Palo Alto Networks
Course Overview
- PA EDU-210 (Essentials: Configuration and Management)
- PA EDU-220 (Panorama Managing Firewalls at Scale)
- PA EDU-330 (Firewall Troubleshooting)
- PA EDU-238 (Prisma SD-WAN)
- PA EDU-318 (Prisma Access SASE Security)
- PA EDU-380 (Cortex XSOAR: Automation and Orchestration)
- PA EDU-260 (Cortex XDR 2: Prevention, Analysis, and Response)
- PA EDU-262 (Cortex XDR: Investigation and Response)
Additional URLs
- Develop with Palo Alto Networks
- Palo Alto Networks Ansible Galaxy Role Documentation
- Unit 42
- Discover, Access, and Manage Apps
- Applipedia (App-ID Lookup)
- Threat Lookup (Login Required)
- URL Filtering Lookup
- Cloud Service Status
Course PA EDU-210
Here you will find all Reference Links for the EDU-210 Course (Based on the course material and my own references)
Modul 0 – Introductions
- Prepare Certification Exam, Online Training Courses and more
- PaloAlto Networks – You Tube Channel
- Education Services
- Palo Alto Networks Live – Certification
- Palo Alto Networks Certified Cybersecurity Entry-Level Technician (PCCET)
- Palo Alto Networks Certified Network Security Administrator (PCNSA)
- Palo Alto Networks Certified Network Security Engineer (PCNSE)
- Person VUE Exam Registration
Modul 1 – Portfolio and Architecture
- Packet Flow Sequence in PAN-OS
- Best Practices Implementing Zero Trust with Palo Alto Networks
- PA-Series Next-Generation Firewalls
- Hardware NGFWs
- VM-Series Virtual Next-Generation-Firewalls
- Virtual NGFWs
- Container NGFWs
- Cloud NGFWs
- AIOps for NGFW
- Panorama
- PAN-OS
- Virtual Systems PAN-OS 10.2
- End-of-Life Announcements
Modul 2 – Initial Firewall Settings
- PAN-OS and Panorama API Usage Guide 10.2
- Reset the Firewall to Factory Default Settings (Administration Guide 10.2)
- How to perform a factory reset on a Palo Alto Networks device
- Launch the Web Interface
- How to Configure the Management Interface IP
- Perform Initial Configuration
- Configure Bammers, Message of the Days, adn Logos
- Services Routes Overview
- Configure Services Routes
- Register the Firewall
- How to Register a Palo Alto Networks Device, Spare, or VM-Series Auth-Code
- Subsciptions You Can Use With The Firewall
- Licensing, Registration, and Activation
- PAN-OS Upgrade Guide
- Support PAN-OS Release Guidance (Login Required)
- Device > Dynamic Updates
- Best Practice for App and Threat Content Updates
- Day 1 Configuration: What Does It Do?
