Palo Alto Firewall PCNSE New V9 & V10 Training
About Course
In this courses, feature lecture and hands-on labs, you will learn to install, configure, manage and troubleshoot Palo Alto Networks firewalls, gaining the skills and expertise needed to protect your organization from the most advanced cyber-security attacks. The student will get hands-on experience in configuring, managing, and monitoring a firewall in a lab environment.
This class covers many topics required for PCNSE V10 and new topics are added frequently. This course dives deeper into Palo Alto firewalls policies and network configuration to give the students a clear understanding on several topics. Topics covered include Security Policies configuration, SSL Decryption, Routing configuration, IPsec configuration, High Availability configuration and other real world configuration examples. This online class will help in preparing the student for the PCNSE certification by covering topics in the depth that Palo Alto expects the candidates to know. There are also materials included with this class.
The Palo Alto Networks Certified Network Security Engineer (PCNSE) recognizes individuals with in-depth knowledge and abilities to design, install, configure, maintain and troubleshoot the vast majority of implementations based on the Palo Alto Networks platform.
“Palo Alto is an industry leader in the next-gen Firewall”. The course covers the Palo Alto Firewall “basis to advance”, concepts in a most practical way ensuring that delegates not only pass the exam but are also ready for a real-world environment.
Course Content
PCNSE
-
Download Resource Files
-
001 Lecture-01 Conman Network Security Terms_part1
05:20 -
001 Lecture-01 Conman Network Security Terms_part2
05:20 -
001 Lecture-01 Conman Network Security Terms_part3_part1
02:40 -
001 Lecture-01 Conman Network Security Terms_part3_part2
02:40 -
001 Lecture-01 Conman Network Security Terms_part4_part1
02:40 -
001 Lecture-01 Conman Network Security Terms_part4_part2
02:40 -
002 Lecture-02Identify Malware Malicious Software_part1
04:24 -
002 Lecture-02Identify Malware Malicious Software_part2_part1
02:12 -
002 Lecture-02Identify Malware Malicious Software_part2_part2
02:12 -
002 Lecture-02Identify Malware Malicious Software_part3
04:24 -
002 Lecture-02Identify Malware Malicious Software_part4
04:24 -
002 Lecture-02Identify Malware Malicious Software_part5
04:24 -
002 Lecture-02Identify Malware Malicious Software_part6
04:24 -
002 Lecture-02Identify Malware Malicious Software_part7
04:24 -
003 Lecture-03Introduction to Firewall Technology_part1
04:04 -
003 Lecture-03Introduction to Firewall Technology_part2
04:04 -
003 Lecture-03Introduction to Firewall Technology_part3
04:04 -
003 Lecture-03Introduction to Firewall Technology_part4
04:04 -
003 Lecture-03Introduction to Firewall Technology_part5
04:04 -
004 Lecture-04About Palo Alto Networks Firewall_part1_part1
02:25 -
004 Lecture-04About Palo Alto Networks Firewall_part1_part2
02:25 -
004 Lecture-04About Palo Alto Networks Firewall_part2
04:51 -
004 Lecture-04About Palo Alto Networks Firewall_part3
04:51 -
005 Lecture-05Install Palo Alto Firewall In VMware_part1_part1
02:52 -
005 Lecture-05Install Palo Alto Firewall In VMware_part1_part2
02:52 -
005 Lecture-05Install Palo Alto Firewall In VMware_part2
05:44 -
005 Lecture-05Install Palo Alto Firewall In VMware_part3
05:44 -
006 Lecture-06Install Palo Alto On EVE-NG_part1_part1
03:39 -
006 Lecture-06Install Palo Alto On EVE-NG_part1_part2
03:39 -
006 Lecture-06Install Palo Alto On EVE-NG_part2
07:19 -
007 Lecture-07Install Palo Alto in GNS3
06:26 -
008 Lecture-08Install Palo Alto On ESXI_part1
03:57 -
008 Lecture-08Install Palo Alto On ESXI_part2
03:57 -
008 Lecture-08Install Palo Alto On ESXI_part3
03:57 -
009 Lecture-09CLI Access Modes Basic Commands_part1
06:00 -
009 Lecture-09CLI Access Modes Basic Commands_part2
06:00 -
009 Lecture-09CLI Access Modes Basic Commands_part3_part1
03:00 -
009 Lecture-09CLI Access Modes Basic Commands_part3_part2
03:00 -
010 Lecture-10Introduction to Dashboard Tab_part1
05:25 -
010 Lecture-10Introduction to Dashboard Tab_part2
05:25 -
010 Lecture-10Introduction to Dashboard Tab_part3
05:25 -
010 Lecture-10Introduction to Dashboard Tab_part4
05:25 -
011 Lecture-11Palto Alto Initial Configuration
04:18 -
012 Lecture-12Configure DNS NTP in Palto Firewall_part1
04:58 -
012 Lecture-12Configure DNS NTP in Palto Firewall_part2
04:58 -
012 Lecture-12Configure DNS NTP in Palto Firewall_part3
04:58 -
012 Lecture-12Configure DNS NTP in Palto Firewall_part4
04:58 -
013 Lecture-13Activate Licenses and Subscriptions_part1
04:36 -
013 Lecture-13Activate Licenses and Subscriptions_part2
