Information
  The Palo Alto Networks Firewall Essentials: Configuration and Management (EDU-210) course is five days of instructor-led training that will help you to:
- Configure and manage the essential features of Palo Alto Networks next-generation firewalls
 - Configure and manage Security and NAT policies to enable approved traffic to and from zones
 - Configure and manage Threat Prevention strategies to block traffic from known and unknown IP addresses, domains, and URLs
 - Monitor network traffic using the interactive web interface and firewall reports
 
Objectives 
Successful completion of this five-day, instructor-led course should enhance the student’s understanding of how to configure and manage Palo Alto Networks Next-Generation Firewalls. The course includes hands-on experience configuring, managing, and monitoring a firewall in a lab environment.
Target Audience 
- Security Engineers
 - Security Administrators
 - Security Operations Specialists
 - Security Analysts
 - Support Staff 
 
Prerequisites 
- Participants must be familiar with networking concepts, including routing, switching, and IP addressing.
 - Participants also should be familiar with basic security concepts.
 - Experience with other security technologies (IPS, proxy, and content filtering) is a plus. 
 
Scope
- Level: Introductory
 - Duration: 5 days
 - Format: Lecture and hands-on labs
 - Platform support: Palo Alto Networks next-generation firewalls running the PAN-OS® 11.1 operating system 
 
Course Modules
- - Palo Alto Networks Portfolio and Architecture
 - - Configuring Initial Firewall Settings
 - - Managing Firewall Configurations
 - - Managing Firewall Administrator Accounts
 - - Connecting the Firewall to Production Networks with Security Zones
 - - Creating and Managing Security Policy Rules
 - - Creating and Managing NAT Policy Rules
 - - Controlling Application Usage with App-ID
 - - Blocking Known Threats Using Security Profiles
 - - Blocking Inappropriate Web Traffic with URL Filtering
 - - Blocking Unknown Threats with Wildfire
 - - Controlling Access to Network Resources with User-ID
 - - Using Decryption to Block Threats in Encrypted Traffic
 - - Locating Valuable Information Using Logs and Reports
 - - What's Next in Your Training and Certification Journey
 
Supplemental Materials
- Securing Endpoints with GlobalProtect
 - Providing Firewall Redundancy with High Availability
 - Connecting Remotes Sites using VPNs
 - Blocking Common Attacks Using Zone Protection