Palo Alto Next Generation Firewall Administration

Palo Alto Next Generation Firewall Administration Certification Training Course Overview

After completing this course, students will be able to configure, install, and administer Palo Alto Networks firewall. Students will also learn about: the configuration steps for the networking, security, logging, and reporting features of the PAN-OS, and the configuration steps for VPN & High Availability.

This course is best suited for: security engineers, network engineers, and support staff.


Download Course Contents Test your current knowledge Qubits

Palo Alto Next Generation Firewall Administration Course schedule & Prices

Schedule & Prices
Course Details Schedule
Live Virtual Classroom (Instructor-Led)
Duration : 5 Days (10 Days for 4 Hours/Day)
Fee : USD 1,300 (Includes Taxes)


8 Hours/Day

8 Hours/Day

8 Hours/Day
Duration : 5 Days
Fee : On Request
Client's Location
As per mutual convenience
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : 5 Days
Fee : On Request
On Request

Enquire Now

Input symbols

Course Prerequisites

  • Basic familiarity with networking concepts including routing, switching, and IP addressing

Upon Completion of this Course, you will accomplish following:

  • Use GUI and use CLI. Set Up Authentication Profiles.
  • Create a Local User Database.
  • Configure RADIUS Server Settings.
  • Content-ID Agent.
  • Comprehend Antivirus and anti-spyware.
  • Define IKE Gateways.
  • Set Up IPSec Tunnels.
  • Set Up IPSec VPNs.
  • View IPSec Tunnel Status on the Firewall.
  • Define IPSec Crypto Profiles.
  • Define IKE Crypto Profiles.
  • Log Configuration.
  • Define Alarm Log Settings.
  • Schedule Log Exports.
  • Define Configuration Log Settings.
  • Configure Active/Active HA.
  • Comprehend about Panorama.

Give an edge to your career with Other Technologies certification training courses. Students can join the classes for Palo Alto Next Generation Firewall Administration Training Course at Koenig Campus located at New Delhi, Bengaluru, Shimla, Goa, Dehradun, Dubai & Instructor-Led Online.


No, the published fee includes all applicable taxes.

Palo Alto Networks produced the world's first Next Generation Firewall in 2007. These next generation firewalls secure businesses with a prevention-focused architecture and integrated innovations that can be easily deployed and used.

The Next Generation Firewall is a third generation firewall technology that is built by combining a traditional firewall with other network device filtering functionalities. These firewalls detect known and unknown threats, even those included in encrypted traffic, by leveraging intelligence generated across customer deployments.

The National Institute of Standards and Technology (NIST) 800-10 has divided firewalls into three basic types:

  • Packet Filters - check incoming and outgoing traffic by creating a checkpoint at a traffic router or switch.
  • Stateful Inspection - combines packet inspection technology and TCP handshake verification for enhanced protection.
  • Proxys (or Application Level Gateways or Firewalls) - operate at the application layer and works by establishing a connection to the traffic source and inspecting the incoming data packet.

There are two more types of firewalls that are currently available:

  • Circuit-Level Gateways - verify the Transmission Control Protocol (TCP) handshake which is designed to check that the packet session is legitimate.
  • Next-Gen Firewalls - include architectures such as deep-packet inspection, TCP handshake checks and surface level packet inspection.

Yes, Palo Alto Networks firewall is a Stateful firewall. Palo Alto Networks is the principal developer for the Stateful Inspection Firewall and the first Intrusion Prevention System. Stateful Firewall technology involves the inspection of traffic passing through the firewall by matching it against a session. Each session is later matched against a security policy.

Firewalls work like filters between computers and the Internet. They are designed to stop unauthorized access to or from a private network. All messages entering or leaving the intranet pass through a firewall to ensure that an unwanted message doesn’t get transferred.