Create Tool:
Create Time:1970-01-01 08:00:00
File Size:2.25 GB
File Count:352
File Hash:38eb962f3f3c77541ad062366fbde605e633e45d
1/1. Course Overview/1. Course Overview.mp4 | 2.96 MB |
1/1. Course Overview/1. Course Overview.srt | 2.29 KB |
1/2. Understand How Palo Alto Networks Products Work Together/1. Course Introduction and Legacy Firewall Overview.mp4 | 11.87 MB |
1/2. Understand How Palo Alto Networks Products Work Together/1. Course Introduction and Legacy Firewall Overview.srt | 12.61 KB |
1/2. Understand How Palo Alto Networks Products Work Together/2. Next-generation Firewall Overview.mp4 | 4.88 MB |
1/2. Understand How Palo Alto Networks Products Work Together/2. Next-generation Firewall Overview.srt | 6.12 KB |
1/2. Understand How Palo Alto Networks Products Work Together/3. Strata- Palo Alto Networks_ Next-generation Firewall.mp4 | 8.95 MB |
1/2. Understand How Palo Alto Networks Products Work Together/3. Strata- Palo Alto Networks_ Next-generation Firewall.srt | 10.64 KB |
1/2. Understand How Palo Alto Networks Products Work Together/4. Network Diagram.mp4 | 11.47 MB |
1/2. Understand How Palo Alto Networks Products Work Together/4. Network Diagram.srt | 7.08 KB |
1/2. Understand How Palo Alto Networks Products Work Together/5. Strata- Panorama and Security Subscriptions.mp4 | 9.83 MB |
1/2. Understand How Palo Alto Networks Products Work Together/5. Strata- Panorama and Security Subscriptions.srt | 10.00 KB |
1/2. Understand How Palo Alto Networks Products Work Together/6. Prisma and Cortex Product Lines.mp4 | 3.96 MB |
1/2. Understand How Palo Alto Networks Products Work Together/6. Prisma and Cortex Product Lines.srt | 5.21 KB |
1/3. Initialize and License the Palo Alto Firewall/1. Initializing the Palo Alto Firewall.mp4 | 11.95 MB |
1/3. Initialize and License the Palo Alto Firewall/1. Initializing the Palo Alto Firewall.srt | 10.01 KB |
1/3. Initialize and License the Palo Alto Firewall/2. GUI Overview and Management Settings.mp4 | 23.73 MB |
1/3. Initialize and License the Palo Alto Firewall/2. GUI Overview and Management Settings.srt | 15.92 KB |
1/3. Initialize and License the Palo Alto Firewall/3. Licensing the Firewall.mp4 | 19.45 MB |
1/3. Initialize and License the Palo Alto Firewall/3. Licensing the Firewall.srt | 13.99 KB |
1/3. Initialize and License the Palo Alto Firewall/4. Configuration Management.mp4 | 13.93 MB |
1/3. Initialize and License the Palo Alto Firewall/4. Configuration Management.srt | 11.08 KB |
1/4. Administer the Palo Alto Firewall/1. Authentication Servers, Profiles, and Sequences.mp4 | 9.52 MB |
1/4. Administer the Palo Alto Firewall/1. Authentication Servers, Profiles, and Sequences.srt | 7.98 KB |
1/4. Administer the Palo Alto Firewall/2. Configure Authentication Profiles.mp4 | 8.16 MB |
1/4. Administer the Palo Alto Firewall/2. Configure Authentication Profiles.srt | 6.01 KB |
1/4. Administer the Palo Alto Firewall/3. Admin Roles and Administrator Accounts.mp4 | 4.57 MB |
1/4. Administer the Palo Alto Firewall/3. Admin Roles and Administrator Accounts.srt | 6.66 KB |
1/4. Administer the Palo Alto Firewall/4. Configure Administrative Accounts.mp4 | 18.02 MB |
1/4. Administer the Palo Alto Firewall/4. Configure Administrative Accounts.srt | 14.15 KB |
1/4. Administer the Palo Alto Firewall/5. Verify and Troubleshoot Administrator Login.mp4 | 9.43 MB |
1/4. Administer the Palo Alto Firewall/5. Verify and Troubleshoot Administrator Login.srt | 5.46 KB |
1/4. Administer the Palo Alto Firewall/6. Admin Level Commit.mp4 | 7.83 MB |
1/4. Administer the Palo Alto Firewall/6. Admin Level Commit.srt | 4.93 KB |
