Palo Alto Firewall PCNSE New V9 & V10 Training
Learn Palo Alto Firewall V9 & V10 with Step by Step Lab Workbook
IT & Software,Network & Security
Lectures -102
Resources -1
Duration -36 hours
Course Description
In this courses, feature lecture and hands-on labs, you will learn to install, configure, manage and troubleshoot Palo Alto Networks firewalls, gaining the skills and expertise needed to protect your organization from the most advanced cyber-security attacks. The student will get hands-on experience in configuring, managing, and monitoring a firewall in a lab environment.
This class covers many topics required for PCNSE V10 and new topics are added frequently. This course dives deeper into Palo Alto firewalls policies and network configuration to give the students a clear understanding on several topics. Topics covered include Security Policies configuration, SSL Decryption, Routing configuration, IPsec configuration, High Availability configuration and other real world configuration examples. This online class will help in preparing the student for the PCNSE certification by covering topics in the depth that Palo Alto expects the candidates to know. There are also materials included with this class.
Who this course is for:
- This course is for students trying to obtain the PCNSE.
- This course is for students trying to learn the Palo Alto Firewall.
- Any Network or Security Engineer want to learn or polish their Skills.
Goals
What will you learn in this course:
Configure and Manage Palto Alto Firewall
Understand Palo Alto Firewalls Deployment Methods
How to setup a Lab Environment
Understand how to deploy Palo Alto Firewalls in GNS3 & EVE NG
Understand Palo Alto Firewalls Security Policies
Understand Palo Alto Firewalls NAT configuration
Understand User ID Integration
Configure user ID integration using User ID Agent
Configure Captive Portal to authenticate users
Understand AntiSpyware, AntiVirus, IPS configuration
Configure AntiSpyware, Antivirus and IPS
Configuring SSL Decryption
Prerequisites
What are the prerequisites for this course?
Basic IP and security knowledge is nice to have.
Students need to understand basic networking.
Students needs to understand Networking Fundamentals.
Curriculum
Check out the detailed breakdown of what’s inside the course
Paloalto Intro and basic concepts
102 Lectures
-
Conman Network Security Terms 21:21 21:21
-
Identify Malware Malicious Software 30:52 30:52
-
Introduction to Firewall Technology 20:20 20:20
-
About Palo Alto Networks Firewall 14:34 14:34
-
Install Palo Alto Firewall In VMware 17:12 17:12
-
Install Palo Alto On EVE-NG 14:38 14:38
-
Install Palo Alto in GNS3 13:02 13:02
-
Install Palo Alto On ESXI 11:50 11:50
-
CLI Access Modes & Basic Commands 18:00 18:00
-
Introduction to Dashboard Tab 21:42 21:42
-
Palto Alto Initial Configuration 04:18 04:18
-
Configure DNS & NTP in Palto Firewall 19:54 19:54
-
Activate Licenses and Subscriptions 23:02 23:02
-
Dynamic Updates and Software Updates 20:30 20:30
-
Initial Working of Palo Alto Firewall 22:27 22:27
-
Management Interface Configuration 26:42 26:42
-
Palo Alto Firewall Interfaces Details 32:13 32:13
-
Palo Alto Firewall Zones Details 12:04 12:04
-
Routing Protocols,AD,Metric & Routing Tables 20:51 20:51
-
Virtual Routers in Palo Alto Firewall 11:12 11:12
-
Configure & Verify Static Routing in PA Firewall 49:12 49:12
-
Configure & Verify Default Routing in PA Firewall 14:07 14:07
-
Configure & Verify Dynamic Protocol RIP in PA 23:53 23:53
