PALO ALTO

PALO ALTO

Palo Alto Networks certification offers a expertise over complete set of Production-Level next-generation firewalls, with a varied range of security features for your network. Palo Alto Networks next-generation firewalls are designed, architected and implemented to enhance applications safe & Secure and also to prevent them from modern threats.

Mistical Minds, Palo Alto training course allows participants to get trained and equip themselves with latest skills and tools necessary to gain perfection on next generation firewalls. They learn to configure and manage firewalls, Mitigate threats with features like Traps and Wild Fire, manage multiple firewalls with Panorama as well.

The course has been designed in a way to help engineers in getting expertise with the skills required to understand, support, troubleshoot and manage Palo Alto Networks Next-Generation Security Platform enterprise level series.

The training is delivered through experience trainer with rich experience into security. We offer Hands on labs to prepare you in and for the real environment. The course becomes complete if you want to gain expertise needed to protect your organization from advanced Cyber Security
attacks & leading threats.

Our delivery formats are comfortable as students have a choice to go for classroom training or virtual training.

Enquire Now

Platform & architecture

  • Understand Single Pas Architecture
  • Understand Control Plane and Data Plane
  • Understand Flow Logic
  • Detailed Packet Flow

Administration and management

  • Understand GUI, CLI, and API
  • Understand Configuration Management
  • Understand PAN-OS and Software Updates

Interface configuration

  • Understand Interface Configuration
    – Layer 2
    – Layer 3
    – Virtual Wire
    – Tap
    – Sub-interfaces
  • Understand Security Zones

Layer 3 configuration

  • Interface Management
  • Service Routes
  • DHCP
  • Virtual Routers

Network address translation

  • Source and Destination NAT
  • NAT Policy Configuration

Network address translation

  • Source and Destination NAT
  • NAT Policy Configuration

Application identification

  • App-ID traffic flow
  • App-ID and Security Policy Configuration
  • Policy Administration
  • Policy Objects

Understand authentication profiles

  • Setting Up Authentication Profiles
  • Creating a Local User Database
  • Configuring RADIUS Server Settings
  • Configuring LDAP Server Settings

Understand authentication profiles

  • Setting Up Authentication Profiles
  • Creating a Local User Database
  • Configuring RADIUS Server Settings
  • Configuring LDAP Server Settings

User-id concepts

  • User-ID Agent
  • Enumerating Users
  • Mapping Users to IP
  • Users in Security Policy

VPN technologies

  • IPSec and IKE
  • IPSec and IKE Crypto Profiles
  • Setting Up IPSec VPNs
  • Defining IKE Gateways
  • Defining IKE Crypto Profiles
  • Defining IPSec Crypto Profiles
  • Viewing IPSec Tunnel Status on the Firewall

Reports and logs

  • Logging Configuration
  • Scheduling Log Exports
  • Defining Configuration Log Settings
  • Defining System Log Settings
  • Defining HIP Match Log Settings
  • Defining Alarm Log Settings
  • Managing Log Settings
  • Configuring Syslog Servers
  • Custom Syslog Field Descriptions

Centralized management overview

  • Introduction to Centralized Management
  • Overview of Panorama Architecture

Learn Bug Bounty Hunting

Contact for demo classes
Change does not roll on the wheels of inevitability, but comes through continuous struggle. Join us to be a champ.