1/5. Update the Palo Alto Firewall/1. Potential Downfalls of Upgrading Content on a Palo Alto Firewall.mp4 | 8.28 MB |
1/5. Update the Palo Alto Firewall/1. Potential Downfalls of Upgrading Content on a Palo Alto Firewall.srt | 9.16 KB |
1/5. Update the Palo Alto Firewall/2. Updating Content ID.mp4 | 22.96 MB |
1/5. Update the Palo Alto Firewall/2. Updating Content ID.srt | 13.78 KB |
1/5. Update the Palo Alto Firewall/3. Upgrading the PAN OS on a Standalone Firewall.mp4 | 30.22 MB |
1/5. Update the Palo Alto Firewall/3. Upgrading the PAN OS on a Standalone Firewall.srt | 14.06 KB |
1/6. Configure Security Zones and Layer 3 Interfaces/1. Deployment Methods (Interface Types).mp4 | 12.22 MB |
1/6. Configure Security Zones and Layer 3 Interfaces/1. Deployment Methods (Interface Types).srt | 11.15 KB |
1/6. Configure Security Zones and Layer 3 Interfaces/2. Configuring Security Zones.mp4 | 27.33 MB |
1/6. Configure Security Zones and Layer 3 Interfaces/2. Configuring Security Zones.srt | 19.19 KB |
1/6. Configure Security Zones and Layer 3 Interfaces/3. Configuring Layer 3 Interfaces and Interface Management Profiles.mp4 | 20.82 MB |
1/6. Configure Security Zones and Layer 3 Interfaces/3. Configuring Layer 3 Interfaces and Interface Management Profiles.srt | 14.53 KB |
1/6. Configure Security Zones and Layer 3 Interfaces/4. Virtual Router Overview.mp4 | 7.66 MB |
1/6. Configure Security Zones and Layer 3 Interfaces/4. Virtual Router Overview.srt | 6.14 KB |
1/6. Configure Security Zones and Layer 3 Interfaces/5. Configuring the Virtual Router to Use OSPF.mp4 | 13.37 MB |
1/6. Configure Security Zones and Layer 3 Interfaces/5. Configuring the Virtual Router to Use OSPF.srt | 9.43 KB |
1/6. Configure Security Zones and Layer 3 Interfaces/6. Verifying OSPF.mp4 | 16.05 MB |
1/6. Configure Security Zones and Layer 3 Interfaces/6. Verifying OSPF.srt | 9.68 KB |
1/7. Understand App-ID and Other Objects/1. App-ID Overview.mp4 | 8.96 MB |
1/7. Understand App-ID and Other Objects/1. App-ID Overview.srt | 8.50 KB |
1/7. Understand App-ID and Other Objects/2. Applications, Application Filters, and Application Groups.mp4 | 28.10 MB |
1/7. Understand App-ID and Other Objects/2. Applications, Application Filters, and Application Groups.srt | 17.53 KB |
1/7. Understand App-ID and Other Objects/3. Create Address Objects and Address Groups.mp4 | 12.43 MB |
1/7. Understand App-ID and Other Objects/3. Create Address Objects and Address Groups.srt | 10.49 KB |
1/7. Understand App-ID and Other Objects/4. External Dyanmic Lists and Security Profiles.mp4 | 23.65 MB |
1/7. Understand App-ID and Other Objects/4. External Dyanmic Lists and Security Profiles.srt | 14.99 KB |
1/7. Understand App-ID and Other Objects/5. Tags.mp4 | 12.19 MB |
1/7. Understand App-ID and Other Objects/5. Tags.srt | 8.46 KB |
1/8. Shape Traffic Using Security Policy Rules/1. Security Policy Rules - Define the Matching Criteria.mp4 | 13.70 MB |
1/8. Shape Traffic Using Security Policy Rules/1. Security Policy Rules - Define the Matching Criteria.srt | 11.12 KB |
1/8. Shape Traffic Using Security Policy Rules/2. Security Policy Rules - Define the Actions.mp4 | 5.66 MB |
1/8. Shape Traffic Using Security Policy Rules/2. Security Policy Rules - Define the Actions.srt | 5.82 KB |
1/8. Shape Traffic Using Security Policy Rules/3. Create the First Security Rule.mp4 | 22.13 MB |
1/8. Shape Traffic Using Security Policy Rules/3. Create the First Security Rule.srt | 16.38 KB |
1/8. Shape Traffic Using Security Policy Rules/4. Test the Initial Internet Gateway Policy.mp4 | 21.52 MB |
