Companies Home Search Profile

Palo Alto Next-Generation Firewall Online Training

Focused View

Keith Barker

34:29:16

206 View
  • 1. Intro to Palo Alto Networking Fundamentals .mp4
    00:45
  • 2. Network Devices .mp4
    09:02
  • 3. Routed vs Routing Protocols .mp4
    13:51
  • 4. Routing Protocol Example .mp4
    09:49
  • 5. Network Types and Topologies .mp4
    12:53
  • 6. Domain Name System .mp4
    07:39
  • 7. Internet of Things IoT .mp4
    06:01
  • 1. Intro to Next-gen Firewall Features .mp4
    00:36
  • 2. Next-gen Firewall Overview .mp4
    11:44
  • 3. SSL Decryption .mp4
    07:36
  • 4. User Awareness .mp4
    09:13
  • 5. Application Awareness .mp4
    09:05
  • 6. URL Filtering .mp4
    06:35
  • 7. Threat Prevention .mp4
    07:05
  • 8. WildFire .mp4
    05:50
  • 1. Intro to the Cyberattack Lifecycle .mp4
    01:01
  • 2. Cyberattack Examples .mp4
    05:27
  • 3. Attacker Profile and Motivations .mp4
    03:50
  • 4. Overview of the Cyberattack Lifecycle .mp4
    14:39
  • 5. Advanced Persistent Threats .mp4
    03:12
  • 6. Preventing a Successful Attack .mp4
    16:16
  • 7. Preventing Port Scanning .mp4
    06:41
  • 1. Intro to Vulnerabilities, Exploits, and Risk .mp4
    00:30
  • 2. Overview of Vulnerabilities, Exploits, and Risk .mp4
    11:34
  • 3. Social Engineering .mp4
    07:28
  • 4. Circumventing Port-Based Firewalls .mp4
    12:47
  • 5. Types of Malware .mp4
    07:38
  • 6. Spamming and Phishing .mp4
    05:23
  • 7. DoS, DDoS, and Botnets .mp4
    09:03
  • 8. Wi-Fi Attacks .mp4
    09:28
  • 1. Intro to Cloud Computing and Security .mp4
    00:32
  • 2. Cloud Computing and Security Overview .mp4
    09:34
  • 3. SaaS Application Risks .mp4
    17:11
  • 4. Cybersecurity Laws and Regulations .mp4
    05:00
  • 5. User Identification .mp4
    10:28
  • 6. App Identification .mp4
    10:22
  • 1. Intro to Strategies for Securing Networks .mp4
    00:29
  • 2. Overview of Strategies for Securing Networks .mp4
    14:24
  • 3. Perimeter-based Network Security .mp4
    08:46
  • 4. Zero Trust and Least Privilege .mp4
    13:58
  • 5. Secure Platform Features .mp4
    10:16
  • 6. Palo Alto Networks Offerings .mp4
    15:04
  • 1. Intro to SecOps and DevSecOps .mp4
    00:40
  • 2. Dev, Ops, and Security Overview .mp4
    08:14
  • 3. SecOps Building Blocks .mp4
    09:30
  • 4. Cloud Security Challenges .mp4
    20:53
  • 5. VMs and Containers .mp4
    11:53
  • 6. Serverless Computing .mp4
    05:04
  • 7. Outsourcing Security .mp4
    13:32
  • 1. Intro to Building a Lab using EVE-NG .mp4
    00:46
  • 2. Lab Overview .mp4
    08:37
  • 3. Image Prep for EVE-NG .mp4
    07:39
  • 4. LAB design .mp4
    04:28
  • 5. Build the Lab Topology .mp4
    13:41
  • 6. Adding LAB Routing .mp4
    07:44
  • 7. Backup and Snapshots .mp4
    05:11
  • 1. Intro to Palo Alto FW Networking .mp4
    01:11
  • 2. Palo Alto FW Networking Overview .mp4
    06:34
  • 3. Initial BootstrapConfig .mp4
    15:05
  • 4. L3 Security Zones .mp4
    06:07
  • 5. L3 Interfaces .mp4
