Prevent Threats and Decrypt Traffic Using Palo Alto Firewalls
Today’s threats are evolving, with many hiding inside of encrypted traffic. This course will teach you to use Palo Alto’s NGFW & Threat Prevention Cloud to stop malicious content, including zero-day and DoS attacks, even if the traffic is encrypted.
What you'll learn
The number of threats that will disrupt business activities is continuing to grow and evolve, and they are becoming harder to detect partly because they are lurking inside of encrypted traffic that most devices cannot see into. In this course, Prevent Threats and Decrypt Traffic Using Palo Alto Firewalls, you will gain the ability to stop malicious and unsanctioned traffic, even if it is inside encrypted traffic. First, you will learn how to configure various security profiles such as antivirus, anti-spyware, and denial of service mitigations. Next, you will discover how to leverage Palo Alto’s WildFire® to stop zero-day attacks, even if no one else has seen the malicious content before. Finally, you will explore how to decrypt the traffic that flows through your organization’s network so you can apply these threat prevention mechanisms to all traffic. When you’re finished with this course, you will have the skills and knowledge of using the Palo Alto firewall to prevent various threats, even if they are inside of encrypted traffic -- which is needed to secure your network from today’s advanced threats.
Table of contents
- Course Overview and Objectives 7m
- Packet Buffer Protection 2m
- Demo: Configuring Packet Buffer Protection 3m
- Zone Protection Profiles 3m
- Demo: Configuring Zone Protection Profiles 9m
- DoS Profiles and Policies 4m
- Demo: Configuring DoS Profiles and Policies 8m
- Demo: Verifying Flood Protection Mechanisms 11m
- Demo: Troubleshooting Flood Protection Mechanisms 3m
- Security Profiles Overview 9m
- Antivirus Profiles 3m
- Demo: Configuring Antivirus Security Profiles 7m
- Anti-spyware Profiles 2m
- Demo: Configuring Anti-spyware Security Profiles 6m
- Vulnerability Protection Profiles 3m
- Demo: Configuring Vulnerability Protection Profiles 6m
- URL Filtering Profiles 4m
- Demo: Configuring URL Filtering Profiles 8m
- File Blocking and Data Filtering Profiles 4m
- Demo: Configuring Data Filtering and File Blocking Profiles 10m
- Decryption Overview 5m
- Decryption Rollout Strategy and Module Objectives 5m
- Demo: Configure Decryption Profiles 4m
- Forward Trust and Untrust Certificates and SSL Decryption Exclusion 3m
- Demo: Configuring Forward Trust and Forward Untrust Certificates 6m
- Demo: Configuring SSL Forward Proxy 5m
- Demo: Verifying SSL Forward Proxy 7m
- Demo: Configuring SSL Inbound Inspection and Troubleshooting Decryption 8m
- Demo: Configuring SSH Proxy 2m
- Network Packet Broker Overview 3m
- Course Summary and Parting Thoughts 4m