NETWORK SECURITY

Palo Alto Networks Firewall – Advanced Traffic Control

Explore advanced traffic management solutions available on Palo Alto Networks Firewall. Throughout this series, you will learn how to effectively implement Network Address Translation (NAT), deploy decryption strategies to inspect and control encrypted traffic, and utilize advanced protection features to harden the perimeter, optimize firewall performance and defend against a wide range of threats.

This course combines theoretical knowledge with practical configurations, ensuring that you can apply what you learn directly to your network environment.

Course Summary

Maximize the security of a Palo Alto Networks firewall deployment with NAT, decryption, and advanced protection features.

Piotr Kaluzny

Instructor

 

Domain
Network Security
Vendor
Palo Alto Networks
Level
Intermediate
Duration
4 hours
Status
Complete
Key Learnings

By the end of this course, participants will be able to:

  • Configure and deploy NAT on PAN-OS for effective network traffic management
  • Understand the principles of decryption and implement decryption policies to inspect encrypted traffic
  • Apply advanced security profiles to protect against a wide range of threats
  • Implement zone protection to safeguard network perimeters
  • Set up and manage DoS protection to prevent denial-of-service attacks
Intended Audience

This course is intended for network security engineers, network engineers, IT security professionals, cybersecurity analysts, and anyone with a foundational understanding of Palo Alto Networks Firewall who wants to enhance their skills in advanced traffic control and security management.

Course Prerequisites

While there are no formal prerequisites, participants should be familiar with the PAN-OS GUI, have the ability to initialize the firewall and configure Security Policy rules.

Course Playlist

Introduction

0. Course Introduction

Network Address Translation (NAT)

1. NAT on PAN-OS
2. Deploying NAT

Decryption

3. Understanding Decryption
4. Deploying Decryption

Advanced Protection

5. Security Profiles
6. Zone Protection
7. DoS Protection