-
Configure & Verify RIP Authentication in PA 17:44 17:44
-
Configure & Verify Dynamic Protocol OSPF in PA 34:47 34:47
-
Configure and Verify Redistribute in PA 14:06 14:06
-
Security Policy Concept & Theory in PA 51:48 51:48
-
Security Policy Granular Criteria and Control 44:36 44:36
-
Security Policy Action Setting Options 29:02 29:02
-
Security Policy Shadows Rule in PA 05:05 05:05
-
Security Policy Test Policy Match Option 06:08 06:08
-
Security Policy View Rulebase as Groups 09:02 09:02
-
Security Policy Policy Optimizer Option 05:15 05:15
-
Introduction to SSL and TLS certificates 16:31 16:31
-
Configure SSL Forward Proxy in PA Firewall 25:19 25:19
-
Introduction to Security Profiles Content-ID 10:15 10:15
-
Configure Security Profile (Antivirus Profile) 21:02 21:02
-
Configure Security Profile (Anti-Spyware) 24:56 24:56
-
Configure Security Profile (Vulnerability) 35:23 35:23
-
Configure Security Profile (URL Filtering) 36:37 36:37
-
Configure Security Profile (File Blocking) 19:00 19:00
-
Configure Security Profile (WildFire Analysis) 35:47 35:47
-
Configure Security Profile (Data Filter) 26:16 26:16
-
Configure Security Profile (Security Group) 09:35 09:35
-
DoS & Zone Protection and Packet Buffer Theory 17:52 17:52
-
Configure & Verify DoS Protection Profile 43:16 43:16
-
Configure & Verify Zone Protection Profile 26:08 26:08
-
Configure & Verify Packet Buffer Protection 10:29 10:29
-
Palo Alto Firewall Layer 2 Deployment 30:42 30:42
-
Palo Alto Firewall Tap Mode Deployment 24:45 24:45
-
Palo Alto Firewall V-Wire Mode Deployment 22:37 22:37
-
Palo Alto Firewall Sub-Interface Mode 22:41 22:41
-
NAT Theory & Source Network Address Translation Types 18:04 18:04
-
Source NAT Type Dynamic IP and Port (DIPP) Theory & Lab 46:18 46:18
-
Source NAT Type Dynamic IP(DIP) Theory and Lab 10:32 10:32
-
Source NAT Type Static IP Theory and Lab 11:15 11:15
-
Destination Network Address Translation Static IP 21:05 21:05
-
DNAT Port Forwarding and Port Translation 10:44 10:44
-
U-Turn NAT-Network Address Translation Theory & Lab 18:21 18:21
-
Objects (Address, Address Groups,Regions,Service, Service Group) 45:53 45:53
-
Introduction to App-ID in Palo Alto Firewall 39:04 39:04
-
Walk-through and Details of Applications in PA Firewall 13:02 13:02
-
Walk-through and Details of Applications Window in PA 18:29 18:29
-
Application Shifts in Palo Alto Firewall 12:15 12:15
-
Dependent Applications in Palo Alto Firewall 06:23 06:23
-
Implicitly Use Applications in Palo Alto Firewall 01:57 01:57
-
Application Groups in Palo Alto Firewall 14:27 14:27
-
Application Filters in Palo Alto Firewall 14:33 14:33
-
Custom Applications in Palo Alto Firewall 08:37 08:37
-
Application Override in Palo Alto Firewall 14:28 14:28
-
Application Updates in Palo Alto Firewall 04:14 04:14
-
Security Policy based on Application in PA 11:46 11:46
-
Introduction to User-ID (User Identification) 06:27 06:27
-
Captive Portal User-ID in Palo Alto Firewall 25:37 25:37
-
AD,DNS, Users and Groups Configuration 16:16 16:16
-
Palo Alto Firewall Active Directory Integration 42:42 42:42
-
DHCP(Dynamic Host Configuration Protocol) Theory 15:48 15:48
-
DHCP(Dynamic Host Configuration Protocol) Server Lab 28:39 28:39
-
DHCP(Dynamic Host Configuration Protocol) Relay Lab 17:07 17:07
-
Configure Interface Mgmt (Management) Profile 09:04 09:04
-
Service Features Service Route Configuration 08:37 08:37
-
Administrator Accounts & Dynamic Roles Configuration 16:31 16:31
-
