Description
Palo Alto Networks Certified Next-Generation Firewall Engineer
This certification path provides comprehensive coverage of Palo Alto Networks Next-Generation Firewalls, focusing on network configuration, device settings, integration, and automation.
- Our trainers bring over 20 years of hands-on experience working with major corporations across diverse domains.
- Our labs simulate a real corporate environment, where trainers challenge you with practical, real-world problems.
- Our training materials are carefully crafted, incorporating real-life examples to enhance learning and applicability.
- IT and Network Security Professionals:
Individuals working in cybersecurity or IT who want to enhance their skills in network security and firewall management - System Administrators:
Those responsible for managing IT infrastructures who need expertise in configuring and optimizing Palo Alto Networks firewalls. - Aspiring Cybersecurity Experts:
Students, entry-level professionals, or anyone planning a career in cybersecurity and seeking to add a top-tier certification to their profile. - Managed Service Providers (MSPs):
Professionals in organizations that provide network security services and want to master the tools to better serve their clients. - Companies Using or Considering Palo Alto Networks Solutions:
Employees within organizations that rely on or plan to implement Palo Alto Networks products and need specialized training for their teams. - Compliance and Risk Management Teams:
Those involved in ensuring that network security aligns with regulatory and compliance requirements. - All Veterans:
Looking for new career paths or refine their skills
We will offer comprehensive placement services to all individuals who successfully complete the training and earn their certification.
These courses provide valuable insights into firewall deployment and the key technologies that are built into PAN‑OS natively.
- Connecting to a Firewall – 20 m
- Connecting to Firewall – Assessment
- Managing Firewall Configurations 15 m
- Managing Firewall Configurations – Assessment
- Local Firewall Admin Accounts 15 m
- Local Firewall Admin Accounts – Assessment
- Non-Local Firewall Admin Accounts – 15 m
- Non-Local Firewall Admin Accounts – Assessment
- Security Zones and Network Interfaces – 30 m
- Security Zones and Network Interfaces – Assessment
- Security Policy Rules – 20 m
- Security Policy Rules – Assessment
- Threat and Traffic Logs – 15 m
- Threat and Traffic Logs – Assessment
- Log Forwarding – 10 m
- Log Forwarding – Assessment
- Purpose and Value of Decryption – 35 m
- Purpose and Value of Decryption – Assessment
- Decrypting Traffic and Network Design – 20 m
- Decrypting Traffic and Network Design – Assessment
- Decryption Configuration – 20 m
- Decryption Configuration – Assessment
- Certificates and Best Practices –15 m
- Certificates and Best Practices – Assessment
- Strata Logging Service Features – 45 m
- Strata Logging Service Features – Assessment
- Site-to-Site VPNs – 20 m
- Site-to-Site VPNs -Assessments
- Firewall High Availability – 30 m
- Firewall High Availability – Assessment
- Quantum Ready Virtual Private Networks – 40 m
- Quantum Ready Virtual Private Networks: Assessment
- Global Protect Configuration –30 m
- Global Protect Configuration – Assessment
- Global Protect App Settings and Monitoring – 40 m
- GlobalProtect App Settings and Monitoring – Assessment
These courses provide valuable insights into User-ID and Cloud Identity Engine. They demonstrate how to link user identities to network activities and enable the application of security policies based on user roles across both on-premises and cloud environments.