- IronSkillet Day One Configuration Template
Modul 3 – Managing Firewall Configurations
- Device > Setup > Operations
- Save and Export Firewall Configuration
- How to Save an Entire Configuration for Import into Another Palo Alto Networks Device
- How to Export The Device State Using XML API
- Manage and Monitor Administrative Tasks
- Revert Changes
- Commit, Validate, and Preview Firewall Configuration Changes
- Lock Configurations
- Log Types
- Log Actions
- View and Manage Logs
- Basics of Traffic Monitor Filtering
- Filter Logs
Modul 4 – Managing Firewall Administrator Accounts
- Plan Your Authentication Deployment
- Device > Server Profiles
- External Authentication Services
- Device > Setup > Management > Authentication Settings
- Administrative Role Types
- Role-Based Access Control
- Device > Local User Database > Users
- How to Configure Local Database Authentication
- Authentication Profile
- Administrative Authentication
- Configure an Authentication Profile and Sequence
- Configure a Certificate Profile
- Configure SSH Key-Based Administrator Authentication to the CLI
Modul 5 – Connecting The Firewall To Production Networks With Security Zones
- Network Segmentation Using Zones
- Segment Your Network Using Interfaces and Zones
- Zero Trust
- What is a Zero Trust Architecture
- Configure Interfaces and Zones
- Building Blocks of Security Zones
- Tap Interfaces
- Virtual Wire Interfaces
- Layer 2 Interfaces
- Layer 3 Interfaces
- Configure an Aggregate Interface Group
- Configure Bonjour Reflector for Network Segmentation
- Virtual Routers
- Policy-Based Forwarding
- Dynamic Protocols on Palo Alto Networks Devices that Do Not Require Security Policies to Operate
- OSPF
- How to Configure OSPF
- BGP
- Tech Note: How to Configure BGP
- IP Multicast
- How to Facilitate Multicast Routing when only One Palo Alto Networks Firewall Between the Sender and Recipients
Modul 6 – Creating And Managing Security Policy Rules
- Resource List: Security Policy Configuring and Troubleshooting
- Packet Flow Sequence in PAN-OS
- Palo Alto Networks Firewall Session Overview
- Session States and Types
- Components of a Security Policy Rule
- Move or Clone a Policy Rule
- What are Universal, Intrazone and Interzone Rules?
- Create a Security Policy Rule
- Security Policy Rule Optimization
- Why use Security Policy Optimizer and what are the benefits?
- Monitor Policy Rule Usage
- Resolve Application Dependencies
- Objects > Services
- Sorting and Filtering Security Policy Rules
- Create an Address Object
- Objects > Address Groups
- Use Auto-Tagging to Automate Security Actions
- Create and Apply Tags
- View Rulebase as Groups
- Device > Troubleshooting
- Global Find
- Global Find – Knowledge Base
- Traffic Log Fields
Modul 7 – Creating And Managing NAT Policy Rules
- Getting Started: Network Address Translation (NAT)
- How to Configure U-Turn NAT
- Tips & Tricks: NAT64
- NAT Policy Overview
- Source and Destination NAT Example
- Source NAT
- Getting Started: Network Address Translation (NAT)
- Dynamic IP and Port NAT Oversubscription
- Destination NAT
- Configure Destination NAT Using Dynamic IP Addresses
- Destination NAT with Port Translation Example
- Enable Bi-Directional Address Translation for Your Public-Facing Servers (Static Source NAT)
- Source NAT Translation Types and Typical Use Cases
- Tips & Tricks: NAT64
- How to Configure NAT64 on Palo Alto Firewalls – IPv6 to IPv4 Translation
- How to setup Destination-NAT for IPv6
- How to Check the Oversubscription on a NAT Rule
- DNS rewrite on a Palo Alto Networks firewall
Modul 8 – Controlling Application Usage With App-ID
- Resource list: App-ID Configuration and Troubleshooting
- Application Research Center
- Pro Tips – Unknown Applications
- Manage Custom or Unknown Applications
- How to Request a new App-ID
- Decrypt Traffic for Full Visibility and Threat Inspection
- Security Policy Rule Optimization
- Migrate Port-Based to App-ID Based Security Policy Rules
- Expedition Documentation
- Best Practices for Migrating to Application-Based Policy
