Course Offering
- Fast Lane
- Guaranteed to Run Schedule
- Digital Learning Solutions
- Fast Lane IT Workshops
- Fast Lane LIVE E-Learning
- Fast Lane Academy»
-
Professional Services»
- Home
- Content Development
- Expert 4 Hire
- Selected Technologies
- Artificial Intelligence (AI)
- Cloud
- Optical
- Security
- Wireless & Mobility
- Selected Vendors
- AWS
- Cisco
- Gigamon
- NetApp
- Microsoft
- Red Hat
- SUSE
- VMware
- Featured Vendors
- Amazon Web Services»
- Aruba»
- Cisco Systems»
- Citrix»
- Cydrill Software Security»
- EC-Council»
- Google Cloud»
- Juniper Networks»
-
Microsoft»
- What's New
- Microsoft Training
- Microsoft Certifications
- Microsoft E-Learning
- Upcoming Microsoft Courses
- Microsoft Professional Services
- Cloud Professional Services
- Redeem Microsoft SATVs
- Featured Topics
- AI Business School
- Microsoft Azure
- Microsoft Power Platform
- Microsoft Security, Compliance & Identity
- NetApp»
- Red Hat»
- Splunk»
- SUSE»
- VMware»
- Additional Vendors»
- Featured Technologies
- Artificial Intelligence (AI)»
- Cloud Computing»
- Cyber Security»
- Data Center»
- Network Analysis / Wireshark»
- Software Development»
- Wireless & Mobility»
- IT & Project Management»
- ITIL»
- PRINCE2»
- Scaled Agile»
- Scrum
- Home
- Training
- Palo Alto Networks
- EDU-210 Detailed outline
Firewall Essentials: Configuration and Management (EDU-210)
Detailed Course Outline
- Module 1- Palo Alto Networks Portfolio and Architecture
- Module 2- Connect to the Management Network
- Module 3- Manage Firewall Configurations
- Module 4- Manage Firewall Administrator Accounts
- Module 5- Connect to Production Networks
- Module 6- The Cyberattack Lifecycle
- Module 7- Block Threats Using Security and NAT Policies
- Module 8- Block Packet- and Protocol-Based Attacks
- Module 9- Block Threats from Known Bad Sources
- Module 10- Block Threats by Identifying Applications
- Module 11- Maintain Application-Based Policies
- Module 12- Block Threats Using Custom Applications
- Module 13- Block Threats by Identifying Users
- Module 14- Block Threats by Identifying Devices
- Module 15- Block Unknown Threats
- Module 16- Block Threats in Encrypted Traffic
- Module 17- Prevent Use of Stolen Credentials
- Module 18- Block Threats Using Security Profiles
- Module 19- View Threat and Traffic Information
- Module 20- Next Steps