1/8. Shape Traffic Using Security Policy Rules/4. Test the Initial Internet Gateway Policy.srt | 11.47 KB |
1/8. Shape Traffic Using Security Policy Rules/5. Allow Management Updates on a Dataplane Interface and Allow OOBM Access.mp4 | 19.13 MB |
1/8. Shape Traffic Using Security Policy Rules/5. Allow Management Updates on a Dataplane Interface and Allow OOBM Access.srt | 11.72 KB |
1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/1. Internet Gateway Best Practice Security Rules.mp4 | 31.59 MB |
1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/1. Internet Gateway Best Practice Security Rules.srt | 21.31 KB |
1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/2. Datacenter Best Practice Security Rules.mp4 | 24.42 MB |
1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/2. Datacenter Best Practice Security Rules.srt | 16.83 KB |
1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/3. Monitor Applications and Optimize Policies.mp4 | 19.00 MB |
1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/3. Monitor Applications and Optimize Policies.srt | 10.84 KB |
1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/4. Course Summary.mp4 | 6.74 MB |
1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/4. Course Summary.srt | 8.09 KB |
2/1. Course Overview/1. Course Overview.mp4 | 3.65 MB |
2/1. Course Overview/1. Course Overview.srt | 2.38 KB |
2/2. Changing IP Addresses Using Network Address Translation/1. Course Intro.mp4 | 3.77 MB |
2/2. Changing IP Addresses Using Network Address Translation/1. Course Intro.srt | 4.80 KB |
2/2. Changing IP Addresses Using Network Address Translation/2. Overview of NAT and Why We Use It.mp4 | 5.04 MB |
2/2. Changing IP Addresses Using Network Address Translation/2. Overview of NAT and Why We Use It.srt | 6.83 KB |
2/2. Changing IP Addresses Using Network Address Translation/3. Types of NAT You Can Configure.mp4 | 10.23 MB |
2/2. Changing IP Addresses Using Network Address Translation/3. Types of NAT You Can Configure.srt | 12.96 KB |
2/2. Changing IP Addresses Using Network Address Translation/4. Flow Logic on the Palo Alto.mp4 | 9.58 MB |
2/2. Changing IP Addresses Using Network Address Translation/4. Flow Logic on the Palo Alto.srt | 9.10 KB |
2/3. Configuring NAT on the Palo Alto Firewall/1. Introduction.mp4 | 6.87 MB |
2/3. Configuring NAT on the Palo Alto Firewall/1. Introduction.srt | 8.17 KB |
2/3. Configuring NAT on the Palo Alto Firewall/2. Configuring Static Source NAT.mp4 | 17.99 MB |
2/3. Configuring NAT on the Palo Alto Firewall/2. Configuring Static Source NAT.srt | 15.26 KB |
2/3. Configuring NAT on the Palo Alto Firewall/3. Verifying NAT.mp4 | 9.39 MB |
2/3. Configuring NAT on the Palo Alto Firewall/3. Verifying NAT.srt | 5.97 KB |
2/3. Configuring NAT on the Palo Alto Firewall/4. Configuring Dynamic NAT And DIPP.mp4 | 12.00 MB |
2/3. Configuring NAT on the Palo Alto Firewall/4. Configuring Dynamic NAT And DIPP.srt | 9.66 KB |
2/3. Configuring NAT on the Palo Alto Firewall/5. Configuring Destination NAT.mp4 | 23.37 MB |
2/3. Configuring NAT on the Palo Alto Firewall/5. Configuring Destination NAT.srt | 16.75 KB |
2/3. Configuring NAT on the Palo Alto Firewall/6. Verifying NAT, Part II.mp4 | 13.50 MB |
2/3. Configuring NAT on the Palo Alto Firewall/6. Verifying NAT, Part II.srt | 8.06 KB |
2/3. Configuring NAT on the Palo Alto Firewall/7. Configuring U-turn NAT and No-NAT.mp4 | 20.76 MB |
2/3. Configuring NAT on the Palo Alto Firewall/7. Configuring U-turn NAT and No-NAT.srt | 12.17 KB |
2/3. Configuring NAT on the Palo Alto Firewall/8. Bidirectional NAT.mp4 | 4.53 MB |
2/3. Configuring NAT on the Palo Alto Firewall/8. Bidirectional NAT.srt | 5.42 KB |
