Login     Signup
   info@zetlantechnologies.com        +91-8680961847

  /   PaloAlto Certification   /   PaloAlto Network Security Administrator

Palo Alto Networks Certified


Network Security Administrator (PCNSA)


Validates the knowledge and skills required of network security administrators who operate and manage Palo Alto Networks Next-Generation Firewalls





Objectives

This certification validates the knowledge, understanding, and skills required to operate the Palo Alto Networks firewall to protect networks from cutting-edge cyberthreats.


Target Audience

This certification is designed for security administrators responsible for operating and managing the Palo Alto Networks network security product portfolio.


Recommended Prerequisites



Course Details

1. Device Management and Services

  • Demonstrate knowledge of firewall management interfaces
    • Management interfaces
    • Methods of access
    • Access restrictions
    • Identity-management traffic flow
    • Management services
    • Service routes
  • Provision local administrators
    • Authentication profile
    • Authentication sequence
  • Assign role-based authentication
  • Maintain firewall configurations
    • Running configuration
    • Candidate configuration
    • Discern when to use load, save, import, and export
    • Differentiate between configuration states
    • Back up Panorama configurations and firewalls from Panorama
  • Push policy updates to Panorama-managed firewalls
    • Device groups and hierarchy
    • Where to place policies
    • Implications of Panorama management
    • Impact of templates, template stacks, and hierarchy
  • Schedule and install dynamic updates
    • From Panorama
    • From the firewall
    • Scheduling and staggering updates on an HA pair
  • Create and apply security zones to policies
    • Identify zone types
    • External types
    • Layer 2
    • Layer 3
    • TAP
    • Wire
    • Tunnel
  • Identify and configure firewall interfaces
    • Different types of interfaces
    • How interface types affect Security policies
  • Maintain and enhance the configuration of a virtual or logical router
    • Steps to create a static route
    • How to use the routing table
    • What interface types can be added to a virtual or logical router
    • How to configure route monitoring

  • Create and maintain address and address group objects
    • How to tag objects
    • Differentiate between address objects
    • Static groups versus dynamic groups
  • Create and maintain services and service groups
  • Create and maintain external dynamic lists
  • Configure and maintain application filters and application groups
    • When to use filters versus groups
    • The purpose of application characteristics as defined in the App-ID database

  • Develop the appropriate application-based Security policy
    • Create an appropriate App-ID rule
    • Rule shadowing
    • Group rules by tag
    • The potential impact of App-ID updates to existing Security policy rules
    • Policy usage statistics
  • Differentiate specific security rule types
    • Interzone
    • Intrazone
    • Universal
  • Configure Security policy match conditions, actions, and logging options
    • Application filters and groups
    • Logging options
    • App-ID
    • User-ID
    • Device-ID
    • Application filter in policy
    • Application group in policy
    • EDLs
  • Identify and implement proper NAT policies
    • Destination
    • Source
  • Optimize Security policies using appropriate tools
    • Policy test match tool
    • Policy Optimizer

  • Compare and contrast different types of Security profiles
    • Antivirus
    • Anti-Spyware
    • Vulnerability Protection
    • URL Filtering
    • Wild Fire Analysis
  • Create, modify, add, and apply the appropriate Security profiles and groups
    • Antivirus
    • Anti-Spyware
    • Vulnerability Protection
    • URL Filtering
    • Wild Fire Analysis
    • Configure threat prevention policy
  • Differentiate between Security profile actions
  • Use information available in logs
    • Traffic
    • Threat
    • Data
    • System logs
  • Enable DNS Security to control traffic based on domains
    • Configure DNS Security
    • Apply DNS Security in policy
  • Create and deploy URL-filtering-based controls
    • Apply a URL profile in a Security policy
    • Create a URL Filtering profile
    • Create a custom URL category
    • Control traffic based on a URL category
    • Why a URL was blocked
    • How to allow a blocked URL
    • How to request a URL recategorization
  • Differentiate between group mapping and IP-to-user mapping within policies and logs
    • How to control access to specific locations
    • How to apply to specific policies
    • Identify users within the ACC and the monitor tab


Fees Structure : 15500 INR / 185 USD
Total No of Class : 91 Video Class
Class Duration : 84:30 Working Hours
Download Feature : Download Avalable
Technical Support : Call / Whatsapp : +91 8680961847
Working Hours : Monday to Firday 9 AM to 6 PM
Payment Mode : Credit Card / Debit Card / NetBanking / Wallet (Gpay/Phonepay/Paytm/WhatsApp Pay)

Brochure       Buy Now       Sample Demo

Fees Structure : 22500 INR / 270 USD
Class Duration : 60 Days
Class Recording : Live Class Recording available
Class Time : Monday to Firday 1.5 hours per day / Weekend 3 Hours per day
Technical Support : Call / Whatsapp : +91 8680961847
Working Hours : Monday to Firday 9 AM to 6 PM
Payment Mode : Credit Card / Debit Card / NetBanking / Wallet (Gpay/Phonepay/Paytm/WhatsApp Pay)

Download Brochure       Pay Online