Firewall 7.1: Manage CyberThreats

X

Kontakt os

Vi vil gerne høre fra dig. Udfyld denne formular for at forudbestilling eller anmode om yderligere oplysninger om vores leveringsmuligheder.

Tilmeld

Jeg vil gerne modtage e-mails med de seneste oplysninger og kampagner fra Insoft.

Databeskyttelse og privatliv

Jeg tillader hermed Insoft Ltd. at kontakte mig om dette emne. Jeg tillader endvidere Insoft Ltd.-, at indsamle og lagre mine personlige data med henblik på disse aktiviteter. Alle dine data vil blive beskyttet og sikret som beskrevet i vores privatlivspolitik.

Firewall 7.1: Manage CyberThreats
  • Firewall 7.1: Manage CyberThreats

    2 Dages
    Network Security
    1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 5.00 out of 5)
    Loading...

    Reviews

    Course Details

    BESKRIVELSE

    This two-day, instructor-led course teaches strategies in defense against cyberthreats. Successful completion of this course enables administrators to better understand the threat landscape. Students will learn the use of Palo Alto Networks® next-generation firewalls, including the WildFire™ product.

    KURSETS FORMĂ…L

    The Firewall 7.1: Manage Cyberthreats course is for students who want to understand cyberthreats and their characteristics. Students will learn how to manage cyberthreats using security policies, profiles, and signatures to protect their network against emerging threats.

    KURSUSINDHOLD

    Module 1: Threat Landscape

    • Advanced Persistent Threats
    • Data Breaches and Tactics
    • Threat Management Strategies

    Module 2: Integrated

    • Approach to Threat Protection
    • Integrated Approach to Protection
    • Next-Generation Firewall
    • Advanced Endpoint Protection

    Module 3: Network Visibility

    • Zero Trust Model
    • SSL Decryption
    • Decryption Policy

    Module 4: Reducing the Attack Surface

    • App-ID to Reduce Attack Surface
    • Control Advanced Vectors
    • Handling Drive-By Downloads
    • DoS Protection

    Module 5: Handling Known Threats

    • WildFire Analysis
    • Security Profiles

    Module 6: Handling Unknown Traffic and Zero-Day Exploits

    • WildFire
    • Researching Threat Events
    • Identifying Unknown Applications

    Module 7: Investigating Breaches

    • Identify IOCs Using App-Scope
    • Log Correlation
    • Finding Infected Host

    Module 8: Using Custom Signatures

    • Creating Custom App-IDs
    • Threat Signatures

    MĂ…LGRUPPE

    • Firewall Administrators, Network Security Administrators, and Technical Professionals

    FORUDSÆTNINGER

    • Students must complete the Firewall 7.1: Install, Configure, and Manage (EDU-201) course and have an understanding of network concepts, including routing, switching, and IP addressing. They also will need in-depth knowledge of port-based security and security technologies such as IPS, proxy, and content filtering