2/4. Understanding the Concepts of VPNs/1. Introduction.mp4 | 960.40 KB |
2/4. Understanding the Concepts of VPNs/1. Introduction.srt | 1.38 KB |
2/4. Understanding the Concepts of VPNs/2. VPN Basics.mp4 | 2.70 MB |
2/4. Understanding the Concepts of VPNs/2. VPN Basics.srt | 4.26 KB |
2/4. Understanding the Concepts of VPNs/3. IKE VPNs Using IPSec.mp4 | 8.31 MB |
2/4. Understanding the Concepts of VPNs/3. IKE VPNs Using IPSec.srt | 12.93 KB |
2/4. Understanding the Concepts of VPNs/4. SSL VPNs.mp4 | 3.15 MB |
2/4. Understanding the Concepts of VPNs/4. SSL VPNs.srt | 5.88 KB |
2/4. Understanding the Concepts of VPNs/5. Route Base vs Policy Based VPNs.mp4 | 3.67 MB |
2/4. Understanding the Concepts of VPNs/5. Route Base vs Policy Based VPNs.srt | 5.88 KB |
2/5. Configuring S2S VPNs on the Palo Alto Firewall/1. Introduction.mp4 | 1.30 MB |
2/5. Configuring S2S VPNs on the Palo Alto Firewall/1. Introduction.srt | 1.98 KB |
2/5. Configuring S2S VPNs on the Palo Alto Firewall/2. Configuring a Site to Site VPN Overview.mp4 | 2.44 MB |
2/5. Configuring S2S VPNs on the Palo Alto Firewall/2. Configuring a Site to Site VPN Overview.srt | 3.00 KB |
2/5. Configuring S2S VPNs on the Palo Alto Firewall/3. Configuring a Site to Site VPN with a Palo Alto Firewall.mp4 | 21.63 MB |
2/5. Configuring S2S VPNs on the Palo Alto Firewall/3. Configuring a Site to Site VPN with a Palo Alto Firewall.srt | 15.19 KB |
2/5. Configuring S2S VPNs on the Palo Alto Firewall/4. Using Certificates with Site to Site VPNs.mp4 | 9.53 MB |
2/5. Configuring S2S VPNs on the Palo Alto Firewall/4. Using Certificates with Site to Site VPNs.srt | 7.17 KB |
2/5. Configuring S2S VPNs on the Palo Alto Firewall/5. Configuring a Site to Site with a Cisco IOS Router.mp4 | 15.46 MB |
2/5. Configuring S2S VPNs on the Palo Alto Firewall/5. Configuring a Site to Site with a Cisco IOS Router.srt | 9.22 KB |
2/5. Configuring S2S VPNs on the Palo Alto Firewall/6. Troubleshooting Site to Site VPNs.mp4 | 21.73 MB |
2/5. Configuring S2S VPNs on the Palo Alto Firewall/6. Troubleshooting Site to Site VPNs.srt | 13.11 KB |
2/6. Using Global Connect to Configure Remote Access VPNs/1. Introduction.mp4 | 1.65 MB |
2/6. Using Global Connect to Configure Remote Access VPNs/1. Introduction.srt | 2.22 KB |
2/6. Using Global Connect to Configure Remote Access VPNs/2. Global Protect Overview and Components.mp4 | 5.28 MB |
2/6. Using Global Connect to Configure Remote Access VPNs/2. Global Protect Overview and Components.srt | 7.63 KB |
2/6. Using Global Connect to Configure Remote Access VPNs/3. Configuring GlobalProtect Prerequisites.mp4 | 8.87 MB |
2/6. Using Global Connect to Configure Remote Access VPNs/3. Configuring GlobalProtect Prerequisites.srt | 8.39 KB |
2/6. Using Global Connect to Configure Remote Access VPNs/4. Configuring GlobalProtect Gateways.mp4 | 21.46 MB |
2/6. Using Global Connect to Configure Remote Access VPNs/4. Configuring GlobalProtect Gateways.srt | 16.93 KB |
2/6. Using Global Connect to Configure Remote Access VPNs/5. Configuring GlobalProtect Portals.mp4 | 11.79 MB |
2/6. Using Global Connect to Configure Remote Access VPNs/5. Configuring GlobalProtect Portals.srt | 9.81 KB |
2/6. Using Global Connect to Configure Remote Access VPNs/6. Configuring Security Rules for GlobalProtect.mp4 | 7.11 MB |
2/6. Using Global Connect to Configure Remote Access VPNs/6. Configuring Security Rules for GlobalProtect.srt | 4.28 KB |
2/6. Using Global Connect to Configure Remote Access VPNs/7. Connecting a Client to the VPN Using the GlobalProtect App.mp4 | 16.08 MB |