- Applications and Threats Content Updates
- Workflow to Best Incorporate New and Modified App-IDs
- See the New and Modified App-IDs in a Content Release
- See How New and Modified App-IDs Impact Your Security Policy
Modul 9 – Blocking Known Threats Using Security Profiles
- Resource List: File Blocking Profile Configuring and Troubleshooting
- Security Profiles
- Best Practices for Securing Your Network from Layer 4 and Layer 7 Evasions
- Threat Prevention
- Threat Vault
- Security Profiles
- Threat Log Fields
- How to create a vulnerability exception
- Vulnerability Exception Based Upon Source and Destination IP Address to change the default behavior
- How to Use Anti-Spyware, Vulnerability and Antivirus Exceptions to Block or Allow Threats
- WildFire Inline ML
- How to Configure DNS Sinkhole
- How to Verify DNS Sinkhole
- Configure DNS Sinkholing for a List of Custom Domains
- Configure DNS Sinkholing
- Tips from the Field: File Blocking Profile
- Set Up File Blocking
- Predefined Data Filtering Patterns
- Review Data Filtering Logs
- Create Best Practice Security Profiles for the Internet Gateway
- DoS and Zone Protection Best Practices
- Deploy DoS and Zone Protection Using Best Practices
- Flood Protection
- Configure Reconnaissance Protection
- Configure Packet Based Attack Protection
- Troubleshooting DoS Attacks
- Understanding DoS Protection
- Zone Protection Recommendations
- Understanding DoS Logs and Counters
- Best Practices for Ransomware Prevention
- Best practices to prevent DarkSide ransomware
- Creating Custom Threat signatures from Snort signatures
Modul 10 – Blocking Inappropriate Web Traffic With Advanced URL Filtering
- URL Filtering
- How Advanced URL Filtering Works
- Plan Your URL Filtering Deployment
- URL Filtering Best Practices
- Where Can I Find a Complete List of PAN-DB URL Filtering Categories?
- URL Filtering: Assigning Multiple Categories to URLs
- Create a Custom URL Category
- Allow Password Access to Certain Sites
- Safe Search Enforcement
- Safe Search Enforcement in K-12
- Create Custom HTTP Header Insertion Entries
- Configure Inline Categorization
- How does the URL Filtering Inline ML feature work?
- Request to Change the Category for a URL
- How to Submit change for a Miscategorized URL in PAN-DB
- Test A Site
- URL Filtering Test Pages
- How to test URL Filtering Inline ML detection
- Examples of using wildcards in URL filtering profiles
- URL Filtering Implementation and Troubleshooting
Modul 11 – Blocking Unknown Threats With Wildfire
- Resource List: Wildfire Configuration and Troubleshooting
- Get Started with WildFire
- About WildFire
- Enable Free WildFire Forwarding
- WildFire Deployments
- Forward Decrypted SSL Traffic for WildFire Analysis
- WildFire Inline ML
- WildFire Best Practices
- How to Test WildFire with a Fake Malicious File
- How to verify the status and troubleshoot the WildFire Real Time Signature Updates feature
- Advanced WildFire
- Wildfire Configuration, Testing, and Monitoring
- Real-time retrieval of WildFire signatures, WildFire Inline ML and Advanced Wildfire as an ICAP alternative!
Modul 12 – Controlling Access To Network Resources With User-ID
- Getting Started: User-ID
- Resource List: User-ID Configuring and Troubleshooting
- User Identification
- Configure User Mapping Using the PAN-OS Integrated User-ID Agent
- Configure the Windows User-ID Agent for User Mapping
- GlobalProtect Administrator’s Guide
- Configure User-ID to Monitor Syslog Senders for User Mapping
- User-ID Best Practices
- Enable User-ID
- Map Users to Groups
- Server Monitoring
- Group Mapping
- User-ID Best Practices for Group Mapping
- Building Blocks in a Security Policy Rule
- Use Dynamic User Groups in Policy
- How to configure Authentication policies when Captive Portal with SAML authentication in Palo Alto Networks firewall
- Tips & Tricks: Considerations for TS Agent and User-ID Agent in a Mixed Environment
- How to Collect the User-IP Mappings from a Syslog Sender Using an User-ID Agent
- How to troubleshoot connection failure to User-ID agent
