Course Outline

Introduction

  • Overview of Palo Alto Networks portfolio and architecture for government use
  • Firewall architecture for enhanced security in government networks

Getting Started

  • Configuring initial firewall settings to ensure secure deployment
  • Configuring management network settings for optimal performance and security
  • Activating a firewall to begin securing government networks
  • Managing licenses and software updates for continuous protection

Managing Firewall Configurations

  • Managing configurations to maintain compliance and operational efficiency
  • Viewing and monitoring firewall logs to ensure accountability and traceability

Managing Firewall Administrator Accounts

  • Managing firewall authentication and authorization for secure access control
  • Creating a local firewall administrator account for government personnel
  • Creating a non-local firewall administrator account for remote management
  • Creating a firewall administrator account for non-interactive login to support automated processes

Connecting the Firewall to Production Networks

  • Blocking threats by using network segmentation to enhance security for government operations
  • Using network interfaces and security zones to manage traffic flow effectively
  • Layer 3 interfaces and sub-interfaces for granular control over network segments
  • Using virtual wire interfaces to simplify network configurations
  • Tap interfaces for passive monitoring of network traffic
  • Using virtual routers to route traffic efficiently across different networks
  • Loopback interfaces for local management and testing purposes

Managing Security Policy Rules

  • Creating and managing security policy rules to enforce government security policies
  • Creating and managing NAT policy rules to control network address translation
  • Controlling application usage using app-ID to ensure compliance with government standards

Blocking Threats

  • Blocking threats using security and NAT policies to protect government data
  • Blocking packet- and protocol-based attacks to prevent unauthorized access
  • Blocking threats from known bad sources to mitigate risks
  • Blocking threats by identifying applications to ensure only approved software is used
  • Blocking threats by identifying users to enforce user-specific security policies
  • Blocking threats by identifying devices to control endpoint security
  • Blocking unknown threats using advanced threat detection techniques
  • Blocking threats in encrypted traffic to secure sensitive information
  • Preventing usage of stolen credentials to protect government systems
  • Blocking threats using security profiles for comprehensive protection
  • Blocking inappropriate web traffic with URL filtering to maintain a safe browsing environment
  • Using decryption to block threats in encrypted traffic and ensure visibility into all network traffic

Threat and Traffic Information

  • Locating valuable information using logs and reports for government audits and compliance
  • Forwarding threat and traffic information to external services for enhanced threat intelligence sharing

Security Best Practices

Summary and Next Steps

Requirements

  • Fundamental understanding of networking and security principles

Intended Audience

  • Security professionals for government
  • Cybersecurity analysts
  • Administrators
 35 Hours

Number of participants


Price per participant

Upcoming Courses

Related Categories