Prevent Threats and Decrypt Traffic Using Palo Alto Firewalls
Today’s threats are evolving, with many hiding inside of encrypted traffic. This course will teach you to use Palo Alto’s NGFW & Threat Prevention Cloud to stop malicious content, including zero-day and DoS attacks, even if the traffic is encrypted.
The number of threats that will disrupt business activities is continuing to grow and evolve, and they are becoming harder to detect partly because they are lurking inside of encrypted traffic that most devices cannot see into. In this course, Prevent Threats and Decrypt Traffic Using Palo Alto Firewalls, you will gain the ability to stop malicious and unsanctioned traffic, even if it is inside encrypted traffic. First, you will learn how to configure various security profiles such as antivirus, anti-spyware, and denial of service mitigations. Next, you will discover how to leverage Palo Alto’s WildFire® to stop zero-day attacks, even if no one else has seen the malicious content before. Finally, you will explore how to decrypt the traffic that flows through your organization’s network so you can apply these threat prevention mechanisms to all traffic. When you’re finished with this course, you will have the skills and knowledge of using the Palo Alto firewall to prevent various threats, even if they are inside of encrypted traffic — which is needed to secure your network from today’s advanced threats.
Author Name: Craig Stansbury
Author Description:
Craig has over 10 years of IT experience, including working on Palo Alto Firewalls, Cisco Routes and Switches, Microsoft Servers, and VMWare ESXi. Craig started in IT in the United States Marine Corps and began teaching his Marines all the design and implementation concepts that they needed to know. He loves when his students have the “lightbulb moment” and are able to understand the concepts he is teaching them. Aside from teaching, Craig also owns a business that consults with enterprises to h… more
Table of Contents
- Course Overview
1min - Configuring Denial-of-Service Protection, Packet Buffer Protection, and Zone Protection
48mins - Utilizing Security Profiles to Protect Against Threats
62mins - Integrating Threat Prevention with WildFire®
32mins - Joining the Enterprise PKI Infrastructure
17mins - Decrypting Traffic on the Palo Alto Firewall
54mins
There are no reviews yet.