- Useful CLI Commands for Troubleshooting User-ID Agent
- Best Practices for Securing User-ID Deployments
Modul 13 – Using Decryption To Block Threats In Encrypted Traffic
- Resource List: SSL Certificates Configuring and Troubleshooting
- Resource List: SSL Certificates Configuring and Troubleshooting
- Decryption Overview (Knowledge Base)
- Decryption Overview (PAN-OS Administrator’s Guide)
- Keys and Certificates for Decryption Policies
- Difference Between SSL Forward-Proxy and Inbound Inspection Decryption Mode
- Configure SSL Forward Proxy
- SSL Inbound Inspection
- SSH Proxy
- Develop a PKI Rollout Plan
- Manage Firewall and Panorama Certificates
- Certificate Deployment
- Create a Self-Signed Root CA Certificate
- Import a Certificate and Private Key
- Obtain a Certificate from an External CA
- Generate a Certificate
- Revoke a Certificate
- Define Traffic to Decrypt
- Create a Decryption Profile
- Decryption Exclusions
- Create a Policy-Based Decryption Exclusion
- Decryption Troubleshooting Workflow Examples
- Troubleshoot and Monitor Decryption
- Configure Decryption Logging
- Decryption Best Practices
- Decryption Mirroring
- Objects > Packet Broker Profile
- Device > Setup > HSM
Modul 14 – Locating Valuable Information Using Logs And Reports
- Resource List: Firewall Logging and Reporting
- Dashboard Widgets
- Use the Application Command Center
- ACC Tabs
- Tips & Tricks: How to Use the Application Command Center (ACC)
- ACC Widgets
- Traffic Log Fields
- Threat Log Fields
- Interpret Correlated Events
- Use the App Scope Reports
- App Scope Threat Monitor Report
- Report Types
- View and Manage Reports/a>
- Generate Custom Reports
- Getting Started: Custom Reports
- How to Receive Custom Reports via Email
- Custom Reports (PAN-OS® and Panorama™API Usage Guide)
- Device Telemetry Overview
- Device > Server Profiles
- Objects > Log Forwarding
Appendix A – Securing Endpoints With Globalprotect
- Resource List: GlobalProtect Configuring and Troubleshooting
- About GlobalProtect Licenses
- GlobalProtect Portal Overview
- GlobalProtect Gateways Overview
- GlobalProtect Architecture
- Useful GlobalProtect gateway CLI commands
- GlobalProtect Administrator’s Guide
- Cookie Authentication on the Portal or Gateway
- Basic-GlobalProtect-configuration-with-Pre-Logon-then-On-Demand
- How to Configure GlobalProtect
Appendix B – Providing Firewall Redundancy With High Availability
- Resource List: High Availability Configuring and Troubleshooting
- HA Concepts
- Set Up Active/Passive HA
- Set Up Active/Active HA
- CLI Cheat Sheet: HA
Appendix C – Connecting Remote Sites Using VPNs
Course PA EDU-220
Here you will find all Reference Links for the EDU-220 Course (Based on the course material and my own references)
Modul 0 – Introductions
- Prepare Certification Exam, Online Training Courses and more
- PaloAlto Networks – You Tube Channel
- Education Services
- Palo Alto Networks Live – Certification
- Palo Alto Networks Certified Cybersecurity Entry-Level Technician (PCCET)
- Palo Alto Networks Certified Network Security Administrator (PCNSA)
- Palo Alto Networks Certified Network Security Engineer (PCNSE)
- Person VUE Exam Registration
Modul 1 – Initial Configuration
- About Panorama
- Plan Your Panorama Deployment
- Panorama Configuration Articles
- Panorama Models
- Perform Initial Configuration
- Panorama Web Interface
- Register Panorama and Install Licenses
- Manage Panorama Software Upda
- Manage Software and Content Updates
- Schedule Dynamic Content Updates
- Panorama Plugins
- How to disable ztp on a ztp firewall
- Panorama > Setup > Interfaces
- Panorama Commit Operations
- Preview, Validate, or Commit Configuration Changes
- Schedule a Configuration Push to Managed Firewalls
- Panorama Commit Operations
- Use the Panorama Task Manager
- Manage Panorama and Firewall Configuration Backups
Modul 2 – Adding Firewalls
- Add a Firewall as a Managed Device
- How to remove a Firewall from Panorama
- Upgrade Firewalls Using Panorama
Modul 3 – Templates