- Identifying Users Using User-ID – 15 m
- Identifying Users Using User-ID – Assessment
- User-ID Components and Operation – 15 m
- User-ID Components and Operation – Assessment
- Implementing User-ID in Security Policy – 30 m
- Implementing User-ID in Security Policy – Assessment
- User-ID Data Redistribution and Dynamic User Groups – 15 m
- User-ID Data Redistribution and Dynamic User Groups – Assessment
- Configure Multi-Factor Authentication –15 m
- Configure Multi-Factor Authentication – Assessment
- Credential Phishing and User-ID – 10 m
- Credential Phishing and User-ID – Assessment
- Configure Phishing Protection 10 m
- Configure Phishing Protection – Assessment
- Identity Concepts 30 m
- Identity Concepts – Assessment
- Cloud Identity Engine Setup and Connection 45 m
- Cloud Identity Engine Setup and Connection – Assessment
- User Authentication Configuration 40 m
- User Authentication Configuration – Assessment
- Advanced Identity Concepts 45 m
- Advanced Identity Concepts – Assessment
- Identity Data Redistribution 25 m
- Identity Data Redistribution – Assessment
- User Context 25 m
- User Context – Assessment
- System for Cross-Domain Identity Management 15 m
- System for Cross-Domain Identity Management – Assessment
These courses provide valuable insights into the VM-Series virtual next-generation firewall features that protect applications and data deployed across a wide range of public cloud and virtualized environments.
- Overview of Containerized Technology and Kubernetes – 45 m
- Overview of Containerized Technology and Kubernetes – Assessment
- CN-Series Firewalls Overview – 30 m
- CN-Series Firewalls Overview – Assessment
- CN-Series Architecture – 30 m
- CN-Series Architecture – Assessment
- CN-Series Firewall Deployment – 40 m
- CN-Series Firewall Deployment – Assessment
- Cloud Network Security – 20 m
- Cloud Network Security – Assessment
- VM-Series Requirements and Licensing – 30 m
- VM-Series Requirements and Licensing – Assessment
- Traffic Flow Designs and Features for VM-Series – 30 m
- Traffic Flow Designs and Features for VM-Series – Assessment
- VM-Series Firewall on AWS – 40 m
- VM-Series Firewall on AWS – Assessment
- VM-Series Deployment on AWS and Network Integration – 25 m
- VM-Series Deployment on AWS and Network Integration – Assessment
- AWS Gateway Load Balancer Integration – 25 m
- AWS Gateway Load Balancer Integration – Assessment
- VM-Series Firewall on Azure – 20 m
- Our trainers bring over 20 years of hands-on experience working with major corporations across diverse domains.
- Our labs simulate a real corporate environment, where trainers challenge you with practical, real-world problems.
- Our training materials are carefully crafted, incorporating real-life examples to enhance learning and applicability.
- IT and Network Security Professionals:
Individuals working in cybersecurity or IT who want to enhance their skills in network security and firewall management - System Administrators:
Those responsible for managing IT infrastructures who need expertise in configuring and optimizing Palo Alto Networks firewalls. - Aspiring Cybersecurity Experts:
Students, entry-level professionals, or anyone planning a career in cybersecurity and seeking to add a top-tier certification to their profile. - Managed Service Providers (MSPs):
Professionals in organizations that provide network security services and want to master the tools to better serve their clients. - Companies Using or Considering Palo Alto Networks Solutions:
Employees within organizations that rely on or plan to implement Palo Alto Networks products and need specialized training for their teams. - Compliance and Risk Management Teams:
Those involved in ensuring that network security aligns with regulatory and compliance requirements. - All Veterans:
Looking for new career paths or refine their skills
We will offer comprehensive placement services to all individuals who successfully complete the training and earn their certification.
These courses provide valuable insights into firewall deployment and the key technologies that are built into PAN‑OS natively.