2/6. Using Global Connect to Configure Remote Access VPNs/7. Connecting a Client to the VPN Using the GlobalProtect App.srt | 9.46 KB |
3/1. Course Overview/1. Course Overview.mp4 | 3.37 MB |
3/1. Course Overview/1. Course Overview.srt | 2.33 KB |
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/01. Course Intro.mp4 | 4.47 MB |
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/01. Course Intro.srt | 5.98 KB |
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/02. New Features in PAN-OS 9.0, Overview of the Network Diagram, and Content ID Introduction.mp4 | 8.02 MB |
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/02. New Features in PAN-OS 9.0, Overview of the Network Diagram, and Content ID Introduction.srt | 10.77 KB |
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/03. Configuring Antivirus.mp4 | 36.55 MB |
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/03. Configuring Antivirus.srt | 20.60 KB |
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/04. Configuring Anti-Spyware.mp4 | 11.71 MB |
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/04. Configuring Anti-Spyware.srt | 8.96 KB |
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/05. Configuring Vulnerability Protection.mp4 | 14.74 MB |
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/05. Configuring Vulnerability Protection.srt | 8.29 KB |
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/06. Configuring URL Filtering.mp4 | 21.07 MB |
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/06. Configuring URL Filtering.srt | 17.07 KB |
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/07. Configuring Data Filtering.mp4 | 16.99 MB |
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/07. Configuring Data Filtering.srt | 14.65 KB |
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/08. Configuring Zone Protection Profiles.mp4 | 21.50 MB |
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/08. Configuring Zone Protection Profiles.srt | 18.80 KB |
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/09. Configuring DoS Protection Profiles.mp4 | 14.80 MB |
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/09. Configuring DoS Protection Profiles.srt | 15.78 KB |
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/10. Best Practices.mp4 | 20.11 MB |
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/10. Best Practices.srt | 17.03 KB |
3/3. Integrating with WildFire® and AutoFocus™/1. Module Introduction _ Flow Logic.mp4 | 2.37 MB |
3/3. Integrating with WildFire® and AutoFocus™/1. Module Introduction _ Flow Logic.srt | 3.19 KB |
3/3. Integrating with WildFire® and AutoFocus™/2. WildFire® _ AutoFocus™ Overview.mp4 | 11.03 MB |
3/3. Integrating with WildFire® and AutoFocus™/2. WildFire® _ AutoFocus™ Overview.srt | 16.63 KB |
3/3. Integrating with WildFire® and AutoFocus™/3. Configuring WildFire® _ File Blocking.mp4 | 20.33 MB |
3/3. Integrating with WildFire® and AutoFocus™/3. Configuring WildFire® _ File Blocking.srt | 13.13 KB |
3/3. Integrating with WildFire® and AutoFocus™/4. Verifying File Blocking _ WildFire®.mp4 | 28.40 MB |
3/3. Integrating with WildFire® and AutoFocus™/4. Verifying File Blocking _ WildFire®.srt | 19.23 KB |
3/3. Integrating with WildFire® and AutoFocus™/5. Threat Vault _ WildFire® Portal.mp4 | 14.60 MB |
3/3. Integrating with WildFire® and AutoFocus™/5. Threat Vault _ WildFire® Portal.srt | 9.27 KB |
3/3. Integrating with WildFire® and AutoFocus™/6. Security Profile Groups _ Security Rule Audit Logs.mp4 | 10.47 MB |
3/3. Integrating with WildFire® and AutoFocus™/6. Security Profile Groups _ Security Rule Audit Logs.srt | 8.87 KB |