Administrator Accounts & Role Based Configuration 15:32 15:32
-
Administrator Accounts Window Walk-through 09:46 09:46
-
Administrator Accounts Password Complexity 26:06 26:06
-
Redundancy High Availability (HA) Theory 33:04 33:04
-
High Availability (HA) Active-Passive Lab 45:41 45:41
-
Cryptography, Encryption and Hashing Concepts 36:48 36:48
-
Internet Key Exchange, Version & Phases Theory 09:39 09:39
-
VPN, Types, Protocols,Classification etc Theory 06:47 06:47
-
IPSec Protocols, Features,Modes,Encryption Theory 05:57 05:57
-
IPSec Site-to-Site Virtual Private Network VPN Lab 36:31 36:31
-
Remote-Access VPN GlobalProtect Theory and Lab 01:26:19 01:26:19
-
Log Types (Traffic,Threat, User-ID etc) in Monitor Tab 34:49 34:49
-
Configure and Verify Syslog in Palo Alto Firewall 23:48 23:48
-
Configure and Verify NetFlow in Palo Alto Firewall 15:07 15:07
-
Configure and Verify SNMP in Palo Alto Firewall 16:26 16:26
-
Configure and Verify Packet Capture GUI and CLI 35:35 35:35
-
App Scope (Summary,Change,Threat,Network Monitor) 04:39 04:39
-
ACC (Application Command Center ) Tab Walk-through 17:17 17:17
-
Configure Backup and Restore in Palo Alto Firewall 40:00 40:00
-
Downloadable Course Resources
Instructor Details

Ahmad Ali
Cyber Security Consultant & Cisco Certified InstructorI am Cyber Security Consultant and Cisco Certified Trainer with several years of experience. Teaching part time for more than 10 years’ providing classroom, on-site and online training on various network, security topics and Certifications like CCNA R&S, CCNA, CCNA Security, CCNP R&S, CCNP Security, VPN, Firewalls etc. My utmost desire as an instructor is to bring my field experience into classroom in order to give my students' a feel of real-world hands-on.
Certifications:
CCIE Routing and Switching
Cisco Certified Specialist - Web Content Security Certificate
Cisco Certified Specialist - Security Identity Management Implementation Certificate
Cisco Certified Specialist - Security Core Certificate
Cisco Certified Specialist - Network Security VPN Implementation
Cisco Certified Specialist - Network Security Firepower Certificate
Cisco Certified Specialist - Enterprise Core Certificate
Cisco Certified Specialist - Enterprise Advanced Infrastructure Implementation Certificate
Cisco Certified Network Professional CCNP (Routing & Switching)
Cisco Certified Network Associate CCNA (Routing & Switching)
Cisco Certified Network Professional CCNP (Security)
Cisco Certified Network Associate CCNA (Security)
Cisco Certified Academy Instructor CCAI
Microsoft Certified Solutions Associate MCSA Server 2012
Microsoft Certified Solutions Associate MCSA Server 2008
Microsoft Certified IT Professional MCITP Server 2008
Microsoft Certified Technology Specialist MCTS Windows 7
Microsoft Certified Technology Specialist MCTS 2008
Microsoft Technology Associate MTA
EC-Council Certified Secure Computer User CSCU
Palo Alto Networks Certified Network Security Engineer (PCNSE)
Palo Alto Accredited Configuration Engineer (ACE)
EC-Council Certified, Certified Ethical Hacker (CEH)
Fortinet NSE1, NSE2, NSE3 , NSE4 and NSE7
F5 Certified BIG-IP Administrator
Course Certificate
User your certification to make a career change or to advance in your current career. Salaries are among the highest in the world.

Our students work
with the Best


































Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe now
Online Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now