Palo Alto Firewall PCNSE New V9 & V10 Training

Categories: PCNSE
Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

In this courses, feature lecture and hands-on labs, you will learn to install, configure, manage and troubleshoot Palo Alto Networks firewalls, gaining the skills and expertise needed to protect your organization from the most advanced cyber-security attacks. The student will get hands-on experience in configuring, managing, and monitoring a firewall in a lab environment.

This class covers many topics required for PCNSE V10 and new topics are added frequently. This course dives deeper into Palo Alto firewalls policies and network configuration to give the students a clear understanding on several topics. Topics covered include Security Policies configuration, SSL Decryption, Routing configuration, IPsec configuration, High Availability configuration and other real world configuration examples. This online class will help in preparing the student for the PCNSE certification by covering topics in the depth that Palo Alto expects the candidates to know. There are also materials included with this class.

The Palo Alto Networks Certified Network Security Engineer (PCNSE) recognizes individuals with in-depth knowledge and abilities to design, install, configure, maintain and troubleshoot the vast majority of implementations based on the Palo Alto Networks platform.

“Palo Alto is an industry leader in the next-gen Firewall”. The course covers the Palo Alto Firewall “basis to advance”, concepts in a most practical way ensuring that delegates not only pass the exam but are also ready for a real-world environment.

Show More

What Will You Learn?

  • Configure and Manage Palto Alto Firewall
  • Understand Palo Alto Firewalls Deployment Methods
  • How to setup a Lab Environment
  • Understand how to deploy Palo Alto Firewalls in GNS3 & EVE NG
  • Understand Palo Alto Firewalls Security Policies
  • Understand Palo Alto Firewalls NAT configuration
  • Understand User ID Integration
  • Configure user ID integration using User ID Agent
  • Configure Captive Portal to authenticate users
  • Understand AntiSpyware, AntiVirus, IPS configuration
  • Configure AntiSpyware, Antivirus and IPS
  • Configuring SSL Decryption

Course Content

PCNSE

  • Download Resource Files
  • 001 Lecture-01 Conman Network Security Terms_part1
    05:20
  • 001 Lecture-01 Conman Network Security Terms_part2
    05:20
  • 001 Lecture-01 Conman Network Security Terms_part3_part1
    02:40
  • 001 Lecture-01 Conman Network Security Terms_part3_part2
    02:40
  • 001 Lecture-01 Conman Network Security Terms_part4_part1
    02:40
  • 001 Lecture-01 Conman Network Security Terms_part4_part2
    02:40
  • 002 Lecture-02Identify Malware Malicious Software_part1
    04:24
  • 002 Lecture-02Identify Malware Malicious Software_part2_part1
    02:12
  • 002 Lecture-02Identify Malware Malicious Software_part2_part2
    02:12
  • 002 Lecture-02Identify Malware Malicious Software_part3
    04:24
  • 002 Lecture-02Identify Malware Malicious Software_part4
    04:24
  • 002 Lecture-02Identify Malware Malicious Software_part5
    04:24
  • 002 Lecture-02Identify Malware Malicious Software_part6
    04:24
  • 002 Lecture-02Identify Malware Malicious Software_part7
    04:24
  • 003 Lecture-03Introduction to Firewall Technology_part1
    04:04
  • 003 Lecture-03Introduction to Firewall Technology_part2
    04:04
  • 003 Lecture-03Introduction to Firewall Technology_part3
    04:04
  • 003 Lecture-03Introduction to Firewall Technology_part4
    04:04
  • 003 Lecture-03Introduction to Firewall Technology_part5
    04:04
  • 004 Lecture-04About Palo Alto Networks Firewall_part1_part1
    02:25
  • 004 Lecture-04About Palo Alto Networks Firewall_part1_part2
    02:25
  • 004 Lecture-04About Palo Alto Networks Firewall_part2
    04:51
  • 004 Lecture-04About Palo Alto Networks Firewall_part3
    04:51
  • 005 Lecture-05Install Palo Alto Firewall In VMware_part1_part1
    02:52
  • 005 Lecture-05Install Palo Alto Firewall In VMware_part1_part2
    02:52
  • 005 Lecture-05Install Palo Alto Firewall In VMware_part2
    05:44
  • 005 Lecture-05Install Palo Alto Firewall In VMware_part3
    05:44
  • 006 Lecture-06Install Palo Alto On EVE-NG_part1_part1
    03:39
  • 006 Lecture-06Install Palo Alto On EVE-NG_part1_part2
    03:39
  • 006 Lecture-06Install Palo Alto On EVE-NG_part2
    07:19
  • 007 Lecture-07Install Palo Alto in GNS3
    06:26
  • 008 Lecture-08Install Palo Alto On ESXI_part1
    03:57
  • 008 Lecture-08Install Palo Alto On ESXI_part2
    03:57
  • 008 Lecture-08Install Palo Alto On ESXI_part3
    03:57
  • 009 Lecture-09CLI Access Modes Basic Commands_part1
    06:00
  • 009 Lecture-09CLI Access Modes Basic Commands_part2
    06:00
  • 009 Lecture-09CLI Access Modes Basic Commands_part3_part1
    03:00
  • 009 Lecture-09CLI Access Modes Basic Commands_part3_part2
    03:00
  • 010 Lecture-10Introduction to Dashboard Tab_part1
    05:25
  • 010 Lecture-10Introduction to Dashboard Tab_part2
    05:25
  • 010 Lecture-10Introduction to Dashboard Tab_part3
    05:25