- Templates and Template Stacks
- Manage Templates and Template Stacks
- Override a Template Value on the Firewall
- Configure a Template or Template Stack Variable
- Import and Overwrite Existing Template Stack Variables
Modul 4 – Device Groups
- Device Groups
- Device Group Hierarchy
- Manage Precedence of Inherited Objects
- Add a Device Group
- Device Group Objects
- Create Objects for Use in Shared or Device Gro
- Override or Revert an Object
- Manage Precedence of Inherited Objects
- Move or Clone a Policy Rule or Object to a Different Device Group
- Device Group Policies
- Defining Policies on Panorama
- Work with Policy Rules on Panorama (REST API)
- Track Rules Within a Rulebase
- Monitor Policy Rule Usage
- Monitor Policy Rule Usage
- Enforce Policy Rule Description, Tag, and Audit Comment
- Audit Comment Archive
Modul 5 – Log Collection And Forwrding
- Centralized Logging and Reporting
- Panorama Sizing and Design Guide
- How to Design and Size Panorama Log Collector Environments
- How to view the pattern of incoming log rate on Panorama and compare it to platform capacity
- Start Sending Logs to Cortex Data Lake (Individually Managed)
- Cortex Data Lake Estimator
- Select Log Forwarding Destinations
- Objects > Log Forwarding
- Select Log Forwarding Destinations
- Configure Log Forwarding from Panorama to External Destinations
- Panorama System and Configuration Logs
Modul 6 – Using Panorama Logs
Modul 7 – Administrative Accounts
- Configure Local or External Authentication for Panorama Administrators
- Configure a Panorama Administrator Account
- Configure RADIUS Authentication for Panorama Administrators
- Configure TACACS+ Authentication for Panorama Administrators
- Configure SAML Authentication for Panorama Administrators
- Configure an Admin Role Profile
- Configure an Access Domain
Modul 8 – Aggregated Monitoring And Reporting
- Log and Report Storage
- Configure Storage Quotas and Expiration Periods for Logs and Reports
- Panorama System and Configuration Logs
- Monitor Panorama and Log Collector Statistics Using SNMP
Modul 9 – Troubleshooting
- Resource List: High Availability Configuring and Troubleshooting
- Resource List: Panorama Configuring and Troubleshooting/a>
- How To Troubleshoot The Log Forwarding Failure From Firewall To Cortex Data Lake (CDL)
- Ports Used for Panorama
- Monitor Device Health
- Troubleshoot Automatically Reverted Firewall Configurations
- How To Packet Capture (tcpdump) On Management Interface
Appendix A
Course PA EDU-330
Here you will find all Reference Links for the EDU-330 Course (Based on the course material and my own references)
Modul 0 – Introductions
- Prepare Certification Exam, Online Training Courses and more
- PaloAlto Networks – You Tube Channel
- Education Services
- Palo Alto Networks Live – Certification
- Palo Alto Networks Certified Cybersecurity Entry-Level Technician (PCCET)
- Palo Alto Networks Certified Network Security Administrator (PCNSA)
- Palo Alto Networks Certified Network Security Engineer (PCNSE)
- Person VUE Exam Registration
Modul 1 – Tools And Resources
- Resource List: VM-Series Configuration and Troubleshooting
- Resource List: Tips & Tricks
- Troubleshooting VMware NSX/ESXi Deployment
- Manuals, Release Notes, Best Practice Guides and More
- Palo Alto Networks Knowledge Base
- Welcome to Palo Alto Networks’ LIVEcommunity
- Customer Support Portal
- Fuel Palo Alto Networks User Group
- The Google Chrome Extension
Modul 2 – Flow Logic
Modul 3 – Packet Captures
- Disabling Session Offload to Record Traffic During Packet Capture
- Packet Capture Contains Traffic not Defined in Filter
- Packet Capture Filter not Capturing Traffic Defined in the Match Filter
- How to Get an Application PCAP
- Getting Started: Packet Capture
- How To Packet Capture (tcpdump) On Management Interface
- Tcpdump Packet Capture Truncated
- How to Capture Traffic (PCAP) Hitting a Specific Rule
- How to do the custom packet capture for vulnerability signatures analysis
- How to Enable Threat Packet Capture for a Specific Anti-Spyware Signature?
