Curriculum For This Course
Video tutorials list
-
Chapter 1 – PAN-Security Architecture
Video Name Time 1. 1.1 Security platform overview 8:00 2. 1.2 Next-generation firewall architecture 3:00 3. 1.3 Zero Trust security model 4:00 4. 1.4 Firewall offerings 5:00 -
Chapter 2 - Initial Device Configuration
Video Name Time 1. 2.1 Administrative controls 13:00 2. 2.2 Initial system access 14:00 3. 2.3 Configuration management 12:00 4. 2.4 Licensing and software updates 10:00 5. 2.5 Account administration 13:00 6. 2.6 Viewing and filtering logs 8:00 7. 2.7 Lab Initial Configuration 16:00 8. 2.8 Security zones and interfaces 10:00 9. 2.9 Tap VirtualWire Layer2 14:00 -
Chapter 3 - Security and NAT Policies
Video Name Time 1. 3.1 Security policy fundamental concepts 15:00 2. 3.2 Security policy administration 33:00 3. 3.3 Network address translation, Source NAT configuration 17:00 4. 3.4 Destination NAT configuration 10:00 5. 3.5 Lab: Security and NAT Policies 24:00 -
Chapter 4 - App-ID
Video Name Time 1. 4.1 App-ID overview 8:00 2. 4.2 Using App-ID in a Security policy 26:00 3. 4.3 Migrating to an App-ID 23:00 4. 4.4 Lab App-ID 32:00 -
Chapter 5 - Content-ID
Video Name Time 1. 5.1 Content-ID overview 11:00 2. 5.2 Vulnerability Protection Security Profiles 18:00 3. 5.3 Antivirus Security Profiles 11:00 4. 5.4 Anti-Spyware Security Profiles 18:00 5. 5.5 File Blocking Profiles 10:00 6. 5.6 Data Filtering Profiles 18:00 7. 5.7 Attaching Security Profiles to Security policy rules 4:00 8. 5.8 Telemetry and threat intelligence 3:00 9. 5.9 Denial-of-service protection 21:00 10. 5.10 Lab Content-ID 33:00 -
Chapter 6 -URL Filtering
Video Name Time 1. 6.1 URL Filtering concepts 10:00 2. 6.2 Configuring and managing URL Filtering 18:00 3. 6.3 URL Filtering using Admin Override Option 7:00 4. 6.4 Lab URL Filtering 19:00 -
Chapter 7 - Decryption
Video Name Time 1. 7.1 Decryption concepts 13:00 2. 7.2 Certificate management 14:00 3. 7.3 SSL forward proxy decryption 13:00 4. 7.4 SSL inbound inspection 8:00 5. 7.5 Other decryption topics 7:00 6. 7.6 Lab Decryption 26:00 -
Chapter 8 - WildFire
Video Name Time 1. 8.1 WildFire concepts 8:00 2. 8.2 Configuring and managing WildFire 5:00 3. 8.3 WildFire reporting 3:00 4. 8.4 Lab WildFire 9:00 -
Chapter 9 - User-ID
Video Name Time 1. 9.1 User-ID overview 7:00 2. 9.2 User mapping methods overview 6:00 3. 9.3 Configuring User-ID 5:00 4. 9.4 PAN-OS integrated agent configuration 13:00 5. 9.5 Windows-based agent configuration 5:00 6. 9.6 Configuring group mapping 10:00 7. 9.7 User-ID and security policy 18:00 8. 9.8 Lab User-ID 28:00 -
Chapter 10 - Global Protect (Remote Access VPN)
Video Name Time 1. 10.1 GlobalProtect overview 8:00 2. 10.2 Preparing the firewall for GlobalProtect 14:00 3. 10.3 Configuration GlobalProtect portal 14:00 4. 10.4 Configuration GlobalProtect gateway 11:00 5. 10.5 Configuration GlobalProtect agents 9:00 6. 10.6 Lab GlobalProtect 25:00 -
Chapter 10 - Site-to-site-VPN
Video Name Time 1. 10.7 Site-to-site VPN 9:00 2. 10.8 Configuring site-to-site tunnels 15:00 3. 10.9 IPsec troubleshooting 7:00 4. 10.10 Lab Site-to-Site VPN 21:00 -
Chapter 11 - Monitoring and Reporting
Video Name Time 1. 11.1 Dashboard and Monitor 16:00 2. 11.2 Application Command Center (ACC) 9:00 3. 11.3 Reports 7:00 4. 11.4 Log forwarding 9:00 5. 11.5 Syslog 10:00 6. 11.6 Configuring SNMP 9:00 7. 11.7 Lab Monitoring and Reporting 22:00 -
Chapter 12 - HA (High Availability)
Video Name Time 1. 12.1 HA overview 4:00 2. 12.2 HA components and operation 8:00 3. 12.3 Active-Passive HA configuration 13:00 4. 12.4 Monitoring HA state 4:00 5. 12.5 Lab Active-Passive High Availability 16:00
Add Comment