  • 010 Lecture-10Introduction to Dashboard Tab_part4
    05:25
  • 011 Lecture-11Palto Alto Initial Configuration
    04:18
  • 012 Lecture-12Configure DNS NTP in Palto Firewall_part1
    04:58
  • 012 Lecture-12Configure DNS NTP in Palto Firewall_part2
    04:58
  • 012 Lecture-12Configure DNS NTP in Palto Firewall_part3
    04:58
  • 012 Lecture-12Configure DNS NTP in Palto Firewall_part4
    04:58
  • 013 Lecture-13Activate Licenses and Subscriptions_part1
    04:36
  • 013 Lecture-13Activate Licenses and Subscriptions_part2
    04:36
  • 013 Lecture-13Activate Licenses and Subscriptions_part3
    04:36
  • 013 Lecture-13Activate Licenses and Subscriptions_part4
    04:36
  • 013 Lecture-13Activate Licenses and Subscriptions_part5
    04:36
  • 014 Lecture-14Dynamic Updates and Software Updates_part1
    04:06
  • 014 Lecture-14Dynamic Updates and Software Updates_part2
    04:06
  • 014 Lecture-14Dynamic Updates and Software Updates_part3
    04:06
  • 014 Lecture-14Dynamic Updates and Software Updates_part4
    04:06
  • 014 Lecture-14Dynamic Updates and Software Updates_part5
    04:06
  • 015 Lecture-15Initial Working of Palo Alto Firewall_part1
    05:37
  • 015 Lecture-15Initial Working of Palo Alto Firewall_part2
    05:37
  • 015 Lecture-15Initial Working of Palo Alto Firewall_part3
    05:37
  • 015 Lecture-15Initial Working of Palo Alto Firewall_part4_part1
    02:48
  • 015 Lecture-15Initial Working of Palo Alto Firewall_part4_part2
    02:48
  • 016 Lecture-16Management Interface Configuration_part1_part1
    03:20
  • 016 Lecture-16Management Interface Configuration_part1_part2
    03:20
  • 016 Lecture-16Management Interface Configuration_part2
    06:40
  • 016 Lecture-16Management Interface Configuration_part3
    06:40
  • 016 Lecture-16Management Interface Configuration_part4
    06:40
  • 017 Lecture-17Palo Alto Firewall Interfaces Details_part1_part1
    02:41
  • 017 Lecture-17Palo Alto Firewall Interfaces Details_part1_part2
    02:41
  • 017 Lecture-17Palo Alto Firewall Interfaces Details_part2
    05:22
  • 017 Lecture-17Palo Alto Firewall Interfaces Details_part3
    05:22
  • 017 Lecture-17Palo Alto Firewall Interfaces Details_part4
    05:22
  • 017 Lecture-17Palo Alto Firewall Interfaces Details_part5
    05:22
  • 017 Lecture-17Palo Alto Firewall Interfaces Details_part6
    05:22
  • 018 Lecture-18Palo Alto Firewall Zones Details_part1
    04:01
  • 018 Lecture-18Palo Alto Firewall Zones Details_part2
    04:01
  • 018 Lecture-18Palo Alto Firewall Zones Details_part3
    04:01
  • 019 Lecture-19Routing Protocols,AD,Metric Routing Tables_part1
    10:26
  • 019 Lecture-19Routing Protocols,AD,Metric Routing Tables_part2
    10:25
  • 020 Lecture-20Virtual Routers in Palo Alto Firewall_part1
    05:36
  • 020 Lecture-20Virtual Routers in Palo Alto Firewall_part2
    05:36
  • 021 Lecture-21Configure Verify Static Routing in PA Firewall_part1
    04:55
  • 021 Lecture-21Configure Verify Static Routing in PA Firewall_part2_part1
    02:27
  • 021 Lecture-21Configure Verify Static Routing in PA Firewall_part2_part2
    02:27
  • 021 Lecture-21Configure Verify Static Routing in PA Firewall_part3
    04:55
  • 021 Lecture-21Configure Verify Static Routing in PA Firewall_part4
    04:55
  • 021 Lecture-21Configure Verify Static Routing in PA Firewall_part5
    04:55
  • 021 Lecture-21Configure Verify Static Routing in PA Firewall_part6
    04:55
  • 021 Lecture-21Configure Verify Static Routing in PA Firewall_part7
    04:55
  • 021 Lecture-21Configure Verify Static Routing in PA Firewall_part8
    04:55
  • 021 Lecture-21Configure Verify Static Routing in PA Firewall_part9
    04:55
  • 021 Lecture-21Configure Verify Static Routing in PA Firewall_part10
    04:55
  • 022 Lecture-22Configure Verify Default Routing in PA Firewall_part1
    04:42
  • 022 Lecture-22Configure Verify Default Routing in PA Firewall_part2
    04:42
  • 022 Lecture-22Configure Verify Default Routing in PA Firewall_part3
    04:42
  • 023 Lecture-23Configure Verify Dynamic Protocol RIP in PA_part1
    04:46
  • 023 Lecture-23Configure Verify Dynamic Protocol RIP in PA_part2
    04:46
  • 023 Lecture-23Configure Verify Dynamic Protocol RIP in PA_part3
    04:46
  • 023 Lecture-23Configure Verify Dynamic Protocol RIP in PA_part4
    04:46
  • 023 Lecture-23Configure Verify Dynamic Protocol RIP in PA_part5
    04:46
  • 024 Lecture-24Configure Verify RIP Authentication in PA_part1
    04:26
  • 024 Lecture-24Configure Verify RIP Authentication in PA_part2
    04:26
  • 024 Lecture-24Configure Verify RIP Authentication in PA_part3
    04:26
  • 024 Lecture-24Configure Verify RIP Authentication in PA_part4
    04:26
  • 025 Lecture-25Configure Verify Dynamic Protocol OSPF in PA_part1_part1
    02:29
  • 025 Lecture-25Configure Verify Dynamic Protocol OSPF in PA_part1_part2
    02:29
  • 025 Lecture-25Configure Verify Dynamic Protocol OSPF in PA_part2
    04:58
  • 025 Lecture-25Configure Verify Dynamic Protocol OSPF in PA_part3
    04:58
  • 025 Lecture-25Configure Verify Dynamic Protocol OSPF in PA_part4
    04:58
  • 025 Lecture-25Configure Verify Dynamic Protocol OSPF in PA_part5
