Palo Alto Networks Certified Network Security Engineer (PCNSE)

The Palo Alto Networks Certified Network Security Engineer (PCNSE) course is designed to provide comprehensive knowledge and practical skills required to design, configure, deploy, and manage Palo Alto Networks Next-Generation Firewalls. The course covers various topics, including firewall architecture, security policies, network address translation, VPN deployments, advanced security features, and troubleshooting techniques. By the end of this course, participants will be able to effectively secure and manage network infrastructure using Palo Alto firewalls.

The certification path includes three levels of certification: PCCSA as an intro, PCNSA as the mid-level, and PCNSE as the specialist or level certification

Course Objectives:

  1. Understand the key concepts and features of Palo Alto Networks Next-Generation Firewalls.
  2. Learn about the overall firewall architecture, including traffic processing and packet flow.
  3. Understand how to design and implement security policies using best practices.
  4. Gain knowledge on network address translation (NAT) configurations and troubleshooting.
  5. Learn how to deploy and manage Virtual Private Networks (VPNs) using Palo Alto firewalls.
  6. Gain expertise in advanced security features, such as threat prevention, URL filtering, and application control.
  7. Develop skills for monitoring and troubleshooting Palo Alto firewalls.

Prerequisites:

– Basic understanding of networking concepts and TCP/IP protocol suite

– Familiarity with firewall technologies and network security principles

 

Course Outline:

PA-01: Common Network Security Terms & Malware.
PA-02: Introduction to Firewall Technology.
PA-03: About Palo Alto Networks Firewall.
PA-04: Palo Alto Initial Configuration & VMWare Installation.
PA-05: Installing Palo Alto Firewall In GNS3.
PA-06: Installing Palo Alto Firewall In EVE-NG.
PA-07: Palo Alto Firewall Dashboard Introduction.
PA-08: Console-Based Administration.
PA-09: DNS & NTP Management Services.
PA-10: Activate Licenses, Subscriptions & Updates
PA-11: Initial Working Lab.
PA-12: Interfaces, Zones & Interface Mgmt.
PA-13: Administrator Accounts, Role based configuration & Password complexity
PA-14: Virtual Router, Static, Default & RIP
PA-15: Redistribute and OSPF,BGP
PA-16: Security Policy Concepts.
PA-17: Security Policy Schedules, Shadows Rule.
PA-18: Objects (Addresses, Services, Regions, Tags).
PA-19: Security Profiles & Antivirus Profiles.
PA-20: Security Profiles Anti-Spyware Profiles.
PA-21: Vulnerability Protection Profiles
PA-22: URL Filtering Profiles.
PA-23: File Blocking Profiles.
PA-24: WildFire Analysis Profile.
PA-25: Data Filtering Profile.
PA-26: Security Profile Groups.
PA-27: SSL Forward Proxy.
PA-28: Network Address Translation & Different Types
PA-29: Layer 2 Deployment.
PA-30: Tap Mode Deployment.
PA-31: Virtual Wire Deployment.
PA-32: Service Route Configuration.
PA-33: User-ID (User Identification).
PA-34: Palo Alto LADAP Integration.
PA-35: Palo Alto Firewall App-ID.
PA-36: VPN Theory Concept.
PA-37: Site to Site VPN Lab:
PA-38: Global Protect Remote VPN.
PA-39: Configure & Verify High Availability: (Active-Passive & Active-Active)
PA-40: Backup & Restore in Palo Alto Firewall:
PA-41: Configure & Verify Syslogs (Logs):
PA-42: Logs Type in Palo Alto Firewall:
PA-43: Packet Capture GUI and CLI:
PA-44: Monitoring Reports App Scope:
PA-45: Captive Portal
PA-46: Configure and Verify NetFlow:
PA-47: Configure and Verify SNMP:
PA-48: Configure RADIUS Authentication:
PA-49: Configure and Verify DHCP Server
PA-50 QoS
PA-51 Link Aggregation
PA-52 Policy Based Forwarding

Panorama
———
1.What is panorama
2.Deployment methods
3.Modes of Panorama
4.Adding firewall in to panorama
5.Initial configuration of panorama
6.How to upgrade palo alto with the help of panorama
7.Panorama Templates
8.How to create template and template stack in panorama
9.How to create object and pushing configuration to panorama
10.what are the type of policy
11.How to create security policy in panorama
12.How to configure NAT policy and push to firewall
13.what is Log
14.How to configure log forwarding in palo alto firewall
15.How to push those logs to panorama
16.Benefit of having panorama
17.What is upgrade and why do we need
18.What is upgrade path for panorama
19.What are the process to upgrade the panorama
20.What are the verification that we can do after upgrade
21.Steps for panorama upgrade
22.PanOS sdwan and prisma sdwan basics.