Palo Alto Firewall V9 & V10 Training Link |
|
Lecture-01: Conman Network Security Terms. |
|
00:21:00 |
|
Lecture-02:Identify Malware Malicious Software. |
|
00:31:00 |
|
Lecture-03:Introduction to Firewall Technology. |
|
00:20:00 |
|
Lecture-04:About Palo Alto Networks Firewall. |
|
00:15:00 |
|
Lecture-05:Install Palo Alto Firewall In VMware. |
|
00:17:00 |
|
Lecture-06:Install Palo Alto On EVE-NG: |
|
00:15:00 |
|
Lecture-07:Install Palo Alto in GNS3: |
|
00:13:00 |
|
Lecture-08:Install Palo Alto On ESXI. |
|
00:12:00 |
|
Lecture-09:CLI Access Modes & Basic Commands. |
|
00:18:00 |
|
Lecture-10:Introduction to Dashboard Tab. |
|
00:22:00 |
|
Lecture-11:Palto Alto Initial Configuration. |
|
00:04:00 |
|
Lecture-12:Configure DNS & NTP in Palto Firewall. |
|
00:20:00 |
|
Lecture-13:Activate Licenses and Subscriptions. |
|
00:23:00 |
|
Lecture-14:Dynamic Updates and Software Updates. |
|
00:21:00 |
|
Lecture-15:Initial Working of Palo Alto Firewall. |
|
00:22:00 |
|
Lecture-16:Management Interface Configuration. |
|
00:27:00 |
|
Lecture-17:Palo Alto Firewall Interfaces Details. |
|
00:32:00 |
|
Lecture-18:Palo Alto Firewall Zones Details. |
|
00:12:00 |
|
Lecture-19:Routing Protocols,AD,Metric & Routing Tables. |
|
00:21:00 |
|
Lecture-20:Virtual Routers in Palo Alto Firewall. |
|
00:11:00 |
|
Lecture-21:Configure & Verify Static Routing in PA Firewall. |
|
00:49:00 |
|
Lecture-22:Configure & Verify Default Routing in PA Firewall. |
|
00:14:00 |
|
Lecture-23:Configure & Verify Dynamic Protocol RIP in PA. |
|
00:24:00 |
|
Lecture-24:Configure & Verify RIP Authentication in PA. |
|
00:18:00 |
|
Lecture-25:Configure & Verify Dynamic Protocol OSPF in PA. |
|
00:35:00 |
|
Lecture-26:Configure and Verify Redistribute in PA. |
|
00:14:00 |
|
Lecture-27:Security Policy Concept & Theory in PA. |
|
00:52:00 |
|
Lecture-28:Security Policy Granular Criteria and Control. |
|
00:45:00 |
|
Lecture-29:Security Policy Action Setting Options. |
|
00:29:00 |
|
Lecture-30:Security Policy Shadows Rule in PA. |
|
00:05:00 |
|
Lecture-31:Security Policy Test Policy Match Option. |
|
00:06:00 |
|
Lecture-32:Security Policy View Rulebase as Groups. |
|
00:09:00 |
|
Lecture-33:Security Policy Policy Optimizer Option. |
|
00:05:00 |
|
Lecture-34:Introduction to SSL and TLS certificates. |
|
00:17:00 |
|
Lecture-35:Configure SSL Forward Proxy in PA Firewall. |
|
00:25:00 |
|
Lecture-36:Introduction to Security Profiles Content-ID. |
|
00:10:00 |
|
Lecture-37:Configure Security Profile (Antivirus Profile). |
|
00:21:00 |
|
Lecture-38:Configure Security Profile (Anti-Spyware). |
|
00:25:00 |
|
Lecture-39:Configure Security Profile (Vulnerability). |
|
00:35:00 |
|
Lecture-40:Configure Security Profile (URL Filtering). |
|
00:37:00 |
|
Lecture-41:Configure Security Profile (File Blocking). |
|
00:19:00 |
|
Lecture-42:Configure Security Profile (WildFire Analysis). |
|
00:36:00 |
|
Lecture-43:Configure Security Profile (Data Filter). |
|
00:26:00 |
|
Lecture-44:Configure Security Profile (Security Group). |
|
00:10:00 |
|
Lecture-45:DoS & Zone Protection and Packet Buffer Theory. |
|
00:18:00 |
|
Lecture-46:Configure & Verify DoS Protection Profile. |
|
00:43:00 |
|
Lecture-47:Configure & Verify Zone Protection Profile. |
|
00:26:00 |
|
Lecture-48:Configure & Verify Packet Buffer Protection. |
|
00:10:00 |
|
Lecture-49:Palo Alto Firewall Layer 2 Deployment. |
|
00:31:00 |
|
Lecture-50:Palo Alto Firewall Tap Mode Deployment. |
|
00:25:00 |
|
Lecture-51:Palo Alto Firewall V-Wire Mode Deployment. |
|
00:23:00 |
|
Lecture-52:Palo Alto Firewall Sub-Interface Mode. |
|
00:23:00 |
|
Lecture-53:NAT Theory & Source Network Address Translation Types. |
|
00:18:00 |
|
Lecture-54:Source NAT Type Dynamic IP and Port (DIPP) Theory & Lab. |