3/3. Integrating with WildFire® and AutoFocus™/7. Implementing AutoFocus.mp4 | 4.31 MB |
3/3. Integrating with WildFire® and AutoFocus™/7. Implementing AutoFocus.srt | 5.78 KB |
3/4. Joining the Enterprise PKI Infrastructure/1. Module Introduction.mp4 | 1.42 MB |
3/4. Joining the Enterprise PKI Infrastructure/1. Module Introduction.srt | 1.95 KB |
3/4. Joining the Enterprise PKI Infrastructure/2. Certificate Authorities, Certificate Signing Requests, and Public Key Infrastructure(1).mp4 | 6.19 MB |
3/4. Joining the Enterprise PKI Infrastructure/2. Certificate Authorities, Certificate Signing Requests, and Public Key Infrastructure(1).srt | 7.56 KB |
3/4. Joining the Enterprise PKI Infrastructure/2. Certificate Authorities, Certificate Signing Requests, and Public Key Infrastructure.mp4 | 6.19 MB |
3/4. Joining the Enterprise PKI Infrastructure/2. Certificate Authorities, Certificate Signing Requests, and Public Key Infrastructure.srt | 7.56 KB |
3/4. Joining the Enterprise PKI Infrastructure/3. Generating a CSR _ Installing a Certificate.mp4 | 16.26 MB |
3/4. Joining the Enterprise PKI Infrastructure/3. Generating a CSR _ Installing a Certificate.srt | 10.83 KB |
3/4. Joining the Enterprise PKI Infrastructure/4. Using a Certificate for Web Management Traffic.mp4 | 7.52 MB |
3/4. Joining the Enterprise PKI Infrastructure/4. Using a Certificate for Web Management Traffic.srt | 6.69 KB |
3/5. Decrypting Traffic on the Palo Alto Firewall/1. Module Introduction.mp4 | 3.11 MB |
3/5. Decrypting Traffic on the Palo Alto Firewall/1. Module Introduction.srt | 3.46 KB |
3/5. Decrypting Traffic on the Palo Alto Firewall/2. Palo Alto Firewall Decryption Overview.mp4 | 5.07 MB |
3/5. Decrypting Traffic on the Palo Alto Firewall/2. Palo Alto Firewall Decryption Overview.srt | 8.28 KB |
3/5. Decrypting Traffic on the Palo Alto Firewall/3. Decryption Rollout Strategy.mp4 | 6.77 MB |
3/5. Decrypting Traffic on the Palo Alto Firewall/3. Decryption Rollout Strategy.srt | 11.06 KB |
3/5. Decrypting Traffic on the Palo Alto Firewall/4. Configuring Forward Trust _ Untrust Certificates, and Understanding Response Pages(1).mp4 | 18.29 MB |
3/5. Decrypting Traffic on the Palo Alto Firewall/4. Configuring Forward Trust _ Untrust Certificates, and Understanding Response Pages(1).srt | 14.24 KB |
3/5. Decrypting Traffic on the Palo Alto Firewall/4. Configuring Forward Trust _ Untrust Certificates, and Understanding Response Pages.mp4 | 18.29 MB |
3/5. Decrypting Traffic on the Palo Alto Firewall/4. Configuring Forward Trust _ Untrust Certificates, and Understanding Response Pages.srt | 14.24 KB |
3/5. Decrypting Traffic on the Palo Alto Firewall/5. Configuring Decryption Profiles.mp4 | 5.72 MB |
3/5. Decrypting Traffic on the Palo Alto Firewall/5. Configuring Decryption Profiles.srt | 4.43 KB |
3/5. Decrypting Traffic on the Palo Alto Firewall/6. Configuring SSL Forward Proxy.mp4 | 21.73 MB |
3/5. Decrypting Traffic on the Palo Alto Firewall/6. Configuring SSL Forward Proxy.srt | 14.56 KB |
3/5. Decrypting Traffic on the Palo Alto Firewall/7. Configuring SSL Inbound Proxy, SSH Proxy, and Decyrption Mirroring(1).mp4 | 11.39 MB |
3/5. Decrypting Traffic on the Palo Alto Firewall/7. Configuring SSL Inbound Proxy, SSH Proxy, and Decyrption Mirroring(1).srt | 7.20 KB |
3/5. Decrypting Traffic on the Palo Alto Firewall/7. Configuring SSL Inbound Proxy, SSH Proxy, and Decyrption Mirroring.mp4 | 11.39 MB |
3/5. Decrypting Traffic on the Palo Alto Firewall/7. Configuring SSL Inbound Proxy, SSH Proxy, and Decyrption Mirroring.srt | 7.20 KB |
3/5. Decrypting Traffic on the Palo Alto Firewall/8. Decryption Broker Overview.mp4 | 5.61 MB |