    04:58
  • 025 Lecture-25Configure Verify Dynamic Protocol OSPF in PA_part6
    04:58
  • 025 Lecture-25Configure Verify Dynamic Protocol OSPF in PA_part7
    04:58
  • 026 Lecture-26Configure and Verify Redistribute in PA_part1
    04:42
  • 026 Lecture-26Configure and Verify Redistribute in PA_part2
    04:42
  • 026 Lecture-26Configure and Verify Redistribute in PA_part3
    04:42
  • 027 Lecture-27Security Policy Concept Theory in PA_part1
    05:11
  • 027 Lecture-27Security Policy Concept Theory in PA_part2_part1
    02:35
  • 027 Lecture-27Security Policy Concept Theory in PA_part2_part2
    02:35
  • 027 Lecture-27Security Policy Concept Theory in PA_part3
    05:11
  • 027 Lecture-27Security Policy Concept Theory in PA_part4
    05:11
  • 027 Lecture-27Security Policy Concept Theory in PA_part5
    05:11
  • 027 Lecture-27Security Policy Concept Theory in PA_part6
    05:11
  • 027 Lecture-27Security Policy Concept Theory in PA_part7_part1
    02:35
  • 027 Lecture-27Security Policy Concept Theory in PA_part7_part2
    02:35
  • 027 Lecture-27Security Policy Concept Theory in PA_part8
    05:11
  • 027 Lecture-27Security Policy Concept Theory in PA_part9
    05:11
  • 027 Lecture-27Security Policy Concept Theory in PA_part10
    05:11
  • 028 Lecture-28Security Policy Granular Criteria and Control_part1
    06:22
  • 028 Lecture-28Security Policy Granular Criteria and Control_part2_part1
    03:11
  • 028 Lecture-28Security Policy Granular Criteria and Control_part2_part2
    03:11
  • 028 Lecture-28Security Policy Granular Criteria and Control_part3
    06:22
  • 028 Lecture-28Security Policy Granular Criteria and Control_part4
    06:22
  • 028 Lecture-28Security Policy Granular Criteria and Control_part5_part1
    03:11
  • 028 Lecture-28Security Policy Granular Criteria and Control_part5_part2
    03:11
  • 028 Lecture-28Security Policy Granular Criteria and Control_part6
    06:22
  • 028 Lecture-28Security Policy Granular Criteria and Control_part7
    06:22
  • 029 Lecture-29Security Policy Action Setting Options_part1
    04:50
  • 029 Lecture-29Security Policy Action Setting Options_part2
    04:50
  • 029 Lecture-29Security Policy Action Setting Options_part3
    04:50
  • 029 Lecture-29Security Policy Action Setting Options_part4
    04:50
  • 029 Lecture-29Security Policy Action Setting Options_part5
    04:50
  • 029 Lecture-29Security Policy Action Setting Options_part6_part1
    02:25
  • 029 Lecture-29Security Policy Action Setting Options_part6_part2
    02:25
  • 030 Lecture-30Security Policy Shadows Rule in PA
    05:05
  • 031 Lecture-31Security Policy Test Policy Match Option
    06:08
  • 032 Lecture-32Security Policy View Rulebase as Groups_part1
    04:31
  • 032 Lecture-32Security Policy View Rulebase as Groups_part2
    04:31
  • 033 Lecture-33Security Policy Policy Optimizer Option
    05:16
  • 034 Lecture-34Introduction to SSL and TLS certificates_part1_part1
    02:45
  • 034 Lecture-34Introduction to SSL and TLS certificates_part1_part2
    02:45
  • 034 Lecture-34Introduction to SSL and TLS certificates_part2
    05:30
  • 034 Lecture-34Introduction to SSL and TLS certificates_part3
    05:30
  • 035 Lecture-35Configure SSL Forward Proxy in PA Firewall_part1
    05:04
  • 035 Lecture-35Configure SSL Forward Proxy in PA Firewall_part2
    05:04
  • 035 Lecture-35Configure SSL Forward Proxy in PA Firewall_part3
    05:04
  • 035 Lecture-35Configure SSL Forward Proxy in PA Firewall_part4
    05:04
  • 035 Lecture-35Configure SSL Forward Proxy in PA Firewall_part5
    05:04
  • 036 Lecture-36Introduction to Security Profiles Content-ID_part1
    05:07
  • 036 Lecture-36Introduction to Security Profiles Content-ID_part2
    05:07
  • 037 Lecture-37Configure Security Profile (Antivirus Profile)_part1
    05:15
  • 037 Lecture-37Configure Security Profile (Antivirus Profile)_part2
    05:15
  • 037 Lecture-37Configure Security Profile (Antivirus Profile)_part3
    05:15
  • 037 Lecture-37Configure Security Profile (Antivirus Profile)_part4
    05:15
  • 038 Lecture-38Configure Security Profile (Anti-Spyware)_part1_part1
    03:07
  • 038 Lecture-38Configure Security Profile (Anti-Spyware)_part1_part2
    03:07
  • 038 Lecture-38Configure Security Profile (Anti-Spyware)_part2_part1
    03:07
  • 038 Lecture-38Configure Security Profile (Anti-Spyware)_part2_part2
    03:07
  • 038 Lecture-38Configure Security Profile (Anti-Spyware)_part3
    06:14
  • 038 Lecture-38Configure Security Profile (Anti-Spyware)_part4_part1
    03:07
  • 038 Lecture-38Configure Security Profile (Anti-Spyware)_part4_part2
    03:07
  • 039 Lecture-39Configure Security Profile (Vulnerability)_part1_part1
    02:31
  • 039 Lecture-39Configure Security Profile (Vulnerability)_part1_part2
    02:31
  • 039 Lecture-39Configure Security Profile (Vulnerability)_part2
    05:03
  • 039 Lecture-39Configure Security Profile (Vulnerability)_part3
    05:03
  • 039 Lecture-39Configure Security Profile (Vulnerability)_part4
    05:03
  • 039 Lecture-39Configure Security Profile (Vulnerability)_part5
    05:03