04:36 -
013 Lecture-13Activate Licenses and Subscriptions_part3
04:36 -
013 Lecture-13Activate Licenses and Subscriptions_part4
04:36 -
013 Lecture-13Activate Licenses and Subscriptions_part5
04:36 -
014 Lecture-14Dynamic Updates and Software Updates_part1
04:06 -
014 Lecture-14Dynamic Updates and Software Updates_part2
04:06 -
014 Lecture-14Dynamic Updates and Software Updates_part3
04:06 -
014 Lecture-14Dynamic Updates and Software Updates_part4
04:06 -
014 Lecture-14Dynamic Updates and Software Updates_part5
04:06 -
015 Lecture-15Initial Working of Palo Alto Firewall_part1
05:37 -
015 Lecture-15Initial Working of Palo Alto Firewall_part2
05:37 -
015 Lecture-15Initial Working of Palo Alto Firewall_part3
05:37 -
015 Lecture-15Initial Working of Palo Alto Firewall_part4_part1
02:48 -
015 Lecture-15Initial Working of Palo Alto Firewall_part4_part2
02:48 -
016 Lecture-16Management Interface Configuration_part1_part1
03:20 -
016 Lecture-16Management Interface Configuration_part1_part2
03:20 -
016 Lecture-16Management Interface Configuration_part2
06:40 -
016 Lecture-16Management Interface Configuration_part3
06:40 -
016 Lecture-16Management Interface Configuration_part4
06:40 -
017 Lecture-17Palo Alto Firewall Interfaces Details_part1_part1
02:41 -
017 Lecture-17Palo Alto Firewall Interfaces Details_part1_part2
02:41 -
017 Lecture-17Palo Alto Firewall Interfaces Details_part2
05:22 -
017 Lecture-17Palo Alto Firewall Interfaces Details_part3
05:22 -
017 Lecture-17Palo Alto Firewall Interfaces Details_part4
05:22 -
017 Lecture-17Palo Alto Firewall Interfaces Details_part5
05:22 -
017 Lecture-17Palo Alto Firewall Interfaces Details_part6
05:22 -
018 Lecture-18Palo Alto Firewall Zones Details_part1
04:01 -
018 Lecture-18Palo Alto Firewall Zones Details_part2
04:01 -
018 Lecture-18Palo Alto Firewall Zones Details_part3
04:01 -
019 Lecture-19Routing Protocols,AD,Metric Routing Tables_part1
10:26 -
019 Lecture-19Routing Protocols,AD,Metric Routing Tables_part2
10:25 -
020 Lecture-20Virtual Routers in Palo Alto Firewall_part1
05:36 -
020 Lecture-20Virtual Routers in Palo Alto Firewall_part2
05:36 -
021 Lecture-21Configure Verify Static Routing in PA Firewall_part1
04:55 -
021 Lecture-21Configure Verify Static Routing in PA Firewall_part2_part1
02:27 -
021 Lecture-21Configure Verify Static Routing in PA Firewall_part2_part2
02:27 -
021 Lecture-21Configure Verify Static Routing in PA Firewall_part3
04:55 -
021 Lecture-21Configure Verify Static Routing in PA Firewall_part4
04:55 -
021 Lecture-21Configure Verify Static Routing in PA Firewall_part5
04:55 -
021 Lecture-21Configure Verify Static Routing in PA Firewall_part6
04:55 -
021 Lecture-21Configure Verify Static Routing in PA Firewall_part7
04:55 -
021 Lecture-21Configure Verify Static Routing in PA Firewall_part8
04:55 -
021 Lecture-21Configure Verify Static Routing in PA Firewall_part9
04:55 -
021 Lecture-21Configure Verify Static Routing in PA Firewall_part10
04:55 -
022 Lecture-22Configure Verify Default Routing in PA Firewall_part1
04:42 -
022 Lecture-22Configure Verify Default Routing in PA Firewall_part2
04:42 -
022 Lecture-22Configure Verify Default Routing in PA Firewall_part3
04:42 -
023 Lecture-23Configure Verify Dynamic Protocol RIP in PA_part1
04:46 -
023 Lecture-23Configure Verify Dynamic Protocol RIP in PA_part2
04:46 -
023 Lecture-23Configure Verify Dynamic Protocol RIP in PA_part3
04:46 -
023 Lecture-23Configure Verify Dynamic Protocol RIP in PA_part4
04:46 -
023 Lecture-23Configure Verify Dynamic Protocol RIP in PA_part5
04:46 -
024 Lecture-24Configure Verify RIP Authentication in PA_part1
04:26 -
024 Lecture-24Configure Verify RIP Authentication in PA_part2
04:26 -
024 Lecture-24Configure Verify RIP Authentication in PA_part3
04:26 -
024 Lecture-24Configure Verify RIP Authentication in PA_part4
04:26 -
025 Lecture-25Configure Verify Dynamic Protocol OSPF in PA_part1_part1
02:29 -
025 Lecture-25Configure Verify Dynamic Protocol OSPF in PA_part1_part2
02:29 -
025 Lecture-25Configure Verify Dynamic Protocol OSPF in PA_part2
04:58 -
025 Lecture-25Configure Verify Dynamic Protocol OSPF in PA_part3
04:58 -
025 Lecture-25Configure Verify Dynamic Protocol OSPF in PA_part4
04:58 -
025 Lecture-25Configure Verify Dynamic Protocol OSPF in PA_part5
04:58 -
025 Lecture-25Configure Verify Dynamic Protocol OSPF in PA_part6
04:58 -
025 Lecture-25Configure Verify Dynamic Protocol OSPF in PA_part7
04:58 -
026 Lecture-26Configure and Verify Redistribute in PA_part1
04:42 -
026 Lecture-26Configure and Verify Redistribute in PA_part2
04:42 -
026 Lecture-26Configure and Verify Redistribute in PA_part3
04:42 -
027 Lecture-27Security Policy Concept Theory in PA_part1
