Preferred method of contact:

(PA-231) Firewall: Manage Cyberthreats

COURSE TYPE

Intermediate

Course Number

1676

Duration

2 Days
Request Team Training

PDF Add to WishList

This instructor-led course teaches strategies in defense against advanced threats. Successful completion of this course enables administrators to better understand the threat landscape. Students will learn the use of Palo Alto Networks® Next-Generation firewalls, including the WildFire™ product.

You Will Learn How To

Threat Management Course is for students who want to understand Advanced Threats and their characteristics. Students will learn how to manage advanced threats using security policies, profiles, and signatures to protect their network against emerging threats.

Important Course Information

Requirements:

  • Students must complete the Firewall: Install, Configure, and Manage (201) course and have an understanding of network concepts, including routing, switching, and IP addressing. They will also need in-depth knowledge of port-based security and security technologies such as IPX, proxy, and content filtering.

Learning Tree Training Vouchers cannot be used to pay for the tuition fee for this course.

This course is delivered by a Learning Tree approved training partner.

Course Outline

  • Day 1

Module 0: Course Introduction

Module 1: Threat Landscape

  • Palo Alto Networks Technologies
  • WildFire Architecture
  • Advanced Persistent Threats
  • Threat Management Strategies

Module 2: Integrated Approach to Threat Protection

  • Apply Best Practices
  • Reduce the Attack Surface
  • Control Attack Methodology

Module 3: Handling Known Threats

  • Configuring Security Profiles
  • Zone and DoS Protection
  • Control Advance Threat Enablers
  • Handling Drive-By Downloads
  • Day 2

Module 4: Investigating Attacks

  • Threat Vault
  • Wildfire Logs and Reports
  • Log Correlation
  • Using AppScope
  • Creating Custom App-IDs

Module 5: Dealing with Zero-Day Attacks

  • Researching Threat Events
  • Identifying Unknown Threats
  • Finding Infected Hosts

Module 6: Creating Custom Threat Signatures

  • Build Custom Signatures
  • Create Emerging Threat Signature
Show complete outline
Show Less

Exclusive Private Team Training Course

Enhance your team's effectiveness and boost productivity with this course, delivered privately to your organization or to any preferred location, including options for hybrid or all-virtual delivery via WebEx.

Preferred method of contact:

- ,

Prev
Next
Chat Now

Please Choose a Language

Canada - English

Canada - Français