Companies Home Search Profile

Palo Alto Security Administrator - PCNSA (v9) - Full Course

Focused View

17:14:51

14 View
  • 001 Introduction.mp4
    07:58
  • 002 1.2 Next-generation firewall architecture.mp4
    02:54
  • 003 1.3 Zero Trust security model.mp4
    04:19
  • 004 1.4 Firewall offerings.mp4
    05:19
  • 001 2.1 Administrative controls.mp4
    12:47
  • 002 2.2 Initial system access.mp4
    13:52
  • 003 2.3 Configuration management.mp4
    12:05
  • 004 2.4 Licensing and software updates.mp4
    10:03
  • 005 2.5 Account administration.mp4
    12:50
  • 006 2.6 Viewing and filtering logs.mp4
    08:05
  • 007 2.7 Lab Initial Configuration.mp4
    15:37
  • 008 2.8 Security zones and interfaces.mp4
    09:34
  • 009 2.9 Tap VirtualWire Layer2.mp4
    13:45
  • 010 2.10 Layer 3 interfaces Virtual routers.mp4
    18:31
  • 011 2.11 VLAN Loopback Policy-based forwarding.mp4
    12:03
  • 012 2.12 Lab Interface Configuration.mp4
    30:01
  • 001 3.1 Security policy fundamental concepts.mp4
    14:30
  • 002 3.2 Security policy administration.mp4
    32:39
  • 003 3.3 Network address translation, Source NAT configuration.mp4
    16:32
  • 004 3.4 Destination NAT configuration.mp4
    09:39
  • 005 3.5 Lab Security and NAT Policies.mp4
    23:37
  • 001 4.1 App-ID overview.mp4
    07:53
  • 002 4.2 Using App-ID in a Security policy.mp4
    25:58
  • 003 4.3 Migrating to an App-ID.mp4
    22:54
  • 004 4.4 Lab App-ID.mp4
    32:02
  • 005 5.1 Content-ID overview.mp4
    10:33
  • 006 5.2 Vulnerability Protection Security Profiles.mp4
    18:16
  • 007 5.3 Antivirus Security Profiles.mp4
    11:20
  • 008 5.4 Anti-Spyware Security Profiles.mp4
    18:15
  • 009 5.5 File Blocking Profiles.mp4
    09:59
  • 010 5.6 Data Filtering Profiles.mp4
    17:52
  • 011 5.7 Attaching Security Profiles to Security policy rules.mp4
    03:59
  • 012 5.8 Telemetry and threat intelligence.mp4
    03:02
  • 013 5.9 Denial-of-service protection.mp4
    21:07
  • 014 5.10 Lab Content-ID.mp4
    33:29
  • 015 6.1 URL Filtering concepts.mp4
    09:56
  • 016 6.2 Configuring and managing URL Filtering.mp4
    17:37
  • 017 6.3 URL Filtering using Admin Override Option.mp4
    07:22
  • 018 6.4 Lab URL Filtering.mp4
    19:19
  • 019 7.1 Decryption concepts.mp4
    13:14
  • 020 7.2 Certificate management.mp4
    13:43
  • 021 7.3 SSL forward proxy decryption.mp4
    13:24
  • 022 7.4 SSL inbound inspection.mp4
    08:04
  • 023 7.5 Other decryption topics.mp4
    07:08
  • 024 7.6 Lab Decryption.mp4
    25:32
  • 025 8.1 WildFire concepts.mp4
    07:34
  • 026 8.2 Configuring and managing WildFire.mp4
    04:57
  • 027 8.3 WildFire reporting.mp4
    03:07
  • 028 8.4 Lab WildFire.mp4
    08:50
  • 029 9.1 User-ID overview.mp4
    06:41
  • 030 9.2 User mapping methods overview.mp4
    05:49
  • 031 9.3 Configuring User-ID.mp4
    05:29
  • 032 9.4 PAN-OS integrated agent configuration.mp4
    12:47
  • 033 9.5 Windows-based agent configuration.mp4
    05:20
  • 034 9.6 Configuring group mapping.mp4
    10:04
  • 035 9.7 User-ID and security policy.mp4
    17:46
  • 036 9.8 Lab User-ID.mp4
    27:39
  • 037 10.1 GlobalProtect overview.mp4
    07:54
  • 038 10.2 Preparing the firewall for GlobalProtect.mp4
    14:05
  • 039 10.3 Configuration GlobalProtect portal.mp4
    13:56
  • 040 10.4 Configuration GlobalProtect gateway.mp4
    10:48
  • 041 10.5 Configuration GlobalProtect agents.mp4
    08:34
  • 042 10.6 Lab GlobalProtect.mp4
    24:53
  • 043 10.7 Site-to-site VPN.mp4
    09:02
  • 044 10.8 Configuring site-to-site tunnels.mp4
    14:41
  • 045 10.9 IPsec troubleshooting.mp4
    06:31
  • 046 10.10 Lab Site-to-Site VPN.mp4
    21:14
  • 047 11.1 Dashboard and Monitor.mp4
    15:51
  • 048 11.2 Application Command Center (ACC).mp4
    09:17
  • 049 11.3 Reports.mp4
    07:23
  • 050 11.4 Log forwarding.mp4
    09:23
  • 051 11.5 Syslog.mp4
    09:38
  • 052 11.6 Configuring SNMP.mp4
    09:27
  • 053 11.7 Lab Monitoring and Reporting.mp4
    22:21
  • 054 12.1 HA overview.mp4
    04:12
  • 055 12.2 HA components and operation.mp4
    07:52
  • 056 12.3 Active-Passive HA configuration.mp4
    12:53
  • 057 12.4 Monitoring HA state.mp4
    03:48
  • 058 12.5 Lab Active-Passive High Availability.mp4
    16:27
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 79
    • duration 17:14:51
    • English subtitles has
    • Release Date 2024/02/15

    Courses related to Cyber Security

    Courses related to Network Security

    Courses related to Information Security

    Courses related to Computer Network

    Subtitle
    Deploying and Configuring Azure Infrastructure
    INEDeploying and Configuring Azure Infrastructure
    9:13:44
    English subtitles
    08/07/2023
    Subtitle
    Enhancing Network Operations With QoS
    INEEnhancing Network Operations With QoS
    2:05:23
    English subtitles
    08/07/2023

    Courses related to Network Engineering