  • 039 Lecture-39Configure Security Profile (Vulnerability)_part6
    05:03
  • 039 Lecture-39Configure Security Profile (Vulnerability)_part7_part1
    02:31
  • 039 Lecture-39Configure Security Profile (Vulnerability)_part7_part2
    02:31
  • 040 Lecture-40Configure Security Profile (URL Filtering)_part1
    05:14
  • 040 Lecture-40Configure Security Profile (URL Filtering)_part2
    05:14
  • 040 Lecture-40Configure Security Profile (URL Filtering)_part3
    05:14
  • 040 Lecture-40Configure Security Profile (URL Filtering)_part4
    05:14
  • 040 Lecture-40Configure Security Profile (URL Filtering)_part5
    05:14
  • 040 Lecture-40Configure Security Profile (URL Filtering)_part6_part1
    02:37
  • 040 Lecture-40Configure Security Profile (URL Filtering)_part6_part2
    02:37
  • 040 Lecture-40Configure Security Profile (URL Filtering)_part7
    05:14
  • 041 Lecture-41Configure Security Profile (File Blocking)_part1
    04:45
  • 041 Lecture-41Configure Security Profile (File Blocking)_part2
    04:45
  • 041 Lecture-41Configure Security Profile (File Blocking)_part3
    04:45
  • 041 Lecture-41Configure Security Profile (File Blocking)_part4
    04:45
  • 042 Lecture-42Configure Security Profile (WildFire Analysis)_part1
    05:07
  • 042 Lecture-42Configure Security Profile (WildFire Analysis)_part2_part1
    02:33
  • 042 Lecture-42Configure Security Profile (WildFire Analysis)_part2_part2
    02:33
  • 042 Lecture-42Configure Security Profile (WildFire Analysis)_part3
    05:06
  • 042 Lecture-42Configure Security Profile (WildFire Analysis)_part4
    05:07
  • 042 Lecture-42Configure Security Profile (WildFire Analysis)_part5
    05:07
  • 042 Lecture-42Configure Security Profile (WildFire Analysis)_part6
    05:07
  • 042 Lecture-42Configure Security Profile (WildFire Analysis)_part7
    05:06
  • 043 Lecture-43Configure Security Profile (Data Filter)_part1
    05:15
  • 043 Lecture-43Configure Security Profile (Data Filter)_part2
    05:15
  • 043 Lecture-43Configure Security Profile (Data Filter)_part3
    05:15
  • 043 Lecture-43Configure Security Profile (Data Filter)_part4
    05:15
  • 043 Lecture-43Configure Security Profile (Data Filter)_part5
    05:15
  • 044 Lecture-44Configure Security Profile (Security Group)_part1
    04:48
  • 044 Lecture-44Configure Security Profile (Security Group)_part2
    04:48
  • 045 Lecture-45DoS Zone Protection and Packet Buffer Theory_part1
    04:28
  • 045 Lecture-45DoS Zone Protection and Packet Buffer Theory_part2
    04:28
  • 045 Lecture-45DoS Zone Protection and Packet Buffer Theory_part3
    04:28
  • 045 Lecture-45DoS Zone Protection and Packet Buffer Theory_part4
    04:28
  • 046 Lecture-46Configure Verify DoS Protection Profile_part1
    06:11
  • 046 Lecture-46Configure Verify DoS Protection Profile_part2
    06:11
  • 046 Lecture-46Configure Verify DoS Protection Profile_part3
    06:11
  • 046 Lecture-46Configure Verify DoS Protection Profile_part4_part1
    03:05
  • 046 Lecture-46Configure Verify DoS Protection Profile_part4_part2
    03:05
  • 046 Lecture-46Configure Verify DoS Protection Profile_part5_part1
    03:05
  • 046 Lecture-46Configure Verify DoS Protection Profile_part5_part2
    03:05
  • 046 Lecture-46Configure Verify DoS Protection Profile_part6
    06:11
  • 046 Lecture-46Configure Verify DoS Protection Profile_part7_part1
    03:05
  • 046 Lecture-46Configure Verify DoS Protection Profile_part7_part2
    03:05
  • 047 Lecture-47Configure Verify Zone Protection Profile_part1
    05:13
  • 047 Lecture-47Configure Verify Zone Protection Profile_part2_part1
    02:37
  • 047 Lecture-47Configure Verify Zone Protection Profile_part2_part2
    02:36
  • 047 Lecture-47Configure Verify Zone Protection Profile_part3
    05:13
  • 047 Lecture-47Configure Verify Zone Protection Profile_part4
    05:13
  • 047 Lecture-47Configure Verify Zone Protection Profile_part5
    05:13
  • 048 Lecture-48Configure Verify Packet Buffer Protection_part1
    05:14
  • 048 Lecture-48Configure Verify Packet Buffer Protection_part2_part1
    02:37
  • 048 Lecture-48Configure Verify Packet Buffer Protection_part2_part2
    02:37
  • 049 Lecture-49Palo Alto Firewall Layer 2 Deployment_part1_part1
    02:33
  • 049 Lecture-49Palo Alto Firewall Layer 2 Deployment_part1_part2
    02:33
  • 049 Lecture-49Palo Alto Firewall Layer 2 Deployment_part2
    05:07
  • 049 Lecture-49Palo Alto Firewall Layer 2 Deployment_part3
    05:07
  • 049 Lecture-49Palo Alto Firewall Layer 2 Deployment_part4
    05:07
  • 049 Lecture-49Palo Alto Firewall Layer 2 Deployment_part5
    05:07
  • 049 Lecture-49Palo Alto Firewall Layer 2 Deployment_part6
    05:07
  • 050 Lecture-50Palo Alto Firewall Tap Mode Deployment_part1_part1
    02:28
  • 050 Lecture-50Palo Alto Firewall Tap Mode Deployment_part1_part2
    02:28
  • 050 Lecture-50Palo Alto Firewall Tap Mode Deployment_part2
    04:57
  • 050 Lecture-50Palo Alto Firewall Tap Mode Deployment_part3
    04:57
  • 050 Lecture-50Palo Alto Firewall Tap Mode Deployment_part4
    04:57
  • 050 Lecture-50Palo Alto Firewall Tap Mode Deployment_part5_part1
    02:28
  • 050 Lecture-50Palo Alto Firewall Tap Mode Deployment_part5_part2
