Firewall Essentials: Configuration and Management

Master the art of managing Palo Alto Networks next-generation firewalls with our expert-led Firewall Essentials: Configuration and Management course, designed specifically for security professionals seeking to enhance their skills in threat prevention and network safety.

Course Thumbnail

Essential Skills Gained

Checkmark

Configure and manage Palo Alto Networks next-generation firewalls.

Checkmark

Implement Security and NAT policies for regulated traffic flow.

Checkmark

Develop Threat Prevention strategies against known and unknown threats.

Checkmark

Monitor network traffic using advanced interfaces and reporting tools.

Format

  • Instructor-led
  • 5 days with lectures and hands-on labs.

Audience

  • Security Engineers
  • Security Administrators
  • Security Operations Specialists
  • Security Analysts and Support Staff

Description

The Palo Alto Networks Firewall 10.2 Essentials: Configuration and Management (EDU-210) course is five days of instructor-led training that will help you to:

  • Configure and manage the essential features of Palo Alto Networks next-generation firewalls
  • Configure and manage Security and NAT policies to enable approved traffic to and from zones
  • Configure and manage Threat Prevention strategies to block traffic from known and unknown IP addresses, domains, and URLs
  • Monitor network traffic using the interactive web interface and firewall reports

Calendar icon

Upcoming Course Dates

July 7-11, 2025

9:00 AM - 5:00 PM

Virtual: Online - US/Eastern

Guaranteed to Run

Enroll

$4995

August 18-22, 2025

9:00 AM - 5:00 PM

Virtual: Online - America/Chicago

Enroll

$4995

September 15-16, 2025

9:00 AM - 5:00 PM

Virtual: Online - America/Los_Angeles

Enroll

$4995

Course Outline

Download PDF

Palo Alto Networks Portfolio and Architecture

Configuring Initial Firewall Settings

Managing Firewall Configurations

Managing Firewall Administrator Accounts

Connecting the Firewall to Production Networks with Security Zones

Creating and Managing Security Policy Rules

Creating and Managing NAT Policy Rules

Controlling Application Usage with App-ID

Blocking Known Threats Using Security Profiles

Blocking Inappropriate Web Traffic with URL Filtering

Blocking Unknown Threats with Wildfire

Controlling Access to Network Resources with User-ID

Using Decryption to Block Threats in Encrypted Traffic

Locating Valuable Information Using Logs and Reports

What's Next in Your Training and Certification Journey

Appendix A - Securing Endpoints with GlobalProtect

Appendix B – Providing Firewall Redundancy with High Availability

Appendix C - Connecting Remotes Sites using VPNs

Appendix D – Configuring User-ID Windows Agent

Your Team has Unique Training Needs.

Your team deserves training as unique as they are.

Let us tailor the course to your needs at no extra cost.