05:11 -
027 Lecture-27Security Policy Concept Theory in PA_part2_part1
02:35 -
027 Lecture-27Security Policy Concept Theory in PA_part2_part2
02:35 -
027 Lecture-27Security Policy Concept Theory in PA_part3
05:11 -
027 Lecture-27Security Policy Concept Theory in PA_part4
05:11 -
027 Lecture-27Security Policy Concept Theory in PA_part5
05:11 -
027 Lecture-27Security Policy Concept Theory in PA_part6
05:11 -
027 Lecture-27Security Policy Concept Theory in PA_part7_part1
02:35 -
027 Lecture-27Security Policy Concept Theory in PA_part7_part2
02:35 -
027 Lecture-27Security Policy Concept Theory in PA_part8
05:11 -
027 Lecture-27Security Policy Concept Theory in PA_part9
05:11 -
027 Lecture-27Security Policy Concept Theory in PA_part10
05:11 -
028 Lecture-28Security Policy Granular Criteria and Control_part1
06:22 -
028 Lecture-28Security Policy Granular Criteria and Control_part2_part1
03:11 -
028 Lecture-28Security Policy Granular Criteria and Control_part2_part2
03:11 -
028 Lecture-28Security Policy Granular Criteria and Control_part3
06:22 -
028 Lecture-28Security Policy Granular Criteria and Control_part4
06:22 -
028 Lecture-28Security Policy Granular Criteria and Control_part5_part1
03:11 -
028 Lecture-28Security Policy Granular Criteria and Control_part5_part2
03:11 -
028 Lecture-28Security Policy Granular Criteria and Control_part6
06:22 -
028 Lecture-28Security Policy Granular Criteria and Control_part7
06:22 -
029 Lecture-29Security Policy Action Setting Options_part1
04:50 -
029 Lecture-29Security Policy Action Setting Options_part2
04:50 -
029 Lecture-29Security Policy Action Setting Options_part3
04:50 -
029 Lecture-29Security Policy Action Setting Options_part4
04:50 -
029 Lecture-29Security Policy Action Setting Options_part5
04:50 -
029 Lecture-29Security Policy Action Setting Options_part6_part1
02:25 -
029 Lecture-29Security Policy Action Setting Options_part6_part2
02:25 -
030 Lecture-30Security Policy Shadows Rule in PA
05:05 -
031 Lecture-31Security Policy Test Policy Match Option
06:08 -
032 Lecture-32Security Policy View Rulebase as Groups_part1
04:31 -
032 Lecture-32Security Policy View Rulebase as Groups_part2
04:31 -
033 Lecture-33Security Policy Policy Optimizer Option
05:16 -
034 Lecture-34Introduction to SSL and TLS certificates_part1_part1
02:45 -
034 Lecture-34Introduction to SSL and TLS certificates_part1_part2
02:45 -
034 Lecture-34Introduction to SSL and TLS certificates_part2
05:30 -
034 Lecture-34Introduction to SSL and TLS certificates_part3
05:30 -
035 Lecture-35Configure SSL Forward Proxy in PA Firewall_part1
05:04 -
035 Lecture-35Configure SSL Forward Proxy in PA Firewall_part2
05:04 -
035 Lecture-35Configure SSL Forward Proxy in PA Firewall_part3
05:04 -
035 Lecture-35Configure SSL Forward Proxy in PA Firewall_part4
05:04 -
035 Lecture-35Configure SSL Forward Proxy in PA Firewall_part5
05:04 -
036 Lecture-36Introduction to Security Profiles Content-ID_part1
05:07 -
036 Lecture-36Introduction to Security Profiles Content-ID_part2
05:07 -
037 Lecture-37Configure Security Profile (Antivirus Profile)_part1
05:15 -
037 Lecture-37Configure Security Profile (Antivirus Profile)_part2
05:15 -
037 Lecture-37Configure Security Profile (Antivirus Profile)_part3
05:15 -
037 Lecture-37Configure Security Profile (Antivirus Profile)_part4
05:15 -
038 Lecture-38Configure Security Profile (Anti-Spyware)_part1_part1
03:07 -
038 Lecture-38Configure Security Profile (Anti-Spyware)_part1_part2
03:07 -
038 Lecture-38Configure Security Profile (Anti-Spyware)_part2_part1
03:07 -
038 Lecture-38Configure Security Profile (Anti-Spyware)_part2_part2
03:07 -
038 Lecture-38Configure Security Profile (Anti-Spyware)_part3
06:14 -
038 Lecture-38Configure Security Profile (Anti-Spyware)_part4_part1
03:07 -
038 Lecture-38Configure Security Profile (Anti-Spyware)_part4_part2
03:07 -
039 Lecture-39Configure Security Profile (Vulnerability)_part1_part1
02:31 -
039 Lecture-39Configure Security Profile (Vulnerability)_part1_part2
02:31 -
039 Lecture-39Configure Security Profile (Vulnerability)_part2
05:03 -
039 Lecture-39Configure Security Profile (Vulnerability)_part3
05:03 -
039 Lecture-39Configure Security Profile (Vulnerability)_part4
05:03 -
039 Lecture-39Configure Security Profile (Vulnerability)_part5
05:03 -
039 Lecture-39Configure Security Profile (Vulnerability)_part6
05:03 -
039 Lecture-39Configure Security Profile (Vulnerability)_part7_part1
02:31 -
039 Lecture-39Configure Security Profile (Vulnerability)_part7_part2
02:31 -
040 Lecture-40Configure Security Profile (URL Filtering)_part1
05:14 -
040 Lecture-40Configure Security Profile (URL Filtering)_part2
05:14 -
