We may earn an affiliate commission when you visit our partners.
Craig Stansbury

Today’s threats are evolving, with many hiding inside of encrypted traffic. This course will teach you to use Palo Alto’s NGFW & Threat Prevention Cloud to stop malicious content, including zero-day and DoS attacks, even if the traffic is encrypted.

Read more

Today’s threats are evolving, with many hiding inside of encrypted traffic. This course will teach you to use Palo Alto’s NGFW & Threat Prevention Cloud to stop malicious content, including zero-day and DoS attacks, even if the traffic is encrypted.

The number of threats that will disrupt business activities is continuing to grow and evolve, and they are becoming harder to detect partly because they are lurking inside of encrypted traffic that most devices cannot see into. In this course, Prevent Threats and Decrypt Traffic Using Palo Alto Firewalls, you will gain the ability to stop malicious and unsanctioned traffic, even if it is inside encrypted traffic. First, you will learn how to configure various security profiles such as antivirus, anti-spyware, and denial of service mitigations. Next, you will discover how to leverage Palo Alto’s WildFire® to stop zero-day attacks, even if no one else has seen the malicious content before. Finally, you will explore how to decrypt the traffic that flows through your organization’s network so you can apply these threat prevention mechanisms to all traffic. When you’re finished with this course, you will have the skills and knowledge of using the Palo Alto firewall to prevent various threats, even if they are inside of encrypted traffic -- which is needed to secure your network from today’s advanced threats.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Course Overview
Configuring Denial-of-Service Protection, Packet Buffer Protection, and Zone Protection
Utilizing Security Profiles to Protect Against Threats
Read more
Integrating Threat Prevention with WildFire®
Joining the Enterprise PKI Infrastructure
Decrypting Traffic on the Palo Alto Firewall

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches standard industry threat detection and mitigation
Demonstrates how to detect and defeat malicious traffic in today’s increasingly complex threat landscape
Helps students prepare for real-world security scenarios by teaching them how to protect against zero-day attacks and other advanced threats
Provides hands-on experience with Palo Alto’s NGFW & Threat Prevention Cloud, which are industry-leading security solutions
Suitable for students with some experience in cybersecurity or network security
Taught by Craig Stansbury, a recognized expert in network security

Save this course

Save Prevent Threats and Decrypt Traffic Using Palo Alto Firewalls to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Prevent Threats and Decrypt Traffic Using Palo Alto Firewalls with these activities:
Review Threats Hidden in Encrypted Traffic
Review the nature of current cyber threats and how they use encrypted traffic to hide from detection
Browse courses on Encrypted Traffic
Show steps
  • Read industry-leading articles and reports on encrypted traffic and malware
  • Watch webinars or attend online conferences related to threat detection in encrypted traffic
Review Palo Alto Firewalls
Refresh your knowledge of Palo Alto Firewalls, as it will be critical for sucess in this course
Browse courses on Palo Alto Firewalls
Show steps
  • Revisit the Palo Alto Firewalls documentation to get familiar with its key concepts and features
  • Practice configuring basic firewall rules and policies
Join a Study Group to Discuss Course Concepts
Engage in peer discussions to reinforce understanding and gain different perspectives on course materials
Show steps
  • Find a study group or create one with classmates
  • Meet regularly to discuss course topics, share notes, and solve problems together
Four other activities
Expand to see all activities and additional details
Show all seven activities
Follow Palo Alto's Official Tutorials on Decrypting Traffic
Follow interactive tutorials provided by Palo Alto Networks to gain hands-on experience in decrypting encrypted traffic
Show steps
  • Access and work through the 'Decrypting SSL/TLS Traffic' tutorial
  • Follow the 'Configuring Decryption Policies' tutorial to set up decryption rules
Practice Creating Denial-of-Service Mitigations
Complete hands-on exercises to develop proficiency in creating effective DoS mitigations using Palo Alto Firewalls
Browse courses on DoS Attacks
Show steps
  • Configure rate limiting and thresholds to prevent DoS attacks
  • Practice using Palo Alto's DDoS prevention features, such as SYN Cookies and Anti-Spoofing
Create a Sample Security Policy for a Secure Network
Develop a comprehensive security policy that integrates all the concepts covered in this course to secure a network
Browse courses on Security Policy
Show steps
  • Define security zones and assign security profiles based on network requirements
  • Create rules to allow legitimate traffic while blocking malicious traffic
  • Configure advanced features like application filtering and URL filtering
Volunteer as a Cybersecurity Assistant
Gain practical experience and contribute to the field by volunteering with organizations involved in cybersecurity
Browse courses on Cybersecurity
Show steps
  • Contact local non-profits or community groups that focus on cybersecurity
  • Inquire about volunteering opportunities and offer your skills

