Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
- Overview of Palo Alto Networks portfolio and architecture for government use
- Firewall architecture for enhanced security in government networks
Getting Started
- Configuring initial firewall settings to ensure secure deployment
- Configuring management network settings for optimal performance and security
- Activating a firewall to begin securing government networks
- Managing licenses and software updates for continuous protection
Managing Firewall Configurations
- Managing configurations to maintain compliance and operational efficiency
- Viewing and monitoring firewall logs to ensure accountability and traceability
Managing Firewall Administrator Accounts
- Managing firewall authentication and authorization for secure access control
- Creating a local firewall administrator account for government personnel
- Creating a non-local firewall administrator account for remote management
- Creating a firewall administrator account for non-interactive login to support automated processes
Connecting the Firewall to Production Networks
- Blocking threats by using network segmentation to enhance security for government operations
- Using network interfaces and security zones to manage traffic flow effectively
- Layer 3 interfaces and sub-interfaces for granular control over network segments
- Using virtual wire interfaces to simplify network configurations
- Tap interfaces for passive monitoring of network traffic
- Using virtual routers to route traffic efficiently across different networks
- Loopback interfaces for local management and testing purposes
Managing Security Policy Rules
- Creating and managing security policy rules to enforce government security policies
- Creating and managing NAT policy rules to control network address translation
- Controlling application usage using app-ID to ensure compliance with government standards
Blocking Threats
- Blocking threats using security and NAT policies to protect government data
- Blocking packet- and protocol-based attacks to prevent unauthorized access
- Blocking threats from known bad sources to mitigate risks
- Blocking threats by identifying applications to ensure only approved software is used
- Blocking threats by identifying users to enforce user-specific security policies
- Blocking threats by identifying devices to control endpoint security
- Blocking unknown threats using advanced threat detection techniques
- Blocking threats in encrypted traffic to secure sensitive information
- Preventing usage of stolen credentials to protect government systems
- Blocking threats using security profiles for comprehensive protection
- Blocking inappropriate web traffic with URL filtering to maintain a safe browsing environment
- Using decryption to block threats in encrypted traffic and ensure visibility into all network traffic
Threat and Traffic Information
- Locating valuable information using logs and reports for government audits and compliance
- Forwarding threat and traffic information to external services for enhanced threat intelligence sharing
Security Best Practices
Summary and Next Steps
Requirements
- Fundamental understanding of networking and security principles
Intended Audience
- Security professionals for government
- Cybersecurity analysts
- Administrators
35 Hours