040 Lecture-40Configure Security Profile (URL Filtering)_part3
05:14 -
040 Lecture-40Configure Security Profile (URL Filtering)_part4
05:14 -
040 Lecture-40Configure Security Profile (URL Filtering)_part5
05:14 -
040 Lecture-40Configure Security Profile (URL Filtering)_part6_part1
02:37 -
040 Lecture-40Configure Security Profile (URL Filtering)_part6_part2
02:37 -
040 Lecture-40Configure Security Profile (URL Filtering)_part7
05:14 -
041 Lecture-41Configure Security Profile (File Blocking)_part1
04:45 -
041 Lecture-41Configure Security Profile (File Blocking)_part2
04:45 -
041 Lecture-41Configure Security Profile (File Blocking)_part3
04:45 -
041 Lecture-41Configure Security Profile (File Blocking)_part4
04:45 -
042 Lecture-42Configure Security Profile (WildFire Analysis)_part1
05:07 -
042 Lecture-42Configure Security Profile (WildFire Analysis)_part2_part1
02:33 -
042 Lecture-42Configure Security Profile (WildFire Analysis)_part2_part2
02:33 -
042 Lecture-42Configure Security Profile (WildFire Analysis)_part3
05:06 -
042 Lecture-42Configure Security Profile (WildFire Analysis)_part4
05:07 -
042 Lecture-42Configure Security Profile (WildFire Analysis)_part5
05:07 -
042 Lecture-42Configure Security Profile (WildFire Analysis)_part6
05:07 -
042 Lecture-42Configure Security Profile (WildFire Analysis)_part7
05:06 -
043 Lecture-43Configure Security Profile (Data Filter)_part1
05:15 -
043 Lecture-43Configure Security Profile (Data Filter)_part2
05:15 -
043 Lecture-43Configure Security Profile (Data Filter)_part3
05:15 -
043 Lecture-43Configure Security Profile (Data Filter)_part4
05:15 -
043 Lecture-43Configure Security Profile (Data Filter)_part5
05:15 -
044 Lecture-44Configure Security Profile (Security Group)_part1
04:48 -
044 Lecture-44Configure Security Profile (Security Group)_part2
04:48 -
045 Lecture-45DoS Zone Protection and Packet Buffer Theory_part1
04:28 -
045 Lecture-45DoS Zone Protection and Packet Buffer Theory_part2
04:28 -
045 Lecture-45DoS Zone Protection and Packet Buffer Theory_part3
04:28 -
045 Lecture-45DoS Zone Protection and Packet Buffer Theory_part4
04:28 -
046 Lecture-46Configure Verify DoS Protection Profile_part1
06:11 -
046 Lecture-46Configure Verify DoS Protection Profile_part2
06:11 -
046 Lecture-46Configure Verify DoS Protection Profile_part3
06:11 -
046 Lecture-46Configure Verify DoS Protection Profile_part4_part1
03:05 -
046 Lecture-46Configure Verify DoS Protection Profile_part4_part2
03:05 -
046 Lecture-46Configure Verify DoS Protection Profile_part5_part1
03:05 -
046 Lecture-46Configure Verify DoS Protection Profile_part5_part2
03:05 -
046 Lecture-46Configure Verify DoS Protection Profile_part6
06:11 -
046 Lecture-46Configure Verify DoS Protection Profile_part7_part1
03:05 -
046 Lecture-46Configure Verify DoS Protection Profile_part7_part2
03:05 -
047 Lecture-47Configure Verify Zone Protection Profile_part1
05:13 -
047 Lecture-47Configure Verify Zone Protection Profile_part2_part1
02:37 -
047 Lecture-47Configure Verify Zone Protection Profile_part2_part2
02:36 -
047 Lecture-47Configure Verify Zone Protection Profile_part3
05:13 -
047 Lecture-47Configure Verify Zone Protection Profile_part4
05:13 -
047 Lecture-47Configure Verify Zone Protection Profile_part5
05:13 -
048 Lecture-48Configure Verify Packet Buffer Protection_part1
05:14 -
048 Lecture-48Configure Verify Packet Buffer Protection_part2_part1
02:37 -
048 Lecture-48Configure Verify Packet Buffer Protection_part2_part2
02:37 -
049 Lecture-49Palo Alto Firewall Layer 2 Deployment_part1_part1
02:33 -
049 Lecture-49Palo Alto Firewall Layer 2 Deployment_part1_part2
02:33 -
049 Lecture-49Palo Alto Firewall Layer 2 Deployment_part2
05:07 -
049 Lecture-49Palo Alto Firewall Layer 2 Deployment_part3
05:07 -
049 Lecture-49Palo Alto Firewall Layer 2 Deployment_part4
05:07 -
049 Lecture-49Palo Alto Firewall Layer 2 Deployment_part5
05:07 -
049 Lecture-49Palo Alto Firewall Layer 2 Deployment_part6
05:07 -
050 Lecture-50Palo Alto Firewall Tap Mode Deployment_part1_part1
02:28 -
050 Lecture-50Palo Alto Firewall Tap Mode Deployment_part1_part2
02:28 -
050 Lecture-50Palo Alto Firewall Tap Mode Deployment_part2
04:57 -
050 Lecture-50Palo Alto Firewall Tap Mode Deployment_part3
04:57 -
050 Lecture-50Palo Alto Firewall Tap Mode Deployment_part4
04:57 -
050 Lecture-50Palo Alto Firewall Tap Mode Deployment_part5_part1
02:28 -
050 Lecture-50Palo Alto Firewall Tap Mode Deployment_part5_part2
02:28 -
051 Lecture-51Palo Alto Firewall V-Wire Mode Deployment_part1_part1
02:15 -
051 Lecture-51Palo Alto Firewall V-Wire Mode Deployment_part1_part2
02:15 -
051 Lecture-51Palo Alto Firewall V-Wire Mode Deployment_part2
04:31 -
051 Lecture-51Palo Alto Firewall V-Wire Mode Deployment_part3