- Connecting to a Firewall – 20 m
- Connecting to Firewall – Assessment
- Managing Firewall Configurations 15 m
- Managing Firewall Configurations – Assessment
- Local Firewall Admin Accounts 15 m
- Local Firewall Admin Accounts – Assessment
- Non-Local Firewall Admin Accounts – 15 m
- Non-Local Firewall Admin Accounts – Assessment
- Security Zones and Network Interfaces – 30 m
- Security Zones and Network Interfaces – Assessment
- Security Policy Rules – 20 m
- Security Policy Rules – Assessment
- Threat and Traffic Logs – 15 m
- Threat and Traffic Logs – Assessment
- Log Forwarding – 10 m
- Log Forwarding – Assessment
- Purpose and Value of Decryption – 35 m
- Purpose and Value of Decryption – Assessment
- Decrypting Traffic and Network Design – 20 m
- Decrypting Traffic and Network Design – Assessment
- Decryption Configuration – 20 m
- Decryption Configuration – Assessment
- Certificates and Best Practices –15 m
- Certificates and Best Practices – Assessment
- Strata Logging Service Features – 45 m
- Strata Logging Service Features – Assessment
- Site-to-Site VPNs – 20 m
- Site-to-Site VPNs -Assessments
- Firewall High Availability – 30 m
- Firewall High Availability – Assessment
- Quantum Ready Virtual Private Networks – 40 m
- Quantum Ready Virtual Private Networks: Assessment
- Global Protect Configuration –30 m
- Global Protect Configuration – Assessment
- Global Protect App Settings and Monitoring – 40 m
- GlobalProtect App Settings and Monitoring – Assessment
These courses provide valuable insights into User-ID and Cloud Identity Engine. They demonstrate how to link user identities to network activities and enable the application of security policies based on user roles across both on-premises and cloud environments.
- Identifying Users Using User-ID – 15 m
- Identifying Users Using User-ID – Assessment
- User-ID Components and Operation – 15 m
- User-ID Components and Operation – Assessment
- Implementing User-ID in Security Policy – 30 m
- Implementing User-ID in Security Policy – Assessment
- User-ID Data Redistribution and Dynamic User Groups – 15 m
- User-ID Data Redistribution and Dynamic User Groups – Assessment
- Configure Multi-Factor Authentication –15 m
- Configure Multi-Factor Authentication – Assessment
- Credential Phishing and User-ID – 10 m
- Credential Phishing and User-ID – Assessment
- Configure Phishing Protection 10 m
- Configure Phishing Protection – Assessment
- Identity Concepts 30 m
- Identity Concepts – Assessment
- Cloud Identity Engine Setup and Connection 45 m
- Cloud Identity Engine Setup and Connection – Assessment
- User Authentication Configuration 40 m
- User Authentication Configuration – Assessment
- Advanced Identity Concepts 45 m
- Advanced Identity Concepts – Assessment
- Identity Data Redistribution 25 m
- Identity Data Redistribution – Assessment
- User Context 25 m
- User Context – Assessment
- System for Cross-Domain Identity Management 15 m
- System for Cross-Domain Identity Management – Assessment
These courses provide valuable insights into the VM-Series virtual next-generation firewall features that protect applications and data deployed across a wide range of public cloud and virtualized environments.
- Overview of Containerized Technology and Kubernetes – 45 m
- Overview of Containerized Technology and Kubernetes – Assessment
- CN-Series Firewalls Overview – 30 m
- CN-Series Firewalls Overview – Assessment
- CN-Series Architecture – 30 m
- CN-Series Architecture – Assessment
- CN-Series Firewall Deployment – 40 m
- CN-Series Firewall Deployment – Assessment
- Cloud Network Security – 20 m
- Cloud Network Security – Assessment
- VM-Series Requirements and Licensing – 30 m
- VM-Series Requirements and Licensing – Assessment
- Traffic Flow Designs and Features for VM-Series – 30 m
- Traffic Flow Designs and Features for VM-Series – Assessment
- VM-Series Firewall on AWS – 40 m
- VM-Series Firewall on AWS – Assessment
- VM-Series Deployment on AWS and Network Integration – 25 m
- VM-Series Deployment on AWS and Network Integration – Assessment
- AWS Gateway Load Balancer Integration – 25 m
- AWS Gateway Load Balancer Integration – Assessment
- VM-Series Firewall on Azure – 20 m
These courses provide valuable insights into firewall deployment and the key technologies that are built into PAN‑OS natively.