    02:28
  • 051 Lecture-51Palo Alto Firewall V-Wire Mode Deployment_part1_part1
    02:15
  • 051 Lecture-51Palo Alto Firewall V-Wire Mode Deployment_part1_part2
    02:15
  • 051 Lecture-51Palo Alto Firewall V-Wire Mode Deployment_part2
    04:31
  • 051 Lecture-51Palo Alto Firewall V-Wire Mode Deployment_part3
    04:31
  • 051 Lecture-51Palo Alto Firewall V-Wire Mode Deployment_part4
    04:31
  • 051 Lecture-51Palo Alto Firewall V-Wire Mode Deployment_part5
    04:31
  • 052 Lecture-52Palo Alto Firewall Sub-Interface Mode_part1
    05:40
  • 052 Lecture-52Palo Alto Firewall Sub-Interface Mode_part2_part1
    02:50
  • 052 Lecture-52Palo Alto Firewall Sub-Interface Mode_part2_part2
    02:50
  • 052 Lecture-52Palo Alto Firewall Sub-Interface Mode_part3
    05:40
  • 052 Lecture-52Palo Alto Firewall Sub-Interface Mode_part4_part1
    02:50
  • 052 Lecture-52Palo Alto Firewall Sub-Interface Mode_part4_part2
    02:50
  • 053 Lecture-53NAT Theory Source Network Address Translation Types_part1
    04:31
  • 053 Lecture-53NAT Theory Source Network Address Translation Types_part2
    04:31
  • 053 Lecture-53NAT Theory Source Network Address Translation Types_part3
    04:31
  • 053 Lecture-53NAT Theory Source Network Address Translation Types_part4
    04:31
  • 054 Lecture-54Source NAT Type Dynamic IP and Port (DIPP) Theory Lab_part1_part1
    02:34
  • 054 Lecture-54Source NAT Type Dynamic IP and Port (DIPP) Theory Lab_part1_part2
    02:34
  • 054 Lecture-54Source NAT Type Dynamic IP and Port (DIPP) Theory Lab_part2_part1
    02:34
  • 054 Lecture-54Source NAT Type Dynamic IP and Port (DIPP) Theory Lab_part2_part2
    02:34
  • 054 Lecture-54Source NAT Type Dynamic IP and Port (DIPP) Theory Lab_part3
    05:08
  • 054 Lecture-54Source NAT Type Dynamic IP and Port (DIPP) Theory Lab_part4
    05:08
  • 054 Lecture-54Source NAT Type Dynamic IP and Port (DIPP) Theory Lab_part5
    05:08
  • 054 Lecture-54Source NAT Type Dynamic IP and Port (DIPP) Theory Lab_part6
    05:08
  • 054 Lecture-54Source NAT Type Dynamic IP and Port (DIPP) Theory Lab_part7
    05:08
  • 054 Lecture-54Source NAT Type Dynamic IP and Port (DIPP) Theory Lab_part8
    05:08
  • 054 Lecture-54Source NAT Type Dynamic IP and Port (DIPP) Theory Lab_part9
    05:08
  • 055 Lecture-55Source NAT Type Dynamic IP(DIP) Theory and Lab_part1
    05:16
  • 055 Lecture-55Source NAT Type Dynamic IP(DIP) Theory and Lab_part2_part1
    02:38
  • 055 Lecture-55Source NAT Type Dynamic IP(DIP) Theory and Lab_part2_part2
    02:38
  • 056 Lecture-56Source NAT Type Static IP Theory and Lab_part1
    03:45
  • 056 Lecture-56Source NAT Type Static IP Theory and Lab_part2
    03:45
  • 056 Lecture-56Source NAT Type Static IP Theory and Lab_part3
    03:45
  • 057 Lecture-57Destination Network Address Translation Static IP_part1
    05:16
  • 057 Lecture-57Destination Network Address Translation Static IP_part2_part1
    02:38
  • 057 Lecture-57Destination Network Address Translation Static IP_part2_part2
    02:38
  • 057 Lecture-57Destination Network Address Translation Static IP_part3
    05:16
  • 057 Lecture-57Destination Network Address Translation Static IP_part4
    05:16
  • 058 Lecture-58DNAT Port Forwarding and Port Translation_part1
    05:22
  • 058 Lecture-58DNAT Port Forwarding and Port Translation_part2
    05:22
  • 059 Lecture-59U-Turn NAT-Network Address Translation Theory Lab_part1
    04:35
  • 059 Lecture-59U-Turn NAT-Network Address Translation Theory Lab_part2
    04:35
  • 059 Lecture-59U-Turn NAT-Network Address Translation Theory Lab_part3
    04:35
  • 059 Lecture-59U-Turn NAT-Network Address Translation Theory Lab_part4
    04:35
  • 060 Lecture-60Objects (Address, Address Groups,Regions,Service, Service Group)_part1
    11:28
  • 060 Lecture-60Objects (Address, Address Groups,Regions,Service, Service Group)_part2
    11:28
  • 060 Lecture-60Objects (Address, Address Groups,Regions,Service, Service Group)_part3
    11:28
  • 060 Lecture-60Objects (Address, Address Groups,Regions,Service, Service Group)_part4
    11:28
  • 061 Lecture-61Introduction to App-ID in Palo Alto Firewall_part1
    04:20
  • 061 Lecture-61Introduction to App-ID in Palo Alto Firewall_part2_part1
    02:10
  • 061 Lecture-61Introduction to App-ID in Palo Alto Firewall_part2_part2
    02:10
  • 061 Lecture-61Introduction to App-ID in Palo Alto Firewall_part3
    04:20
  • 061 Lecture-61Introduction to App-ID in Palo Alto Firewall_part4
    04:20
  • 061 Lecture-61Introduction to App-ID in Palo Alto Firewall_part5
    04:20
  • 061 Lecture-61Introduction to App-ID in Palo Alto Firewall_part6
    04:20
  • 061 Lecture-61Introduction to App-ID in Palo Alto Firewall_part7_part1
    02:10
  • 061 Lecture-61Introduction to App-ID in Palo Alto Firewall_part7_part2
    02:10
  • 061 Lecture-61Introduction to App-ID in Palo Alto Firewall_part8
    04:20
  • 061 Lecture-61Introduction to App-ID in Palo Alto Firewall_part9
    04:20
  • 062 Lecture-62 Walk-through and Details of Applications in PA Firewall_part1
    04:21
  • 062 Lecture-62 Walk-through and Details of Applications in PA Firewall_part2