04:31 -
051 Lecture-51Palo Alto Firewall V-Wire Mode Deployment_part4
04:31 -
051 Lecture-51Palo Alto Firewall V-Wire Mode Deployment_part5
04:31 -
052 Lecture-52Palo Alto Firewall Sub-Interface Mode_part1
05:40 -
052 Lecture-52Palo Alto Firewall Sub-Interface Mode_part2_part1
02:50 -
052 Lecture-52Palo Alto Firewall Sub-Interface Mode_part2_part2
02:50 -
052 Lecture-52Palo Alto Firewall Sub-Interface Mode_part3
05:40 -
052 Lecture-52Palo Alto Firewall Sub-Interface Mode_part4_part1
02:50 -
052 Lecture-52Palo Alto Firewall Sub-Interface Mode_part4_part2
02:50 -
053 Lecture-53NAT Theory Source Network Address Translation Types_part1
04:31 -
053 Lecture-53NAT Theory Source Network Address Translation Types_part2
04:31 -
053 Lecture-53NAT Theory Source Network Address Translation Types_part3
04:31 -
053 Lecture-53NAT Theory Source Network Address Translation Types_part4
04:31 -
054 Lecture-54Source NAT Type Dynamic IP and Port (DIPP) Theory Lab_part1_part1
02:34 -
054 Lecture-54Source NAT Type Dynamic IP and Port (DIPP) Theory Lab_part1_part2
02:34 -
054 Lecture-54Source NAT Type Dynamic IP and Port (DIPP) Theory Lab_part2_part1
02:34 -
054 Lecture-54Source NAT Type Dynamic IP and Port (DIPP) Theory Lab_part2_part2
02:34 -
054 Lecture-54Source NAT Type Dynamic IP and Port (DIPP) Theory Lab_part3
05:08 -
054 Lecture-54Source NAT Type Dynamic IP and Port (DIPP) Theory Lab_part4
05:08 -
054 Lecture-54Source NAT Type Dynamic IP and Port (DIPP) Theory Lab_part5
05:08 -
054 Lecture-54Source NAT Type Dynamic IP and Port (DIPP) Theory Lab_part6
05:08 -
054 Lecture-54Source NAT Type Dynamic IP and Port (DIPP) Theory Lab_part7
05:08 -
054 Lecture-54Source NAT Type Dynamic IP and Port (DIPP) Theory Lab_part8
05:08 -
054 Lecture-54Source NAT Type Dynamic IP and Port (DIPP) Theory Lab_part9
05:08 -
055 Lecture-55Source NAT Type Dynamic IP(DIP) Theory and Lab_part1
05:16 -
055 Lecture-55Source NAT Type Dynamic IP(DIP) Theory and Lab_part2_part1
02:38 -
055 Lecture-55Source NAT Type Dynamic IP(DIP) Theory and Lab_part2_part2
02:38 -
056 Lecture-56Source NAT Type Static IP Theory and Lab_part1
03:45 -
056 Lecture-56Source NAT Type Static IP Theory and Lab_part2
03:45 -
056 Lecture-56Source NAT Type Static IP Theory and Lab_part3
03:45 -
057 Lecture-57Destination Network Address Translation Static IP_part1
05:16 -
057 Lecture-57Destination Network Address Translation Static IP_part2_part1
02:38 -
057 Lecture-57Destination Network Address Translation Static IP_part2_part2
02:38 -
057 Lecture-57Destination Network Address Translation Static IP_part3
05:16 -
057 Lecture-57Destination Network Address Translation Static IP_part4
05:16 -
058 Lecture-58DNAT Port Forwarding and Port Translation_part1
05:22 -
058 Lecture-58DNAT Port Forwarding and Port Translation_part2
05:22 -
059 Lecture-59U-Turn NAT-Network Address Translation Theory Lab_part1
04:35 -
059 Lecture-59U-Turn NAT-Network Address Translation Theory Lab_part2
04:35 -
059 Lecture-59U-Turn NAT-Network Address Translation Theory Lab_part3
04:35 -
059 Lecture-59U-Turn NAT-Network Address Translation Theory Lab_part4
04:35 -
060 Lecture-60Objects (Address, Address Groups,Regions,Service, Service Group)_part1
11:28 -
060 Lecture-60Objects (Address, Address Groups,Regions,Service, Service Group)_part2
11:28 -
060 Lecture-60Objects (Address, Address Groups,Regions,Service, Service Group)_part3
11:28 -
060 Lecture-60Objects (Address, Address Groups,Regions,Service, Service Group)_part4
11:28 -
061 Lecture-61Introduction to App-ID in Palo Alto Firewall_part1
04:20 -
061 Lecture-61Introduction to App-ID in Palo Alto Firewall_part2_part1
02:10 -
061 Lecture-61Introduction to App-ID in Palo Alto Firewall_part2_part2
02:10 -
061 Lecture-61Introduction to App-ID in Palo Alto Firewall_part3
04:20 -
061 Lecture-61Introduction to App-ID in Palo Alto Firewall_part4
04:20 -
061 Lecture-61Introduction to App-ID in Palo Alto Firewall_part5
04:20 -
061 Lecture-61Introduction to App-ID in Palo Alto Firewall_part6
04:20 -
061 Lecture-61Introduction to App-ID in Palo Alto Firewall_part7_part1
02:10 -
061 Lecture-61Introduction to App-ID in Palo Alto Firewall_part7_part2
02:10 -
061 Lecture-61Introduction to App-ID in Palo Alto Firewall_part8
04:20 -
061 Lecture-61Introduction to App-ID in Palo Alto Firewall_part9
04:20 -
062 Lecture-62 Walk-through and Details of Applications in PA Firewall_part1
04:21 -
062 Lecture-62 Walk-through and Details of Applications in PA Firewall_part2
04:21 -
062 Lecture-62 Walk-through and Details of Applications in PA Firewall_part3
04:21 -
063 Lecture-63 Walk-through and Details of Applications Window in PA_part1
04:37 -
