Palo Alto Networks Firewall - Hands-On Cyber Security Course
- Description
- Curriculum
- FAQ
- Reviews
*** The only Palo Alto Networks Firewall course on Udemy 100% Ethical Hacking Oriented .***
Thousand of companies get compromised every year, and unfortunately many of them had no clue they could be the target of a Cyber Attack. Too often, they thought technologies like Firewall & IPS were not necessary in their network and underestimated the risk and damage of a breach.
In this training, you will learn why & how the bad actors target your network. You will also understand what cyber attacks are all about and be in a position where you can better protect your assets with Palo Alto Networks Firewalls.
The course will give you an introduction of the kill chain used by the bad actors to take control of a network and provide a method to successfully block every stage of a hack using Palo Alto Networks Firewalls. You will receive an introduction to the different features of Palo Alto Networks Firewalls such as Wildfire, Vulnerability Profiles, and DNS Security and learn where and how to use them effectively.
The course also comes with different demonstrations of ethical hacking activities and configuration of your Palo Alto Networks firewall. Like a Cyber Range Training or Blue Team / Red Team exercise you will be in the position of the attacker and the Firewall administrator to get the big picture of what Cyber Security is all about.
WHAT OTHER STUDENTS SAY
⭐⭐⭐⭐⭐
This was a great introductory cybersecurity course ! The course begins with a high-level overview of the cyber kill chain followed by a module for each step of the kill chain each of which includes a more-in-depth conceptual overview and practical demonstration, steps to prevent that step of the kill chain using Palo Alto Networks firewalls, and implementation best practices. I would definitely recommend this course to others as a brief introduction to cybersecurity (and the cyber kill chain) using Palo Alto Networks technologies.
-
4Scanning the TargetVideo lesson
Learn about Reconnaissance and Scanning methods used by attackers
-
5Defend against ScanningVideo lesson
Learn about mechanism to defeat port scanning with a Palo Alto Networks Firewall.
-
6Scanning SummaryVideo lesson
Summary & Best Practice when defending against Port Scanning with Palo Alto Networks Firewalls
-
7Enumerating the TargetVideo lesson
Learn about Enumeration methods used by attackers.
-
8Defend against EnumerationVideo lesson
Learn about mechanism to defeat enumeration and brute forcing attacks with a Palo Alto Networks Firewall.
-
9Enumeration SummaryVideo lesson
Summary & Best Practice when defending against Enumeration with Palo Alto Networks Firewalls
-
10Exploiting the TargetVideo lesson
Learn about Exploitation and Delivery methods used by attackers to take control of your network.
-
11Defend against Exploitation and DeliveryVideo lesson
Learn about mechanism to defeat service exploitation and malicious programs delivery with a Palo Alto Networks Firewall.
-
12Exploitation & Delivery SummaryVideo lesson
Summary & Best Practice when defending against Exploitation & Delivery with Palo Alto Networks Firewalls
-
13Data ExfiltrationVideo lesson
Learn about Exfiltration methods used by attackers to steal your Data and stay under the radar .
-
14Defend against Data ExfiltrationVideo lesson
Learn about the approach to defeat Data Exfiltration with a Palo Alto Networks Firewall.
-
15Data Exfiltration SummaryVideo lesson
Summary & Best Practice when defending against Data Exfiltration with Palo Alto Networks Firewalls
-
16Lateral MovementsVideo lesson
Learn about Lateral Movements methods used by attackers to move in your network and control your assets .
-
17Defend against Lateral MovementsVideo lesson
Learn about the approach to defeat Lateral Movements and setup a proper segmentation with a Palo Alto Networks Firewall.
-
18Lateral Movements SummaryVideo lesson
Summary & Best Practice when defending against Lateral Movements with Palo Alto Networks Firewalls
-
19Command and ControlVideo lesson
Learn about Command and Control methods used by attackers to fully control your assets .
-
20Defend against Command and ControlVideo lesson
Learn about the approach to defeat Command and Control servers with a Palo Alto Networks Firewall.
-
21Command and Control SummaryVideo lesson
Summary & Best Practice when defending against Command and Control with Palo Alto Networks Firewalls
External Links May Contain Affiliate Links read more