Career center

Learners who complete Prevent Threats and Decrypt Traffic Using Palo Alto Firewalls will develop knowledge and skills that may be useful to these careers:
Network Security Engineer
Network Security Engineers design, implement, and maintain network security systems. They work closely with network administrators to ensure that networks are secure and compliant with security regulations. This course will help you develop the skills and knowledge you need to succeed as a Network Security Engineer. You will learn how to configure denial-of-service protection, packet buffer protection, and zone protection. You will also learn how to utilize security profiles to protect against threats and integrate threat prevention with WildFire.
Security Architect
Security Architects design and implement security solutions for organizations. They work with stakeholders to identify and mitigate security risks. This course will help you develop the skills and knowledge you need to succeed as a Security Architect. You will learn how to configure denial-of-service protection, packet buffer protection, and zone protection. You will also learn how to utilize security profiles to protect against threats and integrate threat prevention with WildFire.
Cybersecurity Analyst
Cybersecurity Analysts are responsible for protecting computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. They analyze and interpret data to identify and respond to threats, including malware, viruses, and hacking attempts. This course will help you build a foundation in threat prevention and detection, which are essential skills for Cybersecurity Analysts. You will learn how to configure security profiles, integrate threat prevention with WildFire, and decrypt traffic on the Palo Alto firewall.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to improve their security posture. They work with clients to identify and mitigate security risks. This course will help you develop the skills and knowledge you need to succeed as a Security Consultant. You will learn how to configure denial-of-service protection, packet buffer protection, and zone protection. You will also learn how to utilize security profiles to protect against threats and integrate threat prevention with WildFire.
Information Security Analyst
Information Security Analysts monitor and analyze security systems to identify and respond to threats. They work with stakeholders to ensure that information assets are protected from unauthorized access, use, disclosure, disruption, modification, or destruction. This course will help you develop the skills and knowledge you need to succeed as an Information Security Analyst. You will learn how to configure denial-of-service protection, packet buffer protection, and zone protection. You will also learn how to utilize security profiles to protect against threats and integrate threat prevention with WildFire.
Security Engineer
Security Engineers design, implement, and maintain security systems. They work with stakeholders to ensure that systems are protected from unauthorized access, use, disclosure, disruption, modification, or destruction. This course will help you develop the skills and knowledge you need to succeed as a Security Engineer. You will learn how to configure denial-of-service protection, packet buffer protection, and zone protection. You will also learn how to utilize security profiles to protect against threats and integrate threat prevention with WildFire.
Information Security Manager
Information Security Managers are responsible for developing and implementing information security policies and procedures. They work with stakeholders to ensure that information assets are protected from unauthorized access, use, disclosure, disruption, modification, or destruction. This course will help you develop the skills and knowledge you need to succeed as an Information Security Manager. You will learn how to configure denial-of-service protection, packet buffer protection, and zone protection. You will also learn how to utilize security profiles to protect against threats and integrate threat prevention with WildFire.
Chief Information Security Officer
Chief Information Security Officers (CISOs) are responsible for overseeing an organization's information security program. They work with stakeholders to ensure that the organization's information assets are protected from unauthorized access, use, disclosure, disruption, modification, or destruction. This course will help you develop the skills and knowledge you need to succeed as a CISO. You will learn how to configure denial-of-service protection, packet buffer protection, and zone protection. You will also learn how to utilize security profiles to protect against threats and integrate threat prevention with WildFire.
Network Administrator