- What is The Limitation of the Packet Capture File Size on PAN-OS?
- Tips & Tricks: Enabling Packet Captures to Troubleshoot Daemons
- How to Configure Extended Packet Capture
- Identifying and Resolving High Dataplane CPU caused by packet-diag logging
- How to Create a Packet Filter for IPv6 Addresses
Modul 4 – Packet Diagnostics
- How to Aggregate Flow Basic or Other Dataplane packet-diag log to a Single File for Analysis
- Understanding TCP Reassembly drops
- Does IDMGR Dump ID Number Correlate with Flow Basic Index Number?
Modul 5 – Host Inbound Traffic
- How to troubleshoot a connection failure between the firewall and CDL.
- Resource List: IPSec Configuring and Troubleshooting
- Resource List: BGP configuration and Troubleshooting
- Troubleshooting RADIUS Authentication
- How to troubleshoot OSPF adjacency stuck in INIT or EXSTART or EXCHANGE or LOADING States
- How To Troubleshoot Connection Failure To LDAP Servers
- How to troubleshoot and verify log forwarding issues for LPC on PA-7000 series firewall
- How To Troubleshoot Connection Failures To Syslog Servers
- How to Verify and Troubleshoot Netflow
- Resource List: Performance and Stability
- IKEv1 VPN error logs – Troubleshooting
- How to Troubleshoot Connectivity Issues on Management Interface?
- How to enable debug on a single VPN Peer?
- How to Troubleshoot IPSec VPN connectivity issues
- How to Decrypt IKE and ESP Packets on a Palo Alto Networks Device
- How to Decrypt IKEv2 Packets
- Resource List: Firewall management
- updates.paloaltonetworks.com connectivity
Modul 6 – Transit Traffic
- Resource list: App-ID Configuration and Troubleshooting
- Resource List: Wildfire Configuration and Troubleshooting
- URL filtering implementation and troubleshooting
- Resource List: Security Policy Configuring and Troubleshooting
- Resource List: File Blocking Profile Configuring and Troubleshooting
- How to Troubleshoot Using Counters via the CLI
- What is the significance of Global Counters?
- How to verify the status and troubleshoot the WildFire Real Time Signature Updates feature
- How Do I Disable WildFire Forwarding of Blocked Files?
- How to troubleshoot spoofed ip on Palo Alto Networks firewall?
- DotW: Issues with Asymmetric Routing
- How to Implement Resource Protection using a DOS Profile
- How to check global counters for a specific source and destination IP address
- Basics of Traffic Monitor Filtering
- Troubleshooting DoS Attacks
Modul 7 – System Services Daemons
- How To Troubleshoot High Management Plane CPU Usage
- How To Troubleshoot High Management Plane Memory Usage
- Resource List: High Availability Configuring and Troubleshooting
- How to Troubleshoot High Dataplane CPU
- How to Troubleshoot High Packet Buffer or Packet Descriptors Usage
- Identifying and Resolving High Dataplane CPU caused by packet-diag logging
- High on-chip descriptor and packet buffer usage due to policy deny resulting in traffic latency and drops
- How to Interpret: show running resource-monitor
- Tips & Tricks: Reducing Management Plane Load
- Troubleshooting firewall connectivity issues with Logging Service
- How to interpret output of “debug dataplane pow performance” during troubleshooting high DP CPU
- High Dataplane CPU Caused From “too small” or “too large” Packets For Content Inspection
- How to Identify and Troubleshoot a Process that Exited or Restarted in PAN-OS
- Tips & Tricks: Enabling Packet Captures to Troubleshoot Daemons
- High Disk Space Usage on / root partition and How To Clear
- How to run cleanup script if root disk-space exceed 90%
- How to Determine How Much Disk Space is Allocated to Logs
- High Disk Space Usage on /opt/pancfg partition and How To Clear
- How to identify the packet buffer misconfiguration
- Management CPU is 100% because of ‘%wa’
- Commonly Used Processes/Daemons
Modul 8 – Certificate Management and SSL Decryption
- Resource List: SSL Certificates Configuring and Troubleshooting
- Troubleshooting SSL Decryption using Dynamic Address Groups
- Why traffic is been dropped as “Client and Decryption profile mismatched”
- How to Temporarily Disable SSL Decryption
Modul 9 – User ID
- Resource List: User-ID Configuring and Troubleshooting
- How to Troubleshoot Captive Portal
- Troubleshooting Captive Portal Redirect Page Issues
- How to Troubleshoot VoIP Issues with Palo Alto Networks Firewall
- How to troubleshoot connection failure to User-ID agent
- Troubleshooting User-ID cache timeout
- Workflow and Troubleshooting checklist for policy enforcement based on user groups
Modul 10 – Global Protect
- Resource List: GlobalProtect Configuring and Troubleshooting
- Tips & Tricks: GlobalProtect IPv6 Troubleshooting Part 2 LSVPN
- How to Troubleshoot HIP Data
- How to Export Logs from GlobalProtect App on iOS or Android
- How to Open a Support Case and Verify Entitlement
Modul 11 – Escalation and RMA
- When to request a Support Event
- How to Open a Case on IPSec (VPN) Issues
- How to Request a new App-ID
- Best Practice Guide for Data Collection while opening a Palo Alto Networks support case for Firewall products
Appendix A – CLI Primer
Course PA EDU-238
Here you will find all Reference Links for the EDU-238 Course (Based on the course material and my own references)
Modul 0 – Introductions
- Prepare Certification Exam, Online Training Courses and more
- PaloAlto Networks – You Tube Channel
- Education Services
- Palo Alto Networks Live – Certification
- Palo Alto Networks Certified Cybersecurity Entry-Level Technician (PCCET)
- Palo Alto Networks Certified Network Security Administrator (PCNSA)
- Palo Alto Networks Certified Network Security Engineer (PCNSE)
- Person VUE Exam Registration
Course PA EDU-318
Here you will find all Reference Links for the EDU-318 Course (Based on the course material and my own references)
Modul 0 – Introductions
- Prepare Certification Exam, Online Training Courses and more
- PaloAlto Networks – You Tube Channel
- Education Services
- Palo Alto Networks Live – Certification
- Palo Alto Networks Certified Cybersecurity Entry-Level Technician (PCCET)
- Palo Alto Networks Certified Network Security Administrator (PCNSA)
- Palo Alto Networks Certified Network Security Engineer (PCNSE)
- Person VUE Exam Registration
Modul 1 – Prisma Access Overview
- Prisma Access Administrator’s Guide (Panorama Managed)
- Prisma Access (Cloud Management)
- Common Services: Subscription & Tenant Management