    05:43
  • 6. Virtual Router Overview .mp4
    07:54
  • 7. Adding Static Routes .mp4
    04:17
  • 8. Using Dynamic Routing .mp4
    10:24
  • 1. Intro to DHCP and NAT .mp4
    00:29
  • 2. Configure DHCP .mp4
    06:33
  • 3. Testing DHCP .mp4
    05:13
  • 4. Troubleshooting a Failed Ping Request .mp4
    06:11
  • 5. NATPAT Overview .mp4
    06:40
  • 6. Configure NATPAT .mp4
    08:36
  • 7. Configure a Basic Security Policy Rule .mp4
    14:43
  • 1. Intro to Security Policies .mp4
    00:59
  • 2. Security Policy Overview .mp4
    09:34
  • 3. RAndR (RNR) Review .mp4
    07:01
  • 4. Adding a DMZ .mp4
    12:27
  • 5. Inside to DMZ Security Rule .mp4
    11:19
  • 6. Outside to DMZ Game Plan .mp4
    04:45
  • 7. Destination NAT to DMZ Server .mp4
    07:28
  • 8 .Outside to DMZ Security Rule .mp4
    04:50
  • 9. Testing Outside to DMZ Server .mp4
    06:02
  • 1. Intro to Virtual Wire and Tap Interfaces .mp4
    00:49
  • 2. Interface Type Overview .mp4
    09:53
  • 3. Tap Interface Overview .mp4
    06:08
  • 4. Implement a Tap Interface .mp4
    02:51
  • 5. Virtual Wire Overview .mp4
    06:53
  • 6. Implement a Virtual Wire .mp4
    06:59
  • 7. Security Policy Rules for V-Wire .mp4
    07:50
  • 8. Layer 2 Interfaces .mp4
    12:59
  • 1. Intro to Building a Lab using ESXi .mp4
    00:45
  • 2. ESXi Based Lab Overview .mp4
    03:41
  • 3. Lab Components .mp4
    09:20
  • 4. ESXi Networking .mp4
    10:18
  • 5. Lab Routing with Vyos .mp4
    12:59
  • 6. Setting up Lab VMs .mp4
    14:02
  • 1. Intro to App-ID .mp4
    01:36
  • 2. App-ID Fundamentals .mp4
    14:07
  • 3. App-ID Dependencies .mp4
    11:25
  • 4. Application Groups .mp4
    06:48
  • 5. Application Filters .mp4
    05:06
  • 6. Convert to App-ID Security Rules .mp4
    12:11
  • 7. Updates to App-ID .mp4
    05:07
  • 1. Intro to SSL-TLS Decryption .mp4
    02:00
  • 2. SSL-TLS Decryption Overview .mp4
    07:41
  • 3. Generate a Self-signed Cert .mp4
    05:00
  • 4. Adding a Trusted CA to Clients .mp4
    10:21
  • 5. Implement Decryption Policy Rules .mp4
    08:17
  • 6. Verify Decryption Policy .mp4
    05:34
  • 7. Add a Decryption Policy to PA-FW2 .mp4
    06:12
  • 1. Intro to Site to Site VPNs .mp4
    01:05
  • 2. Site to Site VPNs Overview .mp4
    09:20
  • 3. Ingredients for Palo Alto Site to Site VPN .mp4
    06:46
  • 4. Site to Site Game Plan .mp4
    03:12
  • 5. Implement Site to Site VPN .mp4
    14:42
  • 6. VPNs and Routing .mp4
    06:50
  • 7. Security Policy Rules for VPN .mp4
    08:29
  • 1. Intro to Palo Alto User-ID .mp4
    01:02
  • 2. User-ID Fundamentals .mp4
    06:12
  • 3. User-ID Game Plan .mp4
    03:54
  • 4. User-ID Setup .mp4
    07:08
  • 5. LDAP and Group Mapping .mp4
    07:11
  • 6. Security Policies with User-ID .mp4
    11:25
  • 7. User-ID Example And Review .mp4
    13:25
  • 1. Intro to URL Filtering .mp4
    00:46
  • 2. URL Filtering Overview .mp4
    04:28
  • 3. URLs in Rules .mp4
    07:59
  • 4. Custom URL Categories .mp4
    06:41