    04:21
  • 062 Lecture-62 Walk-through and Details of Applications in PA Firewall_part3
    04:21
  • 063 Lecture-63 Walk-through and Details of Applications Window in PA_part1
    04:37
  • 063 Lecture-63 Walk-through and Details of Applications Window in PA_part2
    04:37
  • 063 Lecture-63 Walk-through and Details of Applications Window in PA_part3
    04:37
  • 063 Lecture-63 Walk-through and Details of Applications Window in PA_part4
    04:37
  • 064 Lecture-64Application Shifts in Palo Alto Firewall_part1
    04:05
  • 064 Lecture-64Application Shifts in Palo Alto Firewall_part2
    04:05
  • 064 Lecture-64Application Shifts in Palo Alto Firewall_part3
    04:05
  • 065 Lecture-65Dependent Applications in Palo Alto Firewall_part1
    03:11
  • 065 Lecture-65Dependent Applications in Palo Alto Firewall_part2
    03:11
  • 066 Lecture-66Implicitly Use Applications in Palo Alto Firewall
    01:57
  • 067 Lecture-67Application Groups in Palo Alto Firewall_part1
    04:49
  • 067 Lecture-67Application Groups in Palo Alto Firewall_part2
    04:49
  • 067 Lecture-67Application Groups in Palo Alto Firewall_part3
    04:49
  • 068 Lecture-68 Application Filters in Palo Alto Firewall_part1
    07:17
  • 068 Lecture-68 Application Filters in Palo Alto Firewall_part2
    07:17
  • 069 Lecture-69Custom Applications in Palo Alto Firewall_part1
    04:19
  • 069 Lecture-69Custom Applications in Palo Alto Firewall_part2
    04:19
  • 070 Lecture-70Application Override in Palo Alto Firewall_part1
    03:37
  • 070 Lecture-70Application Override in Palo Alto Firewall_part2
    03:37
  • 070 Lecture-70Application Override in Palo Alto Firewall_part3
    03:37
  • 070 Lecture-70Application Override in Palo Alto Firewall_part4
    03:37
  • 071 Lecture-71Application Updates in Palo Alto Firewall
    04:14
  • 072 Lecture-72Security Policy based on Application in PA_part1
    03:55
  • 072 Lecture-72Security Policy based on Application in PA_part2
    03:55
  • 072 Lecture-72Security Policy based on Application in PA_part3
    03:55
  • 073 Lecture-73Introduction to User-ID (User Identification)_part1
    03:13
  • 073 Lecture-73Introduction to User-ID (User Identification)_part2
    03:13
  • 074 Lecture-74Captive Portal User-ID in Palo Alto Firewall_part1_part1
    02:33
  • 074 Lecture-74Captive Portal User-ID in Palo Alto Firewall_part1_part2
    02:33
  • 074 Lecture-74Captive Portal User-ID in Palo Alto Firewall_part2
    05:07
  • 074 Lecture-74Captive Portal User-ID in Palo Alto Firewall_part3
    05:07
  • 074 Lecture-74Captive Portal User-ID in Palo Alto Firewall_part4
    05:07
  • 074 Lecture-74Captive Portal User-ID in Palo Alto Firewall_part5
    05:07
  • 075 Lecture-75AD,DNS, Users and Groups Configuration_part1_part1
    04:04
  • 075 Lecture-75AD,DNS, Users and Groups Configuration_part1_part2
    04:04
  • 075 Lecture-75AD,DNS, Users and Groups Configuration_part2
    08:08
  • 076 Lecture-76Palo Alto Firewall Active Directory Integration_part1
    06:06
  • 076 Lecture-76Palo Alto Firewall Active Directory Integration_part2
    06:06
  • 076 Lecture-76Palo Alto Firewall Active Directory Integration_part3
    06:06
  • 076 Lecture-76Palo Alto Firewall Active Directory Integration_part4
    06:06
  • 076 Lecture-76Palo Alto Firewall Active Directory Integration_part5_part1
    03:03
  • 076 Lecture-76Palo Alto Firewall Active Directory Integration_part5_part2
    03:03
  • 076 Lecture-76Palo Alto Firewall Active Directory Integration_part6
    06:06
  • 076 Lecture-76Palo Alto Firewall Active Directory Integration_part7_part1
    03:03
  • 076 Lecture-76Palo Alto Firewall Active Directory Integration_part7_part2
    03:03
  • 077 Lecture-77DHCP(Dynamic Host Configuration Protocol) Theory_part1
    03:57
  • 077 Lecture-77DHCP(Dynamic Host Configuration Protocol) Theory_part2
    03:57
  • 077 Lecture-77DHCP(Dynamic Host Configuration Protocol) Theory_part3
    03:57
  • 077 Lecture-77DHCP(Dynamic Host Configuration Protocol) Theory_part4
    03:57
  • 078 Lecture-78DHCP(Dynamic Host Configuration Protocol) Server Lab_part1
    04:46
  • 078 Lecture-78DHCP(Dynamic Host Configuration Protocol) Server Lab_part2
    04:46
  • 078 Lecture-78DHCP(Dynamic Host Configuration Protocol) Server Lab_part3
    04:46
  • 078 Lecture-78DHCP(Dynamic Host Configuration Protocol) Server Lab_part4
    04:46
  • 078 Lecture-78DHCP(Dynamic Host Configuration Protocol) Server Lab_part5
    04:46
  • 078 Lecture-78DHCP(Dynamic Host Configuration Protocol) Server Lab_part6
    04:46
  • 079 Lecture-79DHCP(Dynamic Host Configuration Protocol) Relay Lab_part1
    05:42
  • 079 Lecture-79DHCP(Dynamic Host Configuration Protocol) Relay Lab_part2
    05:42
  • 079 Lecture-79DHCP(Dynamic Host Configuration Protocol) Relay Lab_part3
    05:42
  • 080 Lecture-80Configure Interface Mgmt (Management) Profile
    08:55
  • 081 Lecture-81Service Features Service Route Configuration_part1
    04:19
  • 081 Lecture-81Service Features Service Route Configuration_part2
    04:18
  • 082 Lecture-82Administrator Accounts Dynamic Roles Configuration_part1_part1
    02:45
