Outline
- Module 1: Introduction
- Module 2: Security Profile Revision
- Module 3: Daily Operations and Maintenance
- Module 4: Establish Initial Baseline Visibility
- Module 5: Analyze and Update Security Rules Passing Traffic
- Module 6: Inbound Security Rules Best Practices and Analysis
- Module 7: Outbound Security Rules Best Practices and Analysis
- Module 8: Internal Security Rules Best Practices and Analysis
- Module 9: Administratively Hardening PAN-OS
- Module 10: Reducing Policy Set and Simplification