  • 5. External Dynamic Lists (EDL) .mp4
    10:42
  • 6. URL Security Profiles .mp4
    17:34
  • 1. Intro to Threat Prevention .mp4
    01:02
  • 2. Threat Prevention Overview .mp4
    09:09
  • 3. Licensing and Updates .mp4
    07:33
  • 4. Vulnerability Protection Profiles .mp4
    19:32
  • 5. Antivirus Security Profiles .mp4
    14:10
  • 6. Anti-Spyware Security Profiles .mp4
    16:59
  • 1. Intro to Palo Alto WildFire .mp4
    01:13
  • 2. WildFire Overview .mp4
    10:37
  • 3. WildFire Files and Flowchart .mp4
    05:26
  • 4. WildFire Initial Configuration .mp4
    08:28
  • 5. Testing WildFire Submissions .mp4
    09:23
  • 6. Monitoring WildFire .mp4
    10:30
  • 1. Intro to Firewall Management .mp4
    01:37
  • 2. Cyber Attack Lifecycle .mp4
    08:45
  • 3. Configuration Management .mp4
    14:58
  • 4. Managing Administrators .mp4
    19:26
  • 5. Monitoring .mp4
    13:39
  • 1. Introduction to Firewall HA .mp4
    00:46
  • 2. HA Overview .mp4
    07:50
  • 3. HA Pair InterfacesLinks .mp4
    07:02
  • 4. ActivePassive Game Plan .mp4
    03:38
  • 5. Configure Active-Passive HA .mp4
    14:04
  • 6. Configurations on Active Firewall .mp4
    05:14
  • 7. Testing the HA Pair .mp4
    13:26
  • 1. Intro to Panorama .mp4
    00:35
  • 2. Panorama Overview .mp4
    05:17
  • 3. Deploying Panorama .mp4
    10:50
  • 4. Adding FWs to Panorama .mp4
    07:58
  • 5. Device Groups .mp4
    09:36
  • 6. Templates .mp4
    08:51
  • 7. Import FW Configuration .mp4
    07:12
  • 8. Verifying FW Mgmt .mp4
    08:55
  • 1. Intro to Zone, Buffer, and DoS Protection .mp4
    01:01
  • 2. Protection Overview .mp4
    05:40
  • 3. Packet Buffer Protection .mp4
    14:04
  • 4. Zone Protection .mp4
    17:55
  • 5. DoS Protection Profile and Policy .mp4
    12:43
  • 1. Intro to Palo Alto FW Routing .mp4
    00:46
  • 2. IP Routing Overview .mp4
    16:58
  • 3. Static Routing .mp4
    18:10
  • 4. RIP Routing .mp4
    10:16
  • 5. OSPF Routing .mp4
    10:47
  • 6. BGP Routing .mp4
    17:19
  • 7. Service Routes .mp4
    07:03
  • 1. Intro to Palo Alto GlobalProtect .mp4
    00:47
  • 2. GlobalProtect Overview .mp4
    05:52
  • 3. GlobalProtect Game Plan .mp4
    07:20
  • 4. Certificates for GlobalProtect .mp4
    04:10
  • 5. GlobalProtect Authentication .mp4
    06:26
  • 6. GlobalProtect Portal .mp4
    07:32
  • 7. GlobalProtect Gateway .mp4
    07:05
  • 8. Testing GlobalProtect .mp4
    08:49
  • 9. Logging and Troubleshooting .mp4
    10:52
  • 1. Intro to Panorama HA, Logging, And Troubleshooting .mp4
    00:46
  • 2. Overview of Panorama HA .mp4
    07:27
  • 3. Configure HA .mp4
    08:57
  • 4. Automated Commit Recovery .mp4
    07:55
  • 5. Panorama Log Collection .mp4
    05:23
  • 6. Configure Panorama Mode .mp4
    08:57
  • 7. Forwarding Logs to Panorama .mp4
    06:14
  • 8. Forwarding From Panorama .mp4
    03:33
  • 9. Troubleshooting .mp4
    08:41
  • 1. Intro to Decryption Strategies .mp4
    01:51
  • 2. Decryption Overview .mp4
    10:15
  • 3. Game Plan for SSL Forward Proxy .mp4