  • 082 Lecture-82Administrator Accounts Dynamic Roles Configuration_part1_part2
    02:45
  • 082 Lecture-82Administrator Accounts Dynamic Roles Configuration_part2
    05:30
  • 082 Lecture-82Administrator Accounts Dynamic Roles Configuration_part3
    05:30
  • 083 Lecture-83Administrator Accounts Role Based Configuration_part1
    05:11
  • 083 Lecture-83Administrator Accounts Role Based Configuration_part2
    05:11
  • 083 Lecture-83Administrator Accounts Role Based Configuration_part3
    05:11
  • 084 Lecture-84Administrator Accounts Window Walk-through_part1
    04:53
  • 084 Lecture-84Administrator Accounts Window Walk-through_part2
    04:53
  • 085 Lecture-85Administrator Accounts Password Complexity_part1
    06:32
  • 085 Lecture-85Administrator Accounts Password Complexity_part2
    06:32
  • 085 Lecture-85Administrator Accounts Password Complexity_part3
    06:31
  • 085 Lecture-85Administrator Accounts Password Complexity_part4
    06:31
  • 086 Lecture-86Redundancy High Availability (HA) Theory_part1
    04:08
  • 086 Lecture-86Redundancy High Availability (HA) Theory_part2
    04:08
  • 086 Lecture-86Redundancy High Availability (HA) Theory_part3
    04:08
  • 086 Lecture-86Redundancy High Availability (HA) Theory_part4
    04:08
  • 086 Lecture-86Redundancy High Availability (HA) Theory_part5
    04:08
  • 086 Lecture-86Redundancy High Availability (HA) Theory_part6_part1
    02:04
  • 086 Lecture-86Redundancy High Availability (HA) Theory_part6_part2
    02:03
  • 086 Lecture-86Redundancy High Availability (HA) Theory_part7
    04:08
  • 086 Lecture-86Redundancy High Availability (HA) Theory_part8
    04:07
  • 087 Lecture-87High Availability (HA) Active-Passive Lab_part1
    05:04
  • 087 Lecture-87High Availability (HA) Active-Passive Lab_part2
    05:04
  • 087 Lecture-87High Availability (HA) Active-Passive Lab_part3
    05:04
  • 087 Lecture-87High Availability (HA) Active-Passive Lab_part4
    05:04
  • 087 Lecture-87High Availability (HA) Active-Passive Lab_part5_part1
    02:32
  • 087 Lecture-87High Availability (HA) Active-Passive Lab_part5_part2
    02:32
  • 087 Lecture-87High Availability (HA) Active-Passive Lab_part6
    05:04
  • 087 Lecture-87High Availability (HA) Active-Passive Lab_part7
    05:04
  • 087 Lecture-87High Availability (HA) Active-Passive Lab_part8_part1
    02:32
  • 087 Lecture-87High Availability (HA) Active-Passive Lab_part8_part2
    02:32
  • 087 Lecture-87High Availability (HA) Active-Passive Lab_part9_part1
    02:32
  • 087 Lecture-87High Availability (HA) Active-Passive Lab_part9_part2
    02:32
  • 088 Lecture-88Cryptography, Encryption and Hashing Concepts_part1
    05:15
  • 088 Lecture-88Cryptography, Encryption and Hashing Concepts_part2
    05:15
  • 088 Lecture-88Cryptography, Encryption and Hashing Concepts_part3
    05:15
  • 088 Lecture-88Cryptography, Encryption and Hashing Concepts_part4
    05:15
  • 088 Lecture-88Cryptography, Encryption and Hashing Concepts_part5
    05:15
  • 088 Lecture-88Cryptography, Encryption and Hashing Concepts_part6
    05:15
  • 088 Lecture-88Cryptography, Encryption and Hashing Concepts_part7
    05:15
  • 089 Lecture-89Internet Key Exchange, Version Phases Theory_part1
    03:13
  • 089 Lecture-89Internet Key Exchange, Version Phases Theory_part2
    03:13
  • 089 Lecture-89Internet Key Exchange, Version Phases Theory_part3
    03:13
  • 090 Lecture-90VPN, Types, Protocols,Classification etc Theory_part1
    03:23
  • 090 Lecture-90VPN, Types, Protocols,Classification etc Theory_part2
    03:23
  • 091 Lecture-91IPSec Protocols, Features,Modes,Encryption Theory_part1
    02:58
  • 091 Lecture-91IPSec Protocols, Features,Modes,Encryption Theory_part2
    02:58
  • 092 Lecture-92IPSec Site-to-Site Virtual Private Network VPN Lab_part1_part1
    02:36
  • 092 Lecture-92IPSec Site-to-Site Virtual Private Network VPN Lab_part1_part2
    02:36
  • 092 Lecture-92IPSec Site-to-Site Virtual Private Network VPN Lab_part2
    05:13
  • 092 Lecture-92IPSec Site-to-Site Virtual Private Network VPN Lab_part3
    05:13
  • 092 Lecture-92IPSec Site-to-Site Virtual Private Network VPN Lab_part4
    05:13
  • 092 Lecture-92IPSec Site-to-Site Virtual Private Network VPN Lab_part5
    05:13
  • 092 Lecture-92IPSec Site-to-Site Virtual Private Network VPN Lab_part6_part1
    02:36
  • 092 Lecture-92IPSec Site-to-Site Virtual Private Network VPN Lab_part6_part2
    02:36
  • 092 Lecture-92IPSec Site-to-Site Virtual Private Network VPN Lab_part7
    05:13
  • 093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part1_part1
    03:05
  • 093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part1_part2
    03:04
  • 093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part2_part1
    03:05
  • 093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part2_part2
    03:04
  • 093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part3_part1
    03:05
  • 093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part3_part2
    03:04
  • 093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part4
    06:09
  • 093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part5