Network Administrators are responsible for managing and maintaining computer networks. They work with network engineers to ensure that networks are operating efficiently and securely. This course will help you develop the skills and knowledge you need to succeed as a Network Administrator. You will learn how to configure denial-of-service protection, packet buffer protection, and zone protection. You will also learn how to utilize security profiles to protect against threats and integrate threat prevention with WildFire.
Security Operations Center Analyst
Security Operations Center Analysts monitor and analyze security systems to identify and respond to threats. They work with stakeholders to ensure that information assets are protected from unauthorized access, use, disclosure, disruption, modification, or destruction. This course may be helpful if you are interested in becoming a Security Operations Center Analyst. You will learn how to configure denial-of-service protection, packet buffer protection, and zone protection. You will also learn how to utilize security profiles to protect against threats and integrate threat prevention with WildFire.
Cyber Threat Intelligence Analyst
Cyber Threat Intelligence Analysts collect and analyze information about cyber threats. They work with stakeholders to identify and mitigate threats to organizations. This course may be helpful if you are interested in becoming a Cyber Threat Intelligence Analyst. You will learn how to configure denial-of-service protection, packet buffer protection, and zone protection. You will also learn how to utilize security profiles to protect against threats and integrate threat prevention with WildFire.
Systems Engineer
Systems Engineers design, implement, and maintain computer systems. They work with stakeholders to ensure that systems are operating efficiently and securely. This course may be helpful if you are interested in becoming a Systems Engineer. You will learn how to configure denial-of-service protection, packet buffer protection, and zone protection. You will also learn how to utilize security profiles to protect against threats and integrate threat prevention with WildFire.
Cloud Security Engineer
Cloud Security Engineers design, implement, and maintain security systems for cloud environments. They work with stakeholders to ensure that cloud environments are protected from unauthorized access, use, disclosure, disruption, modification, or destruction. This course may be helpful if you are interested in becoming a Cloud Security Engineer. You will learn how to configure denial-of-service protection, packet buffer protection, and zone protection. You will also learn how to utilize security profiles to protect against threats and integrate threat prevention with WildFire.
Penetration Tester
Penetration Testers assess the security of computer systems and networks by simulating attacks. They work with organizations to identify and mitigate security vulnerabilities. This course may be helpful if you are interested in becoming a Penetration Tester. You will learn how to configure denial-of-service protection, packet buffer protection, and zone protection. You will also learn how to utilize security profiles to protect against threats and integrate threat prevention with WildFire.
Computer Forensic Analyst
Computer Forensic Analysts investigate cybercrimes. They work with law enforcement and other stakeholders to collect and analyze digital evidence. This course may be helpful if you are interested in becoming a Computer Forensic Analyst. You will learn how to configure denial-of-service protection, packet buffer protection, and zone protection. You will also learn how to utilize security profiles to protect against threats and integrate threat prevention with WildFire.

Reading list

We've selected six books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Prevent Threats and Decrypt Traffic Using Palo Alto Firewalls.
Offers an in-depth look at network security monitoring and includes a discussion of threat intelligence feeds and Open Threat Exchange.
A thorough resource that is useful as a foundational reference for those new to computer networking technologies.
This more advanced reference text provides readers with an in-depth look at the fundamentals of cryptography and security.
An in-depth discussion of the roles and capabilities of firewalls and intrusion detection systems in network security.
Focuses on security assessments and penetration testing, providing a practical guide to conducting these activities in a real-world environment.
This field guide provides quick references and best practices for using Palo Alto Networks Threat Prevention technology.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Prevent Threats and Decrypt Traffic Using Palo Alto Firewalls.
Wireshark for Basic Network Security Analysis
Most relevant
Cisco Firepower Fundamentals
Most relevant
AccessData Password Recovery Toolkit (PRTK)
Most relevant
Manage Palo Alto Firewalls with Panorama and Implement...
Network Analysis with Arkime
Deploy, Administer, and Secure Palo Alto Firewalls
Encryption with Python: Encrypt data with key pairs
Network Analysis with Real Intelligence Threat Analytics...
Configure NAT and VPNs Using Palo Alto Firewalls
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser