18756 Stone Oak Park Way, Suite200, San Antonio TX 78258 USA
100 Queen St W, Brampton, ON L6X 1A4, Canada
country flagUnited States
share button

Firewall: Optimizing Firewall Threat Prevention (EDU-214) Training


What Firewall: Optimizing Firewall Threat Prevention (EDU-214) training is all about?

This Firewall: Optimizing Firewall Threat Prevention (EDU-214) Training is basically a 4-day Instructor-Led Training that accentuates the PAN-OS threat prevention capabilities. What you’ll learn after the completion of the course:

  • Utilizing reports and firewalls logs to construct perfect configuration decision making.
  • Configuring the firewall to record, detect and block threats.
  • Describing PAN-OS threat prevention capabilities.
  • Describing the cyber-attack lifecycle and recognizing common forms of attacks.
Schedule

Contact us to customize this class with your preferred dates, times and location.
You can call us on 1-800-961-0337 or Chat with our representative.

What are the course objectives for Firewall: Optimizing Firewall Threat Prevention (EDU-214) training?
  • Learn how to configure, monitor and manage PAN-OS threat protected features.
  • Gain hands-on experience in monitoring, managing and configuring threat protected features in lab.
Who should attend Firewall: Optimizing Firewall Threat Prevention (EDU-214) training?

The primary audience for this training are Security Engineers and Security Administrators. However, Network Engineers, Support Staff and Security Operations Specialist can also sign up for this training.

What are the prerequisites for Firewall: Optimizing Firewall Threat Prevention (EDU-214) training?

Learners must have knowledge of Firewall 9.1Essentials: Management and Configuration course. It is also recommended to have fundamental knowledge with switching, IP addressing and routing.

What is the course outline for Firewall: Optimizing Firewall Threat Prevention (EDU-214) training?
  • 1. The Cyber-Attack Lifecycle
  • 2. Blocking Packet- and Protocol-Based Attacks
  • 3. Blocking Threats from Known-Bad Sources
  • 4. Blocking Threats Using App-ID
  • 5. Blocking Threats Using Custom Applications
  • 6. Creating Custom Threat Signatures
  • 7. Blocking Threats in Encrypted Traffic
  • 8. Blocking Threats in Allowed Traffic
  • 9. Blocking Threats from Stolen Credentials
  • 10. Viewing Threat and Traffic Information
4 Days | $ 3995
4
  245 Ratings

1256 Learners

Get In Touch

Are you being sponsored by your employer to take this class?
* I authorize Microtek Learning to contact me via Phone/Email