Palo Alto Networks: Firewall 10.0: Improving Security Posture and Hardening PAN-OS Firewalls (EDU-214) Training

Palo Alto Networks: Firewall 10.0: Improving Security Posture and Hardening PAN-OS Firewalls (EDU-214) Certification Training Course Overview

Enroll for this 3-Day course from Koenig Solutions where you will learn how to manage and maintain an existing Palo Alto Networks Firewall protected environment, how to improve non-greenfield environments and will be better equipped at ensuring configurations match security best practice. Also develop your own operational strategy to maintain a high level of compliance.
 
Target Audience:
  • Security Engineers
  • Security Administrators
  • Security Operations Specialists
  • Security Analysts
  • Support Staff
Learning Objectives:
  • Determine the efficacy of your current security policies
  • Identify rule usage across security policy sets
  • Develop workflows for managing your security posture
  • Monitor network traffic using the interactive web interface and firewall reports
  • Modify your existing policy set to implement Security Best Practices
  • Utilize tools such as the BPA tool to further understand your environment
 

Palo Alto Networks: Firewall 10.0: Improving Security Posture and Hardening PAN-OS Firewalls (EDU-214) Training (Duration : 24 Hours) Download Course Contents

Live Virtual Classroom Fee On Request
Group Training
01 - 03 Nov GTR 09:00 AM - 05:00 PM CST
(8 Hours/Day)

06 - 08 Dec GTR 09:00 AM - 05:00 PM CST
(8 Hours/Day)

1-on-1 Training (GTR)
4 Hours
8 Hours
Week Days
Weekend

Start Time : At any time

12 AM
12 PM

GTR=Guaranteed to Run
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request
Special Solutions for Corporate Clients! Click here
Hire Our Trainers! Click here

Request More Information

Course Prerequisites
  • Firewall Essentials: Configuration and Management
  • Participants should also be familiar with basic security concepts.
  • Experience with other security technologies (IPS, proxy, and content filtering) is an
  • advantage.