Implementing and Managing Palo Alto Next Generation Firewalls

Photo unavailable
Category:
Date:
05/11/23 at 6:57pm GMT+1
Submitter:
Seeders:
4
Leechers:
1
File size:
2.2 GB in 99 files

Torrent Status:
  This torrent has been verified.

Infohash:
38eb962f3f3c77541ad062366fbde605e633e45d


File list

  • Implementing and Managing Palo Alto Next Generation Firewalls
  • icon 1/1. Course Overview/1. Course Overview.mp4 3 MB
    icon 1/1. Course Overview/1. Course Overview.srt 2.3 KB
    icon 1/2. Understand How Palo Alto Networks Products Work Together/1. Course Introduction and Legacy Firewall Overview.mp4 11.9 MB
    icon 1/2. Understand How Palo Alto Networks Products Work Together/1. Course Introduction and Legacy Firewall Overview.srt 12.6 KB
    icon 1/2. Understand How Palo Alto Networks Products Work Together/2. Next-generation Firewall Overview.mp4 4.9 MB
    icon 1/2. Understand How Palo Alto Networks Products Work Together/2. Next-generation Firewall Overview.srt 6.1 KB
    icon 1/2. Understand How Palo Alto Networks Products Work Together/3. Strata- Palo Alto Networks_ Next-generation Firewall.mp4 8.9 MB
    icon 1/2. Understand How Palo Alto Networks Products Work Together/3. Strata- Palo Alto Networks_ Next-generation Firewall.srt 10.6 KB
    icon 1/2. Understand How Palo Alto Networks Products Work Together/4. Network Diagram.mp4 11.5 MB
    icon 1/2. Understand How Palo Alto Networks Products Work Together/4. Network Diagram.srt 7.1 KB
    icon 1/2. Understand How Palo Alto Networks Products Work Together/5. Strata- Panorama and Security Subscriptions.mp4 9.8 MB
    icon 1/2. Understand How Palo Alto Networks Products Work Together/5. Strata- Panorama and Security Subscriptions.srt 10 KB
    icon 1/2. Understand How Palo Alto Networks Products Work Together/6. Prisma and Cortex Product Lines.mp4 4 MB
    icon 1/2. Understand How Palo Alto Networks Products Work Together/6. Prisma and Cortex Product Lines.srt 5.2 KB
    icon 1/3. Initialize and License the Palo Alto Firewall/1. Initializing the Palo Alto Firewall.mp4 11.9 MB
    icon 1/3. Initialize and License the Palo Alto Firewall/1. Initializing the Palo Alto Firewall.srt 10 KB
    icon 1/3. Initialize and License the Palo Alto Firewall/2. GUI Overview and Management Settings.mp4 23.7 MB
    icon 1/3. Initialize and License the Palo Alto Firewall/2. GUI Overview and Management Settings.srt 15.9 KB
    icon 1/3. Initialize and License the Palo Alto Firewall/3. Licensing the Firewall.mp4 19.5 MB
    icon 1/3. Initialize and License the Palo Alto Firewall/3. Licensing the Firewall.srt 14 KB
    icon 1/3. Initialize and License the Palo Alto Firewall/4. Configuration Management.mp4 13.9 MB
    icon 1/3. Initialize and License the Palo Alto Firewall/4. Configuration Management.srt 11.1 KB
    icon 1/4. Administer the Palo Alto Firewall/1. Authentication Servers, Profiles, and Sequences.mp4 9.5 MB
    icon 1/4. Administer the Palo Alto Firewall/1. Authentication Servers, Profiles, and Sequences.srt 8 KB
    icon 1/4. Administer the Palo Alto Firewall/2. Configure Authentication Profiles.mp4 8.2 MB
    icon 1/4. Administer the Palo Alto Firewall/2. Configure Authentication Profiles.srt 6 KB
    icon 1/4. Administer the Palo Alto Firewall/3. Admin Roles and Administrator Accounts.mp4 4.6 MB
    icon 1/4. Administer the Palo Alto Firewall/3. Admin Roles and Administrator Accounts.srt 6.7 KB
    icon 1/4. Administer the Palo Alto Firewall/4. Configure Administrative Accounts.mp4 18 MB
    icon 1/4. Administer the Palo Alto Firewall/4. Configure Administrative Accounts.srt 14.2 KB
