Udemy – Palo Alto Firewall PCNSA V11 Training 2024

Description
The Palo Alto Firewall PCNSA V11 Training course introduces students to how to configure and manage Palo Alto Networks next-generation firewalls. Students will gain hands-on experience installing, configuring, managing, maintaining, and monitoring Palo Alto Networks next-generation firewalls to protect networks.
What you will learn in the Palo Alto Firewall PCNSA V11 Training course
- Installation and configuration of Palo Alto Networks next generation firewalls
- Manage Palo Alto Next Generation Firewall Configurations
- Configuring the firewall to connect to the production network
- Manage security policy rules to protect the network
- Maintaining and upgrading the configuration of a virtual or logical router
- Create and apply security zones to policies
- Maintaining firewall configurations
- Manage Network Address Translation (NAT) rules
- Configure and manage Palo Alto Networks next-generation firewalls
- Configuring, managing and monitoring the firewall in the laboratory environment
- Configure and manage the essential features of Palo Alto next-generation firewalls
- Configure and manage security and NAT policies to enable authenticated traffic
- Configure and manage threat prevention strategies to block traffic
- Policy configuration based on application (App-ID) and user identity (User-ID)
- Configure SSL encryption and decryption on the firewall to check and control decrypted sessions
- Monitor network traffic using an interactive web interface and firewall reports
- Backup and restore
- An introduction to Panorama
- Dynamic updates

This course is suitable for people who
- Security analysts
- Support staff
- Security engineers
- Security managers
- Security operations specialists
- System pre-sales engineers
- System manager
- System integrators
- Authorized dealers
download link
File Size 9.57GB
add a comment
You Might Also Like
ADPulse: BEYOND THE PERIMETER AD SECURITY AUDIT
Beyond the Perimeter: Auditing Active Directory Security with ADPulse's 35-Point Automated Scan :root { --bg: #080c10; --bg2: #0d1117; --bg3: #111820; --surface: #141c26; --border: #1e2d3d; --accent: #00d4ff; --accent2: #ff4d6d; --accent3: #39ff14; --accent4: #ffd700; --text: #e6edf3; --text-muted: #7d8590; --critical: #ff4d6d; --high: #ff8c42; --medium: #ffd700; --low: #39ff14; --info: #00d4ff; } *, *::before, *::after { box-sizing: border-box; margin: 0; padding: 0; } html { scroll-behavior: smooth; } body { background: var(--bg); color: var(--text); font-family: 'Sora', sans-serif; font-size: 16px; line-height: 1.7; overflow-x: hidden; } /* ===== ANIMATED BG GRID ===== */ body::before { content: '';...
Pangolin 1.16 Tunneled Reverse Proxy Adds SSH Auth Daemon
545
The open-source remote access platform Pangolin has introduced version 1.16, bringing several enhancements focused on identity-driven access and platform usability....
Wireshark 4.6.4 Packet Analyzer Fixes USB HID Memory Exhaustion
Wireshark, the widely used open-source tool for packet capture and network analysis, has released version 4.6.4, bringing a mix of...
Setting Up a DNS Sinkhole with Windows Server 2025
A DNS Sinkhole (also called a DNS blackhole or DNS blacklist) is a cybersecurity mechanism that intercepts DNS queries for...