063 Lecture-63 Walk-through and Details of Applications Window in PA_part2
04:37 -
063 Lecture-63 Walk-through and Details of Applications Window in PA_part3
04:37 -
063 Lecture-63 Walk-through and Details of Applications Window in PA_part4
04:37 -
064 Lecture-64Application Shifts in Palo Alto Firewall_part1
04:05 -
064 Lecture-64Application Shifts in Palo Alto Firewall_part2
04:05 -
064 Lecture-64Application Shifts in Palo Alto Firewall_part3
04:05 -
065 Lecture-65Dependent Applications in Palo Alto Firewall_part1
03:11 -
065 Lecture-65Dependent Applications in Palo Alto Firewall_part2
03:11 -
066 Lecture-66Implicitly Use Applications in Palo Alto Firewall
01:57 -
067 Lecture-67Application Groups in Palo Alto Firewall_part1
04:49 -
067 Lecture-67Application Groups in Palo Alto Firewall_part2
04:49 -
067 Lecture-67Application Groups in Palo Alto Firewall_part3
04:49 -
068 Lecture-68 Application Filters in Palo Alto Firewall_part1
07:17 -
068 Lecture-68 Application Filters in Palo Alto Firewall_part2
07:17 -
069 Lecture-69Custom Applications in Palo Alto Firewall_part1
04:19 -
069 Lecture-69Custom Applications in Palo Alto Firewall_part2
04:19 -
070 Lecture-70Application Override in Palo Alto Firewall_part1
03:37 -
070 Lecture-70Application Override in Palo Alto Firewall_part2
03:37 -
070 Lecture-70Application Override in Palo Alto Firewall_part3
03:37 -
070 Lecture-70Application Override in Palo Alto Firewall_part4
03:37 -
071 Lecture-71Application Updates in Palo Alto Firewall
04:14 -
072 Lecture-72Security Policy based on Application in PA_part1
03:55 -
072 Lecture-72Security Policy based on Application in PA_part2
03:55 -
072 Lecture-72Security Policy based on Application in PA_part3
03:55 -
073 Lecture-73Introduction to User-ID (User Identification)_part1
03:13 -
073 Lecture-73Introduction to User-ID (User Identification)_part2
03:13 -
074 Lecture-74Captive Portal User-ID in Palo Alto Firewall_part1_part1
02:33 -
074 Lecture-74Captive Portal User-ID in Palo Alto Firewall_part1_part2
02:33 -
074 Lecture-74Captive Portal User-ID in Palo Alto Firewall_part2
05:07 -
074 Lecture-74Captive Portal User-ID in Palo Alto Firewall_part3
05:07 -
074 Lecture-74Captive Portal User-ID in Palo Alto Firewall_part4
05:07 -
074 Lecture-74Captive Portal User-ID in Palo Alto Firewall_part5
05:07 -
075 Lecture-75AD,DNS, Users and Groups Configuration_part1_part1
04:04 -
075 Lecture-75AD,DNS, Users and Groups Configuration_part1_part2
04:04 -
075 Lecture-75AD,DNS, Users and Groups Configuration_part2
08:08 -
076 Lecture-76Palo Alto Firewall Active Directory Integration_part1
06:06 -
076 Lecture-76Palo Alto Firewall Active Directory Integration_part2
06:06 -
076 Lecture-76Palo Alto Firewall Active Directory Integration_part3
06:06 -
076 Lecture-76Palo Alto Firewall Active Directory Integration_part4
06:06 -
076 Lecture-76Palo Alto Firewall Active Directory Integration_part5_part1
03:03 -
076 Lecture-76Palo Alto Firewall Active Directory Integration_part5_part2
03:03 -
076 Lecture-76Palo Alto Firewall Active Directory Integration_part6
06:06 -
076 Lecture-76Palo Alto Firewall Active Directory Integration_part7_part1
03:03 -
076 Lecture-76Palo Alto Firewall Active Directory Integration_part7_part2
03:03 -
077 Lecture-77DHCP(Dynamic Host Configuration Protocol) Theory_part1
03:57 -
077 Lecture-77DHCP(Dynamic Host Configuration Protocol) Theory_part2
03:57 -
077 Lecture-77DHCP(Dynamic Host Configuration Protocol) Theory_part3
03:57 -
077 Lecture-77DHCP(Dynamic Host Configuration Protocol) Theory_part4
03:57 -
078 Lecture-78DHCP(Dynamic Host Configuration Protocol) Server Lab_part1
04:46 -
078 Lecture-78DHCP(Dynamic Host Configuration Protocol) Server Lab_part2
04:46 -
078 Lecture-78DHCP(Dynamic Host Configuration Protocol) Server Lab_part3
04:46 -
078 Lecture-78DHCP(Dynamic Host Configuration Protocol) Server Lab_part4
04:46 -
078 Lecture-78DHCP(Dynamic Host Configuration Protocol) Server Lab_part5
04:46 -
078 Lecture-78DHCP(Dynamic Host Configuration Protocol) Server Lab_part6
04:46 -
079 Lecture-79DHCP(Dynamic Host Configuration Protocol) Relay Lab_part1
05:42 -
079 Lecture-79DHCP(Dynamic Host Configuration Protocol) Relay Lab_part2
05:42 -
079 Lecture-79DHCP(Dynamic Host Configuration Protocol) Relay Lab_part3
05:42 -
080 Lecture-80Configure Interface Mgmt (Management) Profile
08:55 -
081 Lecture-81Service Features Service Route Configuration_part1
04:19 -
081 Lecture-81Service Features Service Route Configuration_part2
04:18 -
082 Lecture-82Administrator Accounts Dynamic Roles Configuration_part1_part1
02:45 -
082 Lecture-82Administrator Accounts Dynamic Roles Configuration_part1_part2
02:45 -
