Company: Pluralsight Author: Craig Stansbury Full Title: Preventing Threats Using Palo Alto Firewalls Year: 2019 Language: English Genre: Educational: Security Skill Level: Intermediate Price: - - Files: MP4 (+ Slides .PDF) Time: 02:40:41 Video: AVC, 1280 x 720 (1.778) at 15.000 fps, 350 kbps Audio: AAC at 96 Kbps, 2 channels, 48.0 KHz Today’s threats are evolving, with many hiding inside of encrypted traffic. This course will teach you to use Palo Alto’s NGFW & Threat Prevention Cloud to stop malicious content, including zero-day and DoS attacks, even if the traffic is encrypted. The number of threats that will disrupt business activities is continuing to grow and evolve, and they are becoming harder to detect partly because they are lurking inside of encrypted traffic that most devices cannot see into. In this course, Preventing Threats Using Palo Alto Firewalls, you will gain the ability to stop malicious and unsanctioned traffic, whether or not it is inside encrypted traffic. First, you will learn how to configure various security profiles such as Antivirus, Anti-Spyware, and Denial of Service mitigations. Next, you will discover how to leverage Palo Alto’s WildFire® and AutoFocus™ to stop zero-day attacks, even if no one else has seen the malicious content before. Finally, you will explore how to decrypt the traffic that flows through your organization’s network so you can apply these threat prevention mechanisms to all traffic. When you’re finished with this course, you will have the skills and knowledge of using the Palo Alto firewall to prevent various threats, even if they are inside of encrypted traffic -- which is needed to secure your network from today’s advanced threats. Lessons: 1. Course Overview 01. Course Overview 2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection 02. Course Intro 03. New Features in PAN-OS 9.0, Overview of the Network Diagram, and Content ID Introduction 04. Configuring Antivirus 05. Configuring Anti-Spyware 06. Configuring Vulnerability Protection 07. Configuring URL Filtering 08. Configuring Data Filtering 09. Configuring Zone Protection Profiles 10. Configuring DoS Protection Profiles 11. Best Practices 3. Integrating with WildFire® and AutoFocus™ 12. Module Introduction & Flow Logic 13. WildFire® & AutoFocus™ Overview 14. Configuring WildFire® & File Blocking 15. Verifying File Blocking & WildFire® 16. Threat Vault & WildFire® Portal 17. Security Profile Groups & Security Rule Audit Logs 18. Implementing AutoFocus 4. Joining the Enterprise PKI Infrastructure 19. Module Introduction 20. Certificate Authorities, Certificate Signing Requests, and Public Key Infrastructure 21. Generating a CSR & Installing a Certificate 22. Using a Certificate for Web Management Traffic 5. Decrypting Traffic on the Palo Alto Firewall 23. Module Introduction 24. Palo Alto Firewall Decryption Overview 25. Decryption Rollout Strategy 26. Configuring Forward Trust & Untrust Certificates, and Understanding Response Pages 27. Configuring Decryption Profiles 28. Configuring SSL Forward Proxy 29. Configuring SSL Inbound Proxy, SSH Proxy, and Decyrption Mirroring 30. Decryption Broker Overview 31. Course Wrap Up Our members see more. Join us! ------------- Our members see more. Join us!