    06:09
  • 093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part6
    06:09
  • 093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part7
    06:09
  • 093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part8
    06:09
  • 093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part9
    06:09
  • 093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part10
    06:09
  • 093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part11
    06:09
  • 093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part12
    06:09
  • 093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part13_part1
    03:05
  • 093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part13_part2
    03:04
  • 093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part14_part1
    03:04
  • 093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part14_part2
    03:04
  • 094 Lecture-94Log Types (Traffic,Threat, User-ID etc) in Monitor Tab_part1
    04:58
  • 094 Lecture-94Log Types (Traffic,Threat, User-ID etc) in Monitor Tab_part2_part1
    02:29
  • 094 Lecture-94Log Types (Traffic,Threat, User-ID etc) in Monitor Tab_part2_part2
    02:29
  • 094 Lecture-94Log Types (Traffic,Threat, User-ID etc) in Monitor Tab_part3_part1
    02:29
  • 094 Lecture-94Log Types (Traffic,Threat, User-ID etc) in Monitor Tab_part3_part2
    02:29
  • 094 Lecture-94Log Types (Traffic,Threat, User-ID etc) in Monitor Tab_part4
    04:58
  • 094 Lecture-94Log Types (Traffic,Threat, User-ID etc) in Monitor Tab_part5
    04:58
  • 094 Lecture-94Log Types (Traffic,Threat, User-ID etc) in Monitor Tab_part6
    04:58
  • 094 Lecture-94Log Types (Traffic,Threat, User-ID etc) in Monitor Tab_part7
    04:58
  • 095 Lecture-95Configure and Verify Syslog in Palo Alto Firewall_part1_part1
    02:22
  • 095 Lecture-95Configure and Verify Syslog in Palo Alto Firewall_part1_part2
    02:22
  • 095 Lecture-95Configure and Verify Syslog in Palo Alto Firewall_part2
    04:45
  • 095 Lecture-95Configure and Verify Syslog in Palo Alto Firewall_part3
    04:45
  • 095 Lecture-95Configure and Verify Syslog in Palo Alto Firewall_part4_part1
    02:22
  • 095 Lecture-95Configure and Verify Syslog in Palo Alto Firewall_part4_part2
    02:22
  • 095 Lecture-95Configure and Verify Syslog in Palo Alto Firewall_part5
    04:45
  • 096 Lecture-96Configure and Verify NetFlow in Palo Alto Firewall_part1
    03:47
  • 096 Lecture-96Configure and Verify NetFlow in Palo Alto Firewall_part2
    03:46
  • 096 Lecture-96Configure and Verify NetFlow in Palo Alto Firewall_part3
    03:47
  • 096 Lecture-96Configure and Verify NetFlow in Palo Alto Firewall_part4
    03:46
  • 097 Lecture-97Configure and Verify SNMP in Palo Alto Firewall_part1
    04:06
  • 097 Lecture-97Configure and Verify SNMP in Palo Alto Firewall_part2
    04:06
  • 097 Lecture-97Configure and Verify SNMP in Palo Alto Firewall_part3
    04:06
  • 097 Lecture-97Configure and Verify SNMP in Palo Alto Firewall_part4
    04:06
  • 098 Lecture-98Configure and Verify Packet Capture GUI and CLI_part1
    05:05
  • 098 Lecture-98Configure and Verify Packet Capture GUI and CLI_part2
    05:05
  • 098 Lecture-98Configure and Verify Packet Capture GUI and CLI_part3
    05:05
  • 098 Lecture-98Configure and Verify Packet Capture GUI and CLI_part4
    05:05
  • 098 Lecture-98Configure and Verify Packet Capture GUI and CLI_part5
    05:05
  • 098 Lecture-98Configure and Verify Packet Capture GUI and CLI_part6_part1
    02:32
  • 098 Lecture-98Configure and Verify Packet Capture GUI and CLI_part6_part2
    02:32
  • 098 Lecture-98Configure and Verify Packet Capture GUI and CLI_part7_part1
    02:32
  • 098 Lecture-98Configure and Verify Packet Capture GUI and CLI_part7_part2
    02:32
  • 099 Lecture-99App Scope (Summary,Change,Threat,Network Monitor)
    04:39
  • 100 Lecture-100ACC (Application Command Center ) Tab Walk-through_part1
    05:45
  • 100 Lecture-100ACC (Application Command Center ) Tab Walk-through_part2
    05:45
  • 100 Lecture-100ACC (Application Command Center ) Tab Walk-through_part3
    05:45
  • 101 Lecture-101Configure Backup and Restore in Palo Alto Firewall_part1_part1
    02:51
  • 101 Lecture-101Configure Backup and Restore in Palo Alto Firewall_part1_part2
    02:51
  • 101 Lecture-101Configure Backup and Restore in Palo Alto Firewall_part2
    05:42
  • 101 Lecture-101Configure Backup and Restore in Palo Alto Firewall_part3
    05:42
  • 101 Lecture-101Configure Backup and Restore in Palo Alto Firewall_part4
    05:42
  • 101 Lecture-101Configure Backup and Restore in Palo Alto Firewall_part5
    05:42
  • 101 Lecture-101Configure Backup and Restore in Palo Alto Firewall_part6
    05:42
  • 101 Lecture-101Configure Backup and Restore in Palo Alto Firewall_part7_part1
    02:51
  • 101 Lecture-101Configure Backup and Restore in Palo Alto Firewall_part7_part2
    02:51
  • 102 EVE-NG Installation, Configuration Images_part1
    10:25
  • 102 EVE-NG Installation, Configuration Images_part2
    10:25
  • 102 EVE-NG Installation, Configuration Images_part3
    10:24

Student Ratings & Reviews

No Review Yet
No Review Yet