    04:50
  • 4. Configure SSL Forward Proxy .mp4
    23:43
  • 5. Game Plan for SSL Inbound Inspection .mp4
    03:35
  • 6. Verify Routing, NAT, and Rights .mp4
    09:17
  • 7. Configure Certificates .mp4
    08:31
  • 8. Configure SSL Inbound Inspection .mp4
    08:19
  • 9. SSH Proxy .mp4
    11:06
  • 1. Intro to Digital Certificates and Palo Alto .mp4
    01:07
  • 2. Digital Certificate Overview .mp4
    08:58
  • 3. Enterprise CA .mp4
    22:08
  • 4. Master Key .mp4
    03:44
  • 5. SSLTLS Service Profiles .mp4
    07:08
  • 6. Additional Certificate Tidbits .mp4
    08:48
  • 1. Intro to NAT, PAT, And Security Best Practices .mp4
    00:54
  • 2. Best Practices Overview .mp4
    04:12
  • 3. Begin with No .mp4
    15:47
  • 4. Permitting Apps .mp4
    17:33
  • 5. Temporary Tuning Rules .mp4
    06:14
  • 6. Using Tags In Security Policy Rules .mp4
    06:16
  • 7. NAT, PAT, and Security Rules .mp4
    24:13
  • 1. Intro to Palo Alto QoS .mp4
    00:35
  • 2. QoS Overview .mp4
    11:51
  • 3. Palo Alto QoS Components .mp4
    05:38
  • 4. QoS Game Plan .mp4
    02:32
  • 5. Create a QoS Profile .mp4
    02:52
  • 6. Create a QoS Policy .mp4
    12:08
  • 7. Apply QoS to Interfaces .mp4
    07:27
  • 8. Modifying QoS .mp4
    05:36
  • 1. Intro to Interface Types .mp4
    00:41
  • 2. Interface Type Overview .mp4
    16:49
  • 3. Tap Interface Configuration .mp4
    04:55
  • 4. Virtual Wire .mp4
    09:04
  • 5. Layer 2 Interfaces .mp4
    05:20
  • 6. VLAN Interfaces .mp4
    10:17
  • 7. Layer 3 Sub-interfaces .mp4
    19:20
  • 1. Into to Advanced App-ID .mp4
    00:38
  • 2. App-ID Overview .mp4
    08:00
  • 3. Apps, Groups, And Filters .mp4
    11:39
  • 4. Custom Apps and Overrides .mp4
    16:01
  • 5. New or Modified App-IDs .mp4
    07:57
  • 6. App Filters for New App-IDs .mp4
    04:30
  • 7. Monitoring New App-IDs .mp4
    05:09
  • 8. Resolving App Dependencies .mp4
    05:27
  • 1. Intro to Authentication Portal .mp4
    01:26
  • 2. Authentication Portal Overview .mp4
    05:21
  • 3. Certificates .mp4
    04:43
  • 4. Authentication Settings .mp4
    05:19
  • 5. Interface Profile .mp4
    02:53
  • 6. Authentication Portal Settings .mp4
    03:57
  • 7. Authentication Policy Rules .mp4
    05:56
  • 8. Testing Authentication Portal .mp4
    12:48
  • 9. Multi Factor Authentication Overview .mp4
    10:52
  • 1. Intro to Dynamic Groups .mp4
    01:23
  • 2. Overview of Dynamic Groups .mp4
    06:41
  • 3. Game Plan for DAG .mp4
    03:06
  • 4. Log Forwarding Profile .mp4
    07:48
  • 5. Create a Dynamic Address Group (DAG) .mp4
    04:09
  • 6. Using the DAG in Policy .mp4
    08:06
  • 7. Dynamic User Groups .mp4
    12:37
  • 8. Dynamic Tag Removal .mp4
    08:31
  • 1. Intro to Best Practices .mp4
    00:45
  • 2. Tools for Best Practices .mp4
    10:44
  • 3. Core Admin Documentation .mp4
    11:37
  • 4. Decryption Best Practices .mp4
    04:57
  • 5. User-ID Best Practices .mp4
    08:04
  • 6. Internet Gateway Best Practices .mp4
    19:04
  • Description