    icon 1/4. Administer the Palo Alto Firewall/5. Verify and Troubleshoot Administrator Login.mp4 9.4 MB
    icon 1/4. Administer the Palo Alto Firewall/5. Verify and Troubleshoot Administrator Login.srt 5.5 KB
    icon 1/4. Administer the Palo Alto Firewall/6. Admin Level Commit.mp4 7.8 MB
    icon 1/4. Administer the Palo Alto Firewall/6. Admin Level Commit.srt 4.9 KB
    icon 1/5. Update the Palo Alto Firewall/1. Potential Downfalls of Upgrading Content on a Palo Alto Firewall.mp4 8.3 MB
    icon 1/5. Update the Palo Alto Firewall/1. Potential Downfalls of Upgrading Content on a Palo Alto Firewall.srt 9.2 KB
    icon 1/5. Update the Palo Alto Firewall/2. Updating Content ID.mp4 23 MB
    icon 1/5. Update the Palo Alto Firewall/2. Updating Content ID.srt 13.8 KB
    icon 1/5. Update the Palo Alto Firewall/3. Upgrading the PAN OS on a Standalone Firewall.mp4 30.2 MB
    icon 1/5. Update the Palo Alto Firewall/3. Upgrading the PAN OS on a Standalone Firewall.srt 14.1 KB
    icon 1/6. Configure Security Zones and Layer 3 Interfaces/1. Deployment Methods (Interface Types).mp4 12.2 MB
    icon 1/6. Configure Security Zones and Layer 3 Interfaces/1. Deployment Methods (Interface Types).srt 11.2 KB
    icon 1/6. Configure Security Zones and Layer 3 Interfaces/2. Configuring Security Zones.mp4 27.3 MB
    icon 1/6. Configure Security Zones and Layer 3 Interfaces/2. Configuring Security Zones.srt 19.2 KB
    icon 1/6. Configure Security Zones and Layer 3 Interfaces/3. Configuring Layer 3 Interfaces and Interface Management Profiles.mp4 20.8 MB
    icon 1/6. Configure Security Zones and Layer 3 Interfaces/3. Configuring Layer 3 Interfaces and Interface Management Profiles.srt 14.5 KB
    icon 1/6. Configure Security Zones and Layer 3 Interfaces/4. Virtual Router Overview.mp4 7.7 MB
    icon 1/6. Configure Security Zones and Layer 3 Interfaces/4. Virtual Router Overview.srt 6.1 KB
    icon 1/6. Configure Security Zones and Layer 3 Interfaces/5. Configuring the Virtual Router to Use OSPF.mp4 13.4 MB
    icon 1/6. Configure Security Zones and Layer 3 Interfaces/5. Configuring the Virtual Router to Use OSPF.srt 9.4 KB
    icon 1/6. Configure Security Zones and Layer 3 Interfaces/6. Verifying OSPF.mp4 16.1 MB
    icon 1/6. Configure Security Zones and Layer 3 Interfaces/6. Verifying OSPF.srt 9.7 KB
    icon 1/7. Understand App-ID and Other Objects/1. App-ID Overview.mp4 9 MB
    icon 1/7. Understand App-ID and Other Objects/1. App-ID Overview.srt 8.5 KB
    icon 1/7. Understand App-ID and Other Objects/2. Applications, Application Filters, and Application Groups.mp4 28.1 MB
    icon 1/7. Understand App-ID and Other Objects/2. Applications, Application Filters, and Application Groups.srt 17.5 KB
    icon 1/7. Understand App-ID and Other Objects/3. Create Address Objects and Address Groups.mp4 12.4 MB
    icon 1/7. Understand App-ID and Other Objects/3. Create Address Objects and Address Groups.srt 10.5 KB
    icon 1/7. Understand App-ID and Other Objects/4. External Dyanmic Lists and Security Profiles.mp4 23.6 MB
    icon 1/7. Understand App-ID and Other Objects/4. External Dyanmic Lists and Security Profiles.srt 15 KB
    icon 1/7. Understand App-ID and Other Objects/5. Tags.mp4 12.2 MB
    icon 1/7. Understand App-ID and Other Objects/5. Tags.srt 8.5 KB
    icon 1/8. Shape Traffic Using Security Policy Rules/1. Security Policy Rules - Define the Matching Criteria.mp4 13.7 MB
    icon 1/8. Shape Traffic Using Security Policy Rules/1. Security Policy Rules - Define the Matching Criteria.srt 11.1 KB
    icon 1/8. Shape Traffic Using Security Policy Rules/2. Security Policy Rules - Define the Actions.mp4 5.7 MB