3/5. Decrypting Traffic on the Palo Alto Firewall/8. Decryption Broker Overview.srt | 8.24 KB |
3/5. Decrypting Traffic on the Palo Alto Firewall/9. Course Wrap Up.mp4 | 3.13 MB |
3/5. Decrypting Traffic on the Palo Alto Firewall/9. Course Wrap Up.srt | 5.23 KB |
4/1. Course Overview/1. Course Overview.mp4 | 2.89 MB |
4/1. Course Overview/1. Course Overview.srt | 2.07 KB |
4/2. Implement High Availability/1. Palo Alto Firewalls_ High Availability.mp4 | 13.84 MB |
4/2. Implement High Availability/1. Palo Alto Firewalls_ High Availability.srt | 14.17 KB |
4/2. Implement High Availability/2. Palo Alto HA Modes and Link Types.mp4 | 11.54 MB |
4/2. Implement High Availability/2. Palo Alto HA Modes and Link Types.srt | 10.94 KB |
4/2. Implement High Availability/3. Globomantics HA Deployment.mp4 | 8.27 MB |
4/2. Implement High Availability/3. Globomantics HA Deployment.srt | 8.45 KB |
4/2. Implement High Availability/4. Demo- Configure Active-Passive HA on the Primary Firewall.mp4 | 19.10 MB |
4/2. Implement High Availability/4. Demo- Configure Active-Passive HA on the Primary Firewall.srt | 12.03 KB |
4/2. Implement High Availability/5. Demo- Configure Active-Passive HA on the Secondary Firewall.mp4 | 14.10 MB |
4/2. Implement High Availability/5. Demo- Configure Active-Passive HA on the Secondary Firewall.srt | 7.82 KB |
4/2. Implement High Availability/6. Demo- Verify that Active-Passive HA is Operational.mp4 | 13.65 MB |
4/2. Implement High Availability/6. Demo- Verify that Active-Passive HA is Operational.srt | 6.81 KB |
4/2. Implement High Availability/7. Demo- Tune the Failover Conditions for an Active-Passive Configuration.mp4 | 23.21 MB |
4/2. Implement High Availability/7. Demo- Tune the Failover Conditions for an Active-Passive Configuration.srt | 13.16 KB |
4/2. Implement High Availability/8. Active-Active HA Firewall Clustering.mp4 | 13.81 MB |
4/2. Implement High Availability/8. Active-Active HA Firewall Clustering.srt | 12.62 KB |
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/1. What Is Panorama-.mp4 | 10.88 MB |
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/1. What Is Panorama-.srt | 10.08 KB |
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/2. Demo- Panorama Overview.mp4 | 12.63 MB |
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/2. Demo- Panorama Overview.srt | 8.30 KB |
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/3. Templates and Template Stacks.mp4 | 10.45 MB |
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/3. Templates and Template Stacks.srt | 13.34 KB |
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/4. Demo- Create Templates and Template Stacks on Panorama.mp4 | 8.95 MB |
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/4. Demo- Create Templates and Template Stacks on Panorama.srt | 6.09 KB |
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/5. Demo- Add Values to Templates.mp4 | 13.39 MB |
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/5. Demo- Add Values to Templates.srt | 7.40 KB |
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/6. Demo- Add Firewalls to Templates.mp4 | 16.37 MB |
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/6. Demo- Add Firewalls to Templates.srt | 9.80 KB |
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/7. Panorama Template Variables.mp4 | 7.33 MB |
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/7. Panorama Template Variables.srt | 5.49 KB |
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/8. Demo- Configure Variables in Templates.mp4 | 18.49 MB |
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/8. Demo- Configure Variables in Templates.srt | 13.04 KB |