082 Lecture-82Administrator Accounts Dynamic Roles Configuration_part2
05:30 -
082 Lecture-82Administrator Accounts Dynamic Roles Configuration_part3
05:30 -
083 Lecture-83Administrator Accounts Role Based Configuration_part1
05:11 -
083 Lecture-83Administrator Accounts Role Based Configuration_part2
05:11 -
083 Lecture-83Administrator Accounts Role Based Configuration_part3
05:11 -
084 Lecture-84Administrator Accounts Window Walk-through_part1
04:53 -
084 Lecture-84Administrator Accounts Window Walk-through_part2
04:53 -
085 Lecture-85Administrator Accounts Password Complexity_part1
06:32 -
085 Lecture-85Administrator Accounts Password Complexity_part2
06:32 -
085 Lecture-85Administrator Accounts Password Complexity_part3
06:31 -
085 Lecture-85Administrator Accounts Password Complexity_part4
06:31 -
086 Lecture-86Redundancy High Availability (HA) Theory_part1
04:08 -
086 Lecture-86Redundancy High Availability (HA) Theory_part2
04:08 -
086 Lecture-86Redundancy High Availability (HA) Theory_part3
04:08 -
086 Lecture-86Redundancy High Availability (HA) Theory_part4
04:08 -
086 Lecture-86Redundancy High Availability (HA) Theory_part5
04:08 -
086 Lecture-86Redundancy High Availability (HA) Theory_part6_part1
02:04 -
086 Lecture-86Redundancy High Availability (HA) Theory_part6_part2
02:03 -
086 Lecture-86Redundancy High Availability (HA) Theory_part7
04:08 -
086 Lecture-86Redundancy High Availability (HA) Theory_part8
04:07 -
087 Lecture-87High Availability (HA) Active-Passive Lab_part1
05:04 -
087 Lecture-87High Availability (HA) Active-Passive Lab_part2
05:04 -
087 Lecture-87High Availability (HA) Active-Passive Lab_part3
05:04 -
087 Lecture-87High Availability (HA) Active-Passive Lab_part4
05:04 -
087 Lecture-87High Availability (HA) Active-Passive Lab_part5_part1
02:32 -
087 Lecture-87High Availability (HA) Active-Passive Lab_part5_part2
02:32 -
087 Lecture-87High Availability (HA) Active-Passive Lab_part6
05:04 -
087 Lecture-87High Availability (HA) Active-Passive Lab_part7
05:04 -
087 Lecture-87High Availability (HA) Active-Passive Lab_part8_part1
02:32 -
087 Lecture-87High Availability (HA) Active-Passive Lab_part8_part2
02:32 -
087 Lecture-87High Availability (HA) Active-Passive Lab_part9_part1
02:32 -
087 Lecture-87High Availability (HA) Active-Passive Lab_part9_part2
02:32 -
088 Lecture-88Cryptography, Encryption and Hashing Concepts_part1
05:15 -
088 Lecture-88Cryptography, Encryption and Hashing Concepts_part2
05:15 -
088 Lecture-88Cryptography, Encryption and Hashing Concepts_part3
05:15 -
088 Lecture-88Cryptography, Encryption and Hashing Concepts_part4
05:15 -
088 Lecture-88Cryptography, Encryption and Hashing Concepts_part5
05:15 -
088 Lecture-88Cryptography, Encryption and Hashing Concepts_part6
05:15 -
088 Lecture-88Cryptography, Encryption and Hashing Concepts_part7
05:15 -
089 Lecture-89Internet Key Exchange, Version Phases Theory_part1
03:13 -
089 Lecture-89Internet Key Exchange, Version Phases Theory_part2
03:13 -
089 Lecture-89Internet Key Exchange, Version Phases Theory_part3
03:13 -
090 Lecture-90VPN, Types, Protocols,Classification etc Theory_part1
03:23 -
090 Lecture-90VPN, Types, Protocols,Classification etc Theory_part2
03:23 -
091 Lecture-91IPSec Protocols, Features,Modes,Encryption Theory_part1
02:58 -
091 Lecture-91IPSec Protocols, Features,Modes,Encryption Theory_part2
02:58 -
092 Lecture-92IPSec Site-to-Site Virtual Private Network VPN Lab_part1_part1
02:36 -
092 Lecture-92IPSec Site-to-Site Virtual Private Network VPN Lab_part1_part2
02:36 -
092 Lecture-92IPSec Site-to-Site Virtual Private Network VPN Lab_part2
05:13 -
092 Lecture-92IPSec Site-to-Site Virtual Private Network VPN Lab_part3
05:13 -
092 Lecture-92IPSec Site-to-Site Virtual Private Network VPN Lab_part4
05:13 -
092 Lecture-92IPSec Site-to-Site Virtual Private Network VPN Lab_part5
05:13 -
092 Lecture-92IPSec Site-to-Site Virtual Private Network VPN Lab_part6_part1
02:36 -
092 Lecture-92IPSec Site-to-Site Virtual Private Network VPN Lab_part6_part2
02:36 -
092 Lecture-92IPSec Site-to-Site Virtual Private Network VPN Lab_part7
05:13 -
093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part1_part1
03:05 -
093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part1_part2
03:04 -
093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part2_part1
03:05 -
093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part2_part2
03:04 -
093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part3_part1
03:05 -
093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part3_part2
03:04 -
093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part4
06:09 -
093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part5
06:09 -