- Prisma Access Useful Resources
- Prisma Access
- Release Updates in Prisma SASE Platform
- Prisma Access Licensing
- Prisma Access Locations
- Discover, Access, and Manage Apps
- Live Community – Prisma Access
Modul 2 – Planning And Design
- Prisma Access Service Infrastructure
- Configure the Service Infrastructure
- Plan the Service Connections
- Create a Service Connection to Enable Access between Mobile Users and Remote Networks
Modul 3 – Routing SD-WAN Design
- Routing for Service Connection Traffic
- Use Traffic Steering to Forward Internet-Bound Traffic to Service Connections
- Integrate Third-Party SD-WANs with Prisma Access
Modul 4 – Activate and Configure
- Prisma Access and Panorama Version Compatibility
- Use Predefined IPSec Templates to Onboard Service and Remote Network Connections
- Service Connections
- Create a High-Bandwidth Network Using Multiple Service Connections
Modul 5 – Security Processing Nodes
Modul 6 – Panorama Operations for Prisma Access
Modul 7 – Remote Networks
- How to Calculate Remote Network Bandwidth
- Prisma Access for Networks Aggregate Bandwidth Licensing
- Prisma Access Licensing Guide
- Prisma Access Licensing
- DNS and Prisma Access
- DNS Resolution for Mobile Users—GlobalProtect and Remote Network Deployments
- Quality of Service in Prisma Access
- Remote Network Locations with Overlapping Subnets
Modul 8 – Mobile Users
Modul 9 – Cloud SWG
- Cloud Secure Web Gateway
- A Comparison: Cloud Secure Web Gateway (SWG) in Prisma Access vs. web proxy appliances
- Explicit Proxy — How It Works
- How Explicit Proxy Identifies Users
- Explicit Proxy on Prisma Access
Modul 10 – Tune Optimize Troubleshoot
- SASE Status
- Discover, Access, and Manage Apps
- Learn About the Cloud Identity Engine
- Retrieve the IP Addresses for Prisma Access
Modul 11 – Manage Multiple Tenants
- Plan Your Multitenant Deployment
- How to configure role based management access for more than 1 sub-tenants from panorama for Prisma access multi-tenant environment
Modul 12 – Prisma Access Insights
Modul 13 – Prisma Access Autonomous Digital Experience Management (ADEM)
Course PA EDU-380
Here you will find all Reference Links for the EDU-380 Course (Based on the course material and my own references)
Additional Links
Windows Forensic Pack
- Windows Forensic
- Powershell Remoting – Configuration
- Shift Management
- Online Training XSOAR 6.x (Beacon)
Modul 0 – Introductions
- Prepare Certification Exam, Online Training Courses and more
- PaloAlto Networks – You Tube Channel
- Education Services
- Palo Alto Networks Live – Certification
- Palo Alto Networks Certified Cybersecurity Entry-Level Technician (PCCET)
- Palo Alto Networks Certified Network Security Administrator (PCNSA)
- Palo Alto Networks Certified Network Security Engineer (PCNSE)
- Person VUE Exam Registration
Modul 10 – Threat Intel Management
Course PA EDU-260
Here you will find all Reference Links for the EDU-260 Course (Based on the course material and my own references)
Modul 0 – Introductions
- Prepare Certification Exam, Online Training Courses and more
- PaloAlto Networks – You Tube Channel
- Education Services
- Palo Alto Networks Live – Certification
- Palo Alto Networks Certified Cybersecurity Entry-Level Technician (PCCET)
- Palo Alto Networks Certified Network Security Administrator (PCNSA)
- Palo Alto Networks Certified Network Security Engineer (PCNSE)
- Person VUE Exam Registration
Modul 1 – Cortex XDR Overview
- Cortex® XDR™ versus Traditional Endpoint Protection
- Cortex XDR API Overview
- XQL Generator
- XDR for Dummies
- Features by License Type
Modul 2 – Cortex XDR Main Components
Course PA EDU-262
Here you will find all Reference Links for the EDU-262 Course (Based on the course material and my own references)
Modul 0 – Introductions
- Prepare Certification Exam, Online Training Courses and more
- PaloAlto Networks – You Tube Channel
- Education Services
- Palo Alto Networks Live – Certification
- Palo Alto Networks Certified Cybersecurity Entry-Level Technician (PCCET)
- Palo Alto Networks Certified Network Security Administrator (PCNSA)
- Palo Alto Networks Certified Network Security Engineer (PCNSE)
- Person VUE Exam Registration