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/9. Demo- Push Panorama Configurations to Managed Firewalls.mp4 | 22.38 MB |
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/9. Demo- Push Panorama Configurations to Managed Firewalls.srt | 16.37 KB |
4/4. Implement Panorama Device Groups/1. Panorama Device Groups Overview.mp4 | 12.09 MB |
4/4. Implement Panorama Device Groups/1. Panorama Device Groups Overview.srt | 9.72 KB |
4/4. Implement Panorama Device Groups/2. Demo- Configure Device Groups On Panorama.mp4 | 18.95 MB |
4/4. Implement Panorama Device Groups/2. Demo- Configure Device Groups On Panorama.srt | 13.79 KB |
4/4. Implement Panorama Device Groups/3. Panorama Objects.mp4 | 4.17 MB |
4/4. Implement Panorama Device Groups/3. Panorama Objects.srt | 4.78 KB |
4/4. Implement Panorama Device Groups/4. Demo- Configure Objects In Device Groups.mp4 | 19.02 MB |
4/4. Implement Panorama Device Groups/4. Demo- Configure Objects In Device Groups.srt | 13.28 KB |
4/4. Implement Panorama Device Groups/5. Panorama Policies.mp4 | 2.91 MB |
4/4. Implement Panorama Device Groups/5. Panorama Policies.srt | 3.02 KB |
4/4. Implement Panorama Device Groups/6. Demo- Configure Policies in Device Groups.mp4 | 20.13 MB |
4/4. Implement Panorama Device Groups/6. Demo- Configure Policies in Device Groups.srt | 14.53 KB |
4/4. Implement Panorama Device Groups/7. Demo- Import Existing Firewall Configuration into Panorama.mp4 | 21.32 MB |
4/4. Implement Panorama Device Groups/7. Demo- Import Existing Firewall Configuration into Panorama.srt | 11.62 KB |
4/4. Implement Panorama Device Groups/8. Clean up Panorama after Firewall Imports and Push Configurations to Firewalls.mp4 | 20.53 MB |
4/4. Implement Panorama Device Groups/8. Clean up Panorama after Firewall Imports and Push Configurations to Firewalls.srt | 13.75 KB |
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/1. Panorama Log Collectors.mp4 | 4.96 MB |
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/1. Panorama Log Collectors.srt | 4.00 KB |
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/2. Demo- Configure a Log Collector on Panorama.mp4 | 11.35 MB |
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/2. Demo- Configure a Log Collector on Panorama.srt | 8.93 KB |
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/3. Demo- Using Panorama to View Logs from All Firewalls.mp4 | 17.73 MB |
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/3. Demo- Using Panorama to View Logs from All Firewalls.srt | 10.12 KB |
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/4. Demo- Testing Firewall Loggin Appears on Panorama.mp4 | 30.24 MB |
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/4. Demo- Testing Firewall Loggin Appears on Panorama.srt | 11.76 KB |
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/5. Demo- Using Panorama to Update Software on Firewalls.mp4 | 16.99 MB |
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/5. Demo- Using Panorama to Update Software on Firewalls.srt | 9.40 KB |
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/6. Demo- Explore Panorama_s Troubleshooting and Administrative Tools.mp4 | 29.35 MB |
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/6. Demo- Explore Panorama_s Troubleshooting and Administrative Tools.srt | 16.96 KB |
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/7. Course Summary.mp4 | 5.68 MB |
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/7. Course Summary.srt | 7.10 KB |
5/1. Course Overview/1. Course Overview.mp4 | 2.76 MB |
5/1. Course Overview/1. Course Overview.srt | 1.