093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part6
06:09 -
093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part7
06:09 -
093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part8
06:09 -
093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part9
06:09 -
093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part10
06:09 -
093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part11
06:09 -
093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part12
06:09 -
093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part13_part1
03:05 -
093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part13_part2
03:04 -
093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part14_part1
03:04 -
093 Lecture-93Remote-Access VPN GlobalProtect Theory and Lab_part14_part2
03:04 -
094 Lecture-94Log Types (Traffic,Threat, User-ID etc) in Monitor Tab_part1
04:58 -
094 Lecture-94Log Types (Traffic,Threat, User-ID etc) in Monitor Tab_part2_part1
02:29 -
094 Lecture-94Log Types (Traffic,Threat, User-ID etc) in Monitor Tab_part2_part2
02:29 -
094 Lecture-94Log Types (Traffic,Threat, User-ID etc) in Monitor Tab_part3_part1
02:29 -
094 Lecture-94Log Types (Traffic,Threat, User-ID etc) in Monitor Tab_part3_part2
02:29 -
094 Lecture-94Log Types (Traffic,Threat, User-ID etc) in Monitor Tab_part4
04:58 -
094 Lecture-94Log Types (Traffic,Threat, User-ID etc) in Monitor Tab_part5
04:58 -
094 Lecture-94Log Types (Traffic,Threat, User-ID etc) in Monitor Tab_part6
04:58 -
094 Lecture-94Log Types (Traffic,Threat, User-ID etc) in Monitor Tab_part7
04:58 -
095 Lecture-95Configure and Verify Syslog in Palo Alto Firewall_part1_part1
02:22 -
095 Lecture-95Configure and Verify Syslog in Palo Alto Firewall_part1_part2
02:22 -
095 Lecture-95Configure and Verify Syslog in Palo Alto Firewall_part2
04:45 -
095 Lecture-95Configure and Verify Syslog in Palo Alto Firewall_part3
04:45 -
095 Lecture-95Configure and Verify Syslog in Palo Alto Firewall_part4_part1
02:22 -
095 Lecture-95Configure and Verify Syslog in Palo Alto Firewall_part4_part2
02:22 -
095 Lecture-95Configure and Verify Syslog in Palo Alto Firewall_part5
04:45 -
096 Lecture-96Configure and Verify NetFlow in Palo Alto Firewall_part1
03:47 -
096 Lecture-96Configure and Verify NetFlow in Palo Alto Firewall_part2
03:46 -
096 Lecture-96Configure and Verify NetFlow in Palo Alto Firewall_part3
03:47 -
096 Lecture-96Configure and Verify NetFlow in Palo Alto Firewall_part4
03:46 -
097 Lecture-97Configure and Verify SNMP in Palo Alto Firewall_part1
04:06 -
097 Lecture-97Configure and Verify SNMP in Palo Alto Firewall_part2
04:06 -
097 Lecture-97Configure and Verify SNMP in Palo Alto Firewall_part3
04:06 -
097 Lecture-97Configure and Verify SNMP in Palo Alto Firewall_part4
04:06 -
098 Lecture-98Configure and Verify Packet Capture GUI and CLI_part1
05:05 -
098 Lecture-98Configure and Verify Packet Capture GUI and CLI_part2
05:05 -
098 Lecture-98Configure and Verify Packet Capture GUI and CLI_part3
05:05 -
098 Lecture-98Configure and Verify Packet Capture GUI and CLI_part4
05:05 -
098 Lecture-98Configure and Verify Packet Capture GUI and CLI_part5
05:05 -
098 Lecture-98Configure and Verify Packet Capture GUI and CLI_part6_part1
02:32 -
098 Lecture-98Configure and Verify Packet Capture GUI and CLI_part6_part2
02:32 -
098 Lecture-98Configure and Verify Packet Capture GUI and CLI_part7_part1
02:32 -
098 Lecture-98Configure and Verify Packet Capture GUI and CLI_part7_part2
02:32 -
099 Lecture-99App Scope (Summary,Change,Threat,Network Monitor)
04:39 -
100 Lecture-100ACC (Application Command Center ) Tab Walk-through_part1
05:45 -
100 Lecture-100ACC (Application Command Center ) Tab Walk-through_part2
05:45 -
100 Lecture-100ACC (Application Command Center ) Tab Walk-through_part3
05:45 -
101 Lecture-101Configure Backup and Restore in Palo Alto Firewall_part1_part1
02:51 -
101 Lecture-101Configure Backup and Restore in Palo Alto Firewall_part1_part2
02:51 -
101 Lecture-101Configure Backup and Restore in Palo Alto Firewall_part2
05:42 -
101 Lecture-101Configure Backup and Restore in Palo Alto Firewall_part3
05:42 -
101 Lecture-101Configure Backup and Restore in Palo Alto Firewall_part4
05:42 -
101 Lecture-101Configure Backup and Restore in Palo Alto Firewall_part5
05:42 -
101 Lecture-101Configure Backup and Restore in Palo Alto Firewall_part6
05:42 -
101 Lecture-101Configure Backup and Restore in Palo Alto Firewall_part7_part1
02:51 -
101 Lecture-101Configure Backup and Restore in Palo Alto Firewall_part7_part2
02:51 -
102 EVE-NG Installation, Configuration Images_part1
10:25 -
102 EVE-NG Installation, Configuration Images_part2
10:25 -
102 EVE-NG Installation, Configuration Images_part3
10:24