    In this intermediate Palo Alto skills training, Keith Barker helps learners understand Next-Generation Firewalls (NGF).

    All firewalls control traffic with an Access Control List, but next-gen firewalls have a few more bells and whistles. Next-generation firewalls control traffic based on the application and deep packet inspection, which is great. But the thing Palo Alto brings to the table is a firewall that can dynamically learn about threats across the entire internet. The moment a threat is discovered on the internet, that information is communicated to your firewall.

    More details


    After completing this Palo Alto skills training you'll know how to use the advanced features on a Palo Alto next-generation firewall. Learn about App-ID, URL filtering, antivirus, SSL decryption, and User-ID.

    For anyone who manages security professionals, this Palo Alto training can be used to onboard new security professionals, curated into individual or team training plans, or as a Palo Alto reference resource.

    Palo Alto Next-Generation Firewall: What You Need to Know

    This Palo Alto Next-Generation Firewall training has videos that cover network infrastructure topics including:

    • Classifying all applications across all ports
    • Creating policies that integrate users and devices, not just IP addresses
    • Filtering traffic by URL, using antivirus and protecting vulnerabilities
    • Weighing application dependencies in security
    • Choosing anti-spyware to reduce risk
    • Integrating LDAP and AD
    • Using the Application Command Center (ACC)
    • Configuring management interface, gateway, and DNS
    • Updating the firewall software

    Who Should Take Palo Alto Next-Generation Firewall Training?

    This Palo Alto Next-Generation Firewall training is considered professional-level Palo Alto training, which means it was designed for security professionals. This Next-Generation Firewalls (NGF) skills course is designed for security professionals with three to five years of experience with network infrastructure.

    New or aspiring security professionals. If you’re a relatively new security professional, you’re entering the field at just the right time to master Palo Alto’s Next-Generation Firewalls. This training will help familiarize you with the new generation of firewalls and how they differ from firewalls of the past which you may have been trained on. Get this training and become the local expert on the policy management and application identification these next-generation firewalls enable.

    Experienced security professionals. Security professionals with several years of experience should by now have heard about Palo Alto’s Next-Generation Firewalls. If you’re not yet familiar with their improved functionality and operation, get this training. It’ll make sure you know how to use the Palo Alto Next-Generation Firewalls to tie the use of applications to user identity, not just IP address, and use applications, not merely ports, for security -- plus much more.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Keith Barker
    Keith Barker
    Instructor's Courses

    The best part of being a trainer is making a difference in the life of a student. When a motivated learner and the correct training meet at the right time, the results are amazing.

    Keith Barker discovered a love for computers and networking in 1984 and began his IT career in 1985 at Electronic Data Systems (EDS). He has worked with companies including Paramount Pictures, Blue Cross, and several government agencies. Keith loves to teach and spends most of his time creating fun and useful videos for CBT Nuggets.

    Certifications: Cisco CCIE (2x), CISSP, Network+, Security+, VMware, Palo Alto, Check Point

    Areas of expertise: Networking and Security

    CBT Nuggets is renowned for providing innovative training that's informative, meaningful, and engaging. We provide a variety of training, primarily in IT, project management, and office productivity topics. Our comprehensive library contains thousands of training videos ranging from Cisco networking to Microsoft Word. Whether you want to pass a certification exam, increase your skills, or simply learn new things, we've got you covered! All of our training is delivered through high-quality online streaming video. Subscribers can train 24 hours a day, seven days a week, from the convenience of a computer or mobile device. CBT Nuggets trainers are the rock stars of training, renowned for their expertise, industry-wide credibility, and engaging personalities. They enable CBT Nuggets to deliver accurate, up-to-date training, using a laid-back whiteboard presentation style. There are no scripts, EVER. Our trainers love to teach, and it shows! CEO and founder Dan Charbonneau was a Microsoft trainer when he began recording CBT Nuggets' very first training videos back in the 1990s. He wanted to help provide large organizations, small teams and individuals with comprehensive and budget-conscious training, and he realized it couldn't be done in a classroom. From the CBT Nuggets World Headquarters in Eugene, Oregon, Dan and his team promise each video will be informative, comprehensive, accurate, and fun to watch.
    • language english
    • Training sessions 258
    • duration 34:29:16
    • Release Date 2023/07/01