|
00:46:00 |
|
Lecture-55:Source NAT Type Dynamic IP(DIP) Theory and Lab. |
|
00:11:00 |
|
Lecture-56:Source NAT Type Static IP Theory and Lab. |
|
00:11:00 |
|
Lecture-57:Destination Network Address Translation Static IP. |
|
00:21:00 |
|
Lecture-58:DNAT Port Forwarding and Port Translation. |
|
00:11:00 |
|
Lecture-59:U-Turn NAT-Network Address Translation Theory & Lab. |
|
00:18:00 |
|
Lecture-60:Objects (Address, Address Groups,Regions,Service, Service Group). |
|
00:46:00 |
|
Lecture-61:Introduction to App-ID in Palo Alto Firewall. |
|
00:39:00 |
|
Lecture-62: Walk-through and Details of Applications in PA Firewall. |
|
00:13:00 |
|
Lecture-63: Walk-through and Details of Applications Window in PA. |
|
00:18:00 |
|
Lecture-64:Application Shifts in Palo Alto Firewall. |
|
00:12:00 |
|
Lecture-65:Dependent Applications in Palo Alto Firewall. |
|
00:06:00 |
|
Lecture-66:Implicitly Use Applications in Palo Alto Firewall. |
|
00:02:00 |
|
Lecture-67:Application Groups in Palo Alto Firewall. |
|
00:14:00 |
|
Lecture-68: Application Filters in Palo Alto Firewall. |
|
00:15:00 |
|
Lecture-69:Custom Applications in Palo Alto Firewall. |
|
00:09:00 |
|
Lecture-70:Application Override in Palo Alto Firewall. |
|
00:14:00 |
|
Lecture-71:Application Updates in Palo Alto Firewall. |
|
00:04:00 |
|
Lecture-72:Security Policy based on Application in PA. |
|
00:12:00 |
|
Lecture-73:Introduction to User-ID (User Identification). |
|
00:06:00 |
|
Lecture-74:Captive Portal User-ID in Palo Alto Firewall. |
|
00:26:00 |
|
Lecture-75:AD,DNS, Users and Groups Configuration. |
|
00:16:00 |
|
Lecture-76:Palo Alto Firewall Active Directory Integration. |
|
00:43:00 |
|
Lecture-77:DHCP(Dynamic Host Configuration Protocol) Theory. |
|
00:16:00 |
|
Lecture-78:DHCP(Dynamic Host Configuration Protocol) Server Lab. |
|
00:29:00 |
|
Lecture-79:DHCP(Dynamic Host Configuration Protocol) Relay Lab. |
|
00:17:00 |
|
Lecture-80:Configure Interface Mgmt (Management) Profile. |
|
00:09:00 |
|
Lecture-81:Service Features Service Route Configuration. |
|
00:09:00 |
|
Lecture-82:Administrator Accounts & Dynamic Roles Configuration. |
|
00:17:00 |
|
Lecture-83:Administrator Accounts & Role Based Configuration. |
|
00:16:00 |
|
Lecture-84:Administrator Accounts Window Walk-through. |
|
00:10:00 |
|
Lecture-85:Administrator Accounts Password Complexity. |
|
00:26:00 |
|
Lecture-86:Redundancy High Availability (HA) Theory. |
|
00:33:00 |
|
Lecture-87:High Availability (HA) Active-Passive Lab. |
|
00:46:00 |
|
Lecture-88:Cryptography, Encryption and Hashing Concepts. |
|
00:37:00 |
|
Lecture-89:Internet Key Exchange, Version & Phases Theory. |
|
00:10:00 |
|
Lecture-90:VPN, Types, Protocols,Classification etc Theory. |
|
00:07:00 |
|
Lecture-91:IPSec Protocols, Features,Modes,Encryption Theory. |
|
00:06:00 |
|
Lecture-92:IPSec Site-to-Site Virtual Private Network VPN Lab. |
|
00:37:00 |
|
Lecture-93:Remote-Access VPN GlobalProtect Theory and Lab. |
|
01:26:00 |
|
Lecture-94:Log Types (Traffic,Threat, User-ID etc) in Monitor Tab. |
|
00:35:00 |
|
Lecture-95:Configure and Verify Syslog in Palo Alto Firewall. |
|
00:24:00 |
|
Lecture-96:Configure and Verify NetFlow in Palo Alto Firewall. |
|
00:15:00 |
|
Lecture-97:Configure and Verify SNMP in Palo Alto Firewall. |
|
00:16:00 |
|
Lecture-98:Configure and Verify Packet Capture GUI and CLI. |
|
00:36:00 |
|
Lecture-99:App Scope (Summary,Change,Threat,Network Monitor). |
|
00:05:00 |
|
Lecture-100:ACC (Application Command Center ) Tab Walk-through. |
|
00:17:00 |
|
Lecture-101:Configure Backup and Restore in Palo Alto Firewall. |
|
00:40:00 |
Assignment |
|
Assignment -Palo Alto Firewall V9 & V10 Training Course |
|
00:00:00 |