    icon 1/8. Shape Traffic Using Security Policy Rules/2. Security Policy Rules - Define the Actions.srt 5.8 KB
    icon 1/8. Shape Traffic Using Security Policy Rules/3. Create the First Security Rule.mp4 22.1 MB
    icon 1/8. Shape Traffic Using Security Policy Rules/3. Create the First Security Rule.srt 16.4 KB
    icon 1/8. Shape Traffic Using Security Policy Rules/4. Test the Initial Internet Gateway Policy.mp4 21.5 MB
    icon 1/8. Shape Traffic Using Security Policy Rules/4. Test the Initial Internet Gateway Policy.srt 11.5 KB
    icon 1/8. Shape Traffic Using Security Policy Rules/5. Allow Management Updates on a Dataplane Interface and Allow OOBM Access.mp4 19.1 MB
    icon 1/8. Shape Traffic Using Security Policy Rules/5. Allow Management Updates on a Dataplane Interface and Allow OOBM Access.srt 11.7 KB
    icon 1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/1. Internet Gateway Best Practice Security Rules.mp4 31.6 MB
    icon 1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/1. Internet Gateway Best Practice Security Rules.srt 21.3 KB
    icon 1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/2. Datacenter Best Practice Security Rules.mp4 24.4 MB
    icon 1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/2. Datacenter Best Practice Security Rules.srt 16.8 KB
    icon 1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/3. Monitor Applications and Optimize Policies.mp4 19 MB
    icon 1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/3. Monitor Applications and Optimize Policies.srt 10.8 KB
    icon 1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/4. Course Summary.mp4 6.7 MB
    icon 1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/4. Course Summary.srt 8.1 KB
    icon 2/1. Course Overview/1. Course Overview.mp4 3.6 MB
    icon 2/1. Course Overview/1. Course Overview.srt 2.4 KB
    icon 2/2. Changing IP Addresses Using Network Address Translation/1. Course Intro.mp4 3.8 MB
    icon 2/2. Changing IP Addresses Using Network Address Translation/1. Course Intro.srt 4.8 KB
    icon 2/2. Changing IP Addresses Using Network Address Translation/2. Overview of NAT and Why We Use It.mp4 5 MB
    icon 2/2. Changing IP Addresses Using Network Address Translation/2. Overview of NAT and Why We Use It.srt 6.8 KB
    icon 2/2. Changing IP Addresses Using Network Address Translation/3. Types of NAT You Can Configure.mp4 10.2 MB
    icon 2/2. Changing IP Addresses Using Network Address Translation/3. Types of NAT You Can Configure.srt 13 KB
    icon 2/2. Changing IP Addresses Using Network Address Translation/4. Flow Logic on the Palo Alto.mp4 9.6 MB
    icon 2/2. Changing IP Addresses Using Network Address Translation/4. Flow Logic on the Palo Alto.srt 9.1 KB
    icon 2/3. Configuring NAT on the Palo Alto Firewall/1. Introduction.mp4 6.9 MB
    icon 2/3. Configuring NAT on the Palo Alto Firewall/1. Introduction.srt 8.2 KB
    icon 2/3. Configuring NAT on the Palo Alto Firewall/2. Configuring Static Source NAT.mp4 18 MB
    icon 2/3. Configuring NAT on the Palo Alto Firewall/2. Configuring Static Source NAT.srt 15.3 KB
    icon 2/3. Configuring NAT on the Palo Alto Firewall/3. Verifying NAT.mp4 9.4 MB
    icon 2/3. Configuring NAT on the Palo Alto Firewall/3. Verifying NAT.srt 6 KB
    icon 2/3. Configuring NAT on the Palo Alto Firewall/4. Configuring Dynamic NAT And DIPP.mp4 12 MB
    icon 2/3. Configuring NAT on the Palo Alto Firewall/4. Configuring Dynamic NAT And DIPP.srt 9.7 KB
    icon 2/3. Configuring NAT on the Palo Alto Firewall/5. Configuring Destination NAT.mp4 23.4 MB

Similar Torrents