Firewall 7.1: Manage CyberThreats

X

Student Registration Form

Thank you for being interested in our training! Fill out this form to pre-book or request information about the delivery options.

* Required

Course Schedule

I'd like to receive emails with the latest updates and promotions from Insoft.

Data Protection & Privacy

I hereby allow Insoft Ltd. to contact me on this topic. Further, I authorise Insoft Ltd. processing, using collecting and storing my personal data for the purpose of these activities. All your data will be protected and secured as outlined in our privacy policy.

Firewall 7.1: Manage CyberThreats

Firewall 7.1: Manage CyberThreats

2 Days Course
Network Security
1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 5.00 out of 5)
Loading...

Reviews

Course Details

Overview

This two-day, instructor-led course teaches strategies in defense against cyberthreats. Successful completion of this course enables administrators to better understand the threat landscape. Students will learn the use of Palo Alto Networks® next-generation firewalls, including the WildFire™ product.

Objectives

The Firewall 7.1: Manage Cyberthreats course is for students who want to understand cyberthreats and their characteristics. Students will learn how to manage cyberthreats using security policies, profiles, and signatures to protect their network against emerging threats.

Outline

Module 1: Threat Landscape

  • Advanced Persistent Threats
  • Data Breaches and Tactics
  • Threat Management Strategies

Module 2: Integrated

  • Approach to Threat Protection
  • Integrated Approach to Protection
  • Next-Generation Firewall
  • Advanced Endpoint Protection

Module 3: Network Visibility

  • Zero Trust Model
  • SSL Decryption
  • Decryption Policy

Module 4: Reducing the Attack Surface

  • App-ID to Reduce Attack Surface
  • Control Advanced Vectors
  • Handling Drive-By Downloads
  • DoS Protection

Module 5: Handling Known Threats

  • WildFire Analysis
  • Security Profiles

Module 6: Handling Unknown Traffic and Zero-Day Exploits

  • WildFire
  • Researching Threat Events
  • Identifying Unknown Applications

Module 7: Investigating Breaches

  • Identify IOCs Using App-Scope
  • Log Correlation
  • Finding Infected Host

Module 8: Using Custom Signatures

  • Creating Custom App-IDs
  • Threat Signatures

Target Audience

  • Firewall Administrators, Network Security Administrators, and Technical Professionals

Pre-Requisites

  • Students must complete the Firewall 7.1: Install, Configure, and Manage (EDU-201) course and have an understanding of network concepts, including routing, switching, and IP addressing. They also will need in-depth knowledge of port-based security and security technologies such as IPS, proxy, and content filtering

Course Schedule