- Connecting to a Firewall – 20 m
- Connecting to Firewall – Assessment
- Managing Firewall Configurations 15 m
- Managing Firewall Configurations – Assessment
- Local Firewall Admin Accounts 15 m
- Local Firewall Admin Accounts – Assessment
- Non-Local Firewall Admin Accounts – 15 m
- Non-Local Firewall Admin Accounts – Assessment
- Security Zones and Network Interfaces – 30 m
- Security Zones and Network Interfaces – Assessment
- Security Policy Rules – 20 m
- Security Policy Rules – Assessment
- Threat and Traffic Logs – 15 m
- Threat and Traffic Logs – Assessment
- Log Forwarding – 10 m
- Log Forwarding – Assessment
- Purpose and Value of Decryption – 35 m
- Purpose and Value of Decryption – Assessment
- Decrypting Traffic and Network Design – 20 m
- Decrypting Traffic and Network Design – Assessment
- Decryption Configuration – 20 m
- Decryption Configuration – Assessment
- Certificates and Best Practices –15 m
- Certificates and Best Practices – Assessment
- Strata Logging Service Features – 45 m
- Strata Logging Service Features – Assessment
- Site-to-Site VPNs – 20 m
- Site-to-Site VPNs -Assessments
- Firewall High Availability – 30 m
- Firewall High Availability – Assessment
- Quantum Ready Virtual Private Networks – 40 m
- Quantum Ready Virtual Private Networks: Assessment
- Global Protect Configuration –30 m
- Global Protect Configuration – Assessment
- Global Protect App Settings and Monitoring – 40 m
- GlobalProtect App Settings and Monitoring – Assessment
These courses provide valuable insights into User-ID and Cloud Identity Engine. They demonstrate how to link user identities to network activities and enable the application of security policies based on user roles across both on-premises and cloud environments.
- Identifying Users Using User-ID – 15 m
- Identifying Users Using User-ID – Assessment
- User-ID Components and Operation – 15 m
- User-ID Components and Operation – Assessment
- Implementing User-ID in Security Policy – 30 m
- Implementing User-ID in Security Policy – Assessment
- User-ID Data Redistribution and Dynamic User Groups – 15 m
- User-ID Data Redistribution and Dynamic User Groups – Assessment
- Configure Multi-Factor Authentication –15 m
- Configure Multi-Factor Authentication – Assessment
- Credential Phishing and User-ID – 10 m
- Credential Phishing and User-ID – Assessment
- Configure Phishing Protection 10 m
- Configure Phishing Protection – Assessment
- Identity Concepts 30 m
- Identity Concepts – Assessment
- Cloud Identity Engine Setup and Connection 45 m
- Cloud Identity Engine Setup and Connection – Assessment
- User Authentication Configuration 40 m
- User Authentication Configuration – Assessment
- Advanced Identity Concepts 45 m
- Advanced Identity Concepts – Assessment
- Identity Data Redistribution 25 m
- Identity Data Redistribution – Assessment
- User Context 25 m
- User Context – Assessment
- System for Cross-Domain Identity Management 15 m
- System for Cross-Domain Identity Management – Assessment
These courses provide valuable insights into the VM-Series virtual next-generation firewall features that protect applications and data deployed across a wide range of public cloud and virtualized environments.
- Overview of Containerized Technology and Kubernetes – 45 m
- Overview of Containerized Technology and Kubernetes – Assessment
- CN-Series Firewalls Overview – 30 m
- CN-Series Firewalls Overview – Assessment
- CN-Series Architecture – 30 m
- CN-Series Architecture – Assessment
- CN-Series Firewall Deployment – 40 m
- CN-Series Firewall Deployment – Assessment
- Cloud Network Security – 20 m
- Cloud Network Security – Assessment
- VM-Series Requirements and Licensing – 30 m
- VM-Series Requirements and Licensing – Assessment
- Traffic Flow Designs and Features for VM-Series – 30 m
- Traffic Flow Designs and Features for VM-Series – Assessment
- VM-Series Firewall on AWS – 40 m
- VM-Series Firewall on AWS – Assessment
- VM-Series Deployment on AWS and Network Integration – 25 m
- VM-Series Deployment on AWS and Network Integration – Assessment
- AWS Gateway Load Balancer Integration – 25 m
- AWS Gateway Load Balancer Integration – Assessment
- VM-Series Firewall on Azure – 20 m
Reviews
There are no reviews yet.