Login     Signup
   info@zetlantechnologies.com        +91-8680961847

  /   PaloAlto Certification   /   PaloAlto Cloud Security Engineer

Palo Alto Networks Certified


Cybersecurity Apprentice


Validates foundational Knowledge and understanding of networking and cybersecurity





Objectives

This certification validates foundational knowledge and understanding in the areas of cybersecurity concepts, network fundamentals, endpoint security, security operations, network security, and cloud security.


Target Audience

This certification is designed for individuals who want to validate foundational knowledge and understanding of cybersecurity concepts. This is applicable to an emergent workforce that includes high school, college, and university students, individuals who want to transition into a cybersecurity career, and technical and non-technical IT professionals.


Recommended Prerequisites

There are no prerequisites for this exam.



Course Details

1. Cloud Security Posture Management (CSPM)

  • Identify assets in a Cloud account
    • Inventory of resources in a cloud account
    • Resource configuration history
    • Asset configuration changes
    • Configure policies
    • Custom policies
    • Policy types
    • Supported variables within configuration-run custom policies
    • Configure compliance standards
    • Standards
    • Reports
    • Configure alerting and notifications
    • Alert states
    • Alert rules
    • Alert notifications and reports
    • Alert workflow
    • Use third-party integrations
    • Inbound and outbound notifications
    • Perform ad hoc investigations
      • Resource configuration with RQL
      • User activity using RQL
      • Network activity using RQL
      • Anomalous user events
      • Asset details using RQL
    • Remediate alerts
    • Auto-remediation
    • Manual versus automated remediation
    • Use SecOps Dashboard
    • Internet-connected assets by source network traffic behavior
    • Components

  • Monitor and defend against image vulnerabilities
    • Options available in the Monitor section
    • Options available in the Policies section
  • Monitor and defend against host vulnerabilities
    • Options available in the Monitor section
    • Options available in the Policies section
  • Monitor and enforce image/container compliance
    • Options available in the Monitor section
    • Options available in the Policies section
  • Monitor and enforce host compliance
    • Options available in the Monitor section
    • Options available in the Policies section
  • Monitor and defend containers and hosts during runtime
    • Container models
    • Host observations
    • Runtime policies
    • Runtime audits
    • Incidents using Incident Explorer
  • Monitor and protect against serverless vulnerabilities
    • Monitor
    • Policy
    • Auto-protect
  • Configure WAAS
    • Application specifications
    • API methods
    • Rest API endpoints
    • DoS protection
    • Access control to Limit inbound sources
    • Network lists
    • Access control to enforce HTTP headers and file uploads
    • Bot protection
    • Rules
    • Audit logs
  • Monitor and protect registries
    • Scanning
    • CI

  • Deploy and manage Console for the Compute Edition
    • Prisma Cloud release software
    • Console in One box configuration
    • Upgrade on Console
    • Business use case to determine Prisma Cloud version to use
    • Tenant versus Scale projects
  • Deploy and manage defenders
    • Networking for Defender-To-Console connectivity
    • Upgrade and Compatibility
  • Configure Agentless Security
    • Agent versus Agentless
    • Cloud discovery
  • Backup and restore Console
    • Backup management
    • Disaster recovery
  • Manage authentication
    • Certificates
    • Secrets and credentials store
  • Onboard accounts
    • Onboard cloud accounts
    • Account Groups
  • Configure access control
    • Users, roles, and permission groups
    • Access control troubleshooting
    • Service accounts and access keys
    • Single Sign On
    • Role-based access control for Docker Engine (CWP)
    • Admission control with Open Policy Agent (CWP)
    • Resource lists and collections
  • Configure logging
    • Audit logging
    • Defender logging
  • Manage enterprise settings
    • Anomaly settings
    • Idle timeout
    • Auto-enable policies
    • Alert dismissal reason
    • User attribution
    • Licensing
    • Access key maximum validity
  • Configure third-party integrations
    • Inbound and outbound notifications
    • Supported capabilities
  • Leverage Cloud and Compute APIs
    • Authenticate with APIs
    • API documentation
    • Policies and custom queries by API
    • Alerts and Reports using APIs
    • Vulnerability results via API
    • Access keys
    • Data security and IAM APIs
  • Leverage Adoption Advisor and Alarm Center
    • Notification rule
    • Adoption Advisor guidance
  • Access Knowledge Center and Help Center
    • Knowledge Center
    • Help Center
    • Feature requests
    • PCCSE
    • Live Community
    • Product status updates
    • Docs, Prisma Cloud Privacy and Support options

  • Configure Cloud network analyzer
    • Network exposure policy
    • RQL
  • Deploy and manage Enforcers
    • Processing units
    • Namespaces
    • Tags and identity
    • Network rulesets
    • Out-of-the-box rules
    • Application profiling
  • Manage local changes in a remote repository (dev-prod) Configuration
    • Types
    • Networking for Enforcers-to-Console connectivity Use NetSecOps dashboard
    • Flows

  • Implement scanning for IAC templates
    • Terraform and Cloud formation scanning configurations
    • OOTB IAC scanning integrations
    • API scanning
    • IAC scanning integration
    • Supply-chain security
    • Handling scanned issues
    • Repository scanning
  • Configure policies in Console for IAC scanning
    • OOTB policies
    • Custom build policies
    • Types of config policies
    • Prisma configuration files
  • Configure CI policies for Compute scanning
    • Default CI policies
    • Custom CI policies
  • Manage configuration settings
    • Code reviews
    • Code repository settings
    • Notifications
    • Pull requests and tagging bots

  • Calculate net effective permissions
    • AWS calculation
    • Azure calculation
  • Investigate incidents and create IAM policies
    • RQL queries
    • IAM policies
  • Integrate IAM with IdP
    • Azure active directory
    • Okta
  • Remediate alerts
    • Manual versus automatic
    • AWS remediation
    • Azure remediation
  • Monitor Scan Results
    • Monitor Scan Results
    • Data Inventory
    • Resource Explorer
    • Object Explorer
    • Exposure Evaluation
  • Assess Data Policies and Alerts
    • Data policy vs data pattern
    • Alerts
  • Define data security scan settings
    • Scan configuration
    • Data profile and pattern
    • File extensions
    • Snippet masking


Fees Structure : 15500 INR / 185 USD
Total No of Class : 152 Video Class
Class Duration : 109:30 Working Hours
Download Feature : Download Avalable
Technical Support : Call / Whatsapp : +91 8680961847
Working Hours : Monday to Firday 9 AM to 6 PM
Payment Mode : Credit Card / Debit Card / NetBanking / Wallet (Gpay/Phonepay/Paytm/WhatsApp Pay)

Brochure       Buy Now       Sample Demo

Fees Structure : 22500 INR / 270 USD
Class Duration : 60 Days
Class Recording : Live Class Recording available
Class Time : Monday to Firday 1.5 hours per day / Weekend 3 Hours per day
Technical Support : Call / Whatsapp : +91 8680961847
Working Hours : Monday to Firday 9 AM to 6 PM
Payment Mode : Credit Card / Debit Card / NetBanking / Wallet (Gpay/Phonepay/Paytm/WhatsApp Pay)

Download Brochure       Pay Online