Companies Home Search Profile

Palo Alto Networks Certified Network Security Administrator (PCNSA)

Focused View

12:27:17

71 View
  • 1-Intro to Building a Lab using EVE-NG.mp4
    00:46
  • 2-Lab Overview.mp4
    08:37
  • 3-Image Prep for EVE-NG.mp4
    07:39
  • 4-LAB design.mp4
    04:28
  • 5-Build the Lab Topology.mp4
    13:41
  • 6-Adding LAB Routing.mp4
    07:44
  • 7-Backup and Snapshots.mp4
    05:11
  • 1-Intro to Palo Alto FW Networking.mp4
    01:11
  • 2-Palo Alto FW Networking Overview.mp4
    06:34
  • 3-Initial Bootstrap Config.mp4
    15:05
  • 4-L3 Security Zones.mp4
    06:07
  • 5-L3 Interfaces.mp4
    05:43
  • 6-Virtual Router Overview.mp4
    07:54
  • 7-Adding Static Routes.mp4
    04:17
  • 8-Using Dynamic Routing.mp4
    10:24
  • 1-Intro to DHCP and NAT.mp4
    00:29
  • 2-Configure DHCP.mp4
    06:33
  • 3-Testing DHCP.mp4
    05:13
  • 4-Troubleshooting a Failed Ping Request.mp4
    06:11
  • 5-NAT PAT Overview.mp4
    06:40
  • 6-Configure NAT PAT.mp4
    08:36
  • 7-Configure a Basic Security Policy Rule.mp4
    14:43
  • 1-Security Policy Overview.mp4
    09:34
  • 2-RAndR (RNR) Review.mp4
    07:01
  • 3-Intro to Security Policies.mp4
    00:59
  • 4-Adding a DMZ.mp4
    12:27
  • 5-Inside to DMZ Security Rule.mp4
    11:19
  • 6-Outside to DMZ Game Plan.mp4
    04:45
  • 7-Destination NAT to DMZ Server.mp4
    07:28
  • 8-Outside to DMZ Security Rule.mp4
    04:50
  • 9-Testing Outside to DMZ Server.mp4
    06:02
  • 1-Intro to Virtual Wire and Tap Interfaces.mp4
    00:49
  • 2-Interface Type Overview.mp4
    09:53
  • 3-Tap Interface Overview.mp4
    06:08
  • 4-Implement a Tap Interface.mp4
    02:51
  • 5--Virtual Wire Overview.mp4
    06:53
  • 6-Implement a Virtual Wire.mp4
    06:59
  • 7-Security Policy Rules for V-Wire.mp4
    07:50
  • 8-Layer 2 Interfaces.mp4
    12:59
  • 1-Intro to App-ID.mp4
    01:36
  • 2-App-ID Fundamentals.mp4
    14:07
  • 3-App-ID Dependencies.mp4
    11:25
  • 4-Application Groups.mp4
    06:48
  • 5-Application Filters.mp4
    05:06
  • 6-Convert to App-ID Security Rules.mp4
    12:11
  • 7-Updates to App-ID.mp4
    05:07
  • 1-Intro to SSL-TLS Decryption.mp4
    02:00
  • 2-SSL-TLS Decryption Overview.mp4
    07:41
  • 3-Generate a Self-signed Cert.mp4
    05:00
  • 4-Adding a Trusted CA to Clients.mp4
    10:21
  • 5-Implement Decryption Policy Rules.mp4
    08:17
  • 6-Verify Decryption Policy.mp4
    05:34
  • 7-Add a Decryption Policy to PA-FW2.mp4
    06:12
  • 1-Intro to Site to Site VPNs.mp4
    01:05
  • 2-Site to Site VPNs Overview.mp4
    09:20
  • 3-Ingredients for Palo Alto Site to Site VPN.mp4
    06:46
  • 4-Site to Site Game Plan.mp4
    03:12
  • 5-Implement Site to Site VPN.mp4
    14:42
  • 6-VPNs and Routing.mp4
    06:50
  • 7-Security Policy Rules for VPN.mp4
    08:29
  • 1-Intro to Palo Alto User-ID.mp4
    01:02
  • 2-User-ID Fundamentals.mp4
    06:12
  • 3-User-ID Game Plan.mp4
    03:54
  • 4- User-ID Setup.mp4
    07:08
  • 5-LDAP and Group Mapping.mp4
    07:11
  • 6-Security Policies with User-ID.mp4
    11:25
  • 7-User-ID Example And Review.mp4
    13:25
  • 1-Intro to URL Filtering.mp4
    00:46
  • 2-URL Filtering Overview.mp4
    04:28
  • 3-URLs in Rules.mp4
    07:59
  • 4-Custom URL Categories.mp4
    06:41
  • 5-External Dynamic Lists (EDL).mp4
    10:42
  • 6-URL Security Profilescip.mp4
    17:34
  • 1-Intro to Threat Prevention.mp4
    01:02
  • 2-Threat Prevention Overview.mp4
    09:09
  • 3-Licensing and Updates.mp4
    07:33
  • 4-Vulnerability Protection Profiles.mp4
    19:32
  • 5-Antivirus Security Profiles.mp4
    14:10
  • 6-Anti-Spyware Security Profiles.mp4
    16:59
  • 1-Intro to Palo Alto WildFire.mp4
    01:13
  • 2-WildFire Overview.mp4
    10:37
  • 3-WildFire Files and Flowchart.mp4
    05:26
  • 4-WildFire Initial Configuration.mp4
    08:28
  • 5-Testing WildFire Submissions.mp4
    09:23
  • 6-Monitoring WildFire.mp4
    10:30
  • 1-Intro to Firewall Management.mp4
    01:37
  • 2-Cyber Attack Lifecycle.mp4
    08:45
  • 3-Configuration Management.mp4
    14:58
  • 4-Managing Administrators.mp4
    19:27
  • 5-Monitoring.mp4
    13:39
  • 1-Introduction to Firewall HA.mp4
    00:46
  • 2-HA Overview.mp4
    07:50
  • 3-HA Pair Interfaces Links.mp4
    07:02
  • 4-Active Passive Game Plan.mp4
    03:38
  • 5-Configure Active-Passive HA.mp4
    14:04
  • 6-Configurations on Active Firewall.mp4
    05:14
  • 7-Testing the HA Pair.mp4
    13:26
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    CBT Nuggets is renowned for providing innovative training that's informative, meaningful, and engaging. We provide a variety of training, primarily in IT, project management, and office productivity topics. Our comprehensive library contains thousands of training videos ranging from Cisco networking to Microsoft Word. Whether you want to pass a certification exam, increase your skills, or simply learn new things, we've got you covered! All of our training is delivered through high-quality online streaming video. Subscribers can train 24 hours a day, seven days a week, from the convenience of a computer or mobile device. CBT Nuggets trainers are the rock stars of training, renowned for their expertise, industry-wide credibility, and engaging personalities. They enable CBT Nuggets to deliver accurate, up-to-date training, using a laid-back whiteboard presentation style. There are no scripts, EVER. Our trainers love to teach, and it shows! CEO and founder Dan Charbonneau was a Microsoft trainer when he began recording CBT Nuggets' very first training videos back in the 1990s. He wanted to help provide large organizations, small teams and individuals with comprehensive and budget-conscious training, and he realized it couldn't be done in a classroom. From the CBT Nuggets World Headquarters in Eugene, Oregon, Dan and his team promise each video will be informative, comprehensive, accurate, and fun to watch.
    • language english
    • Training sessions 97
    • duration 12:27:17
    • Release Date 2023/08/24

    Courses related to Network Security

    Courses related to Computer Network

    Courses related to IT Networking Fundamentals

    Courses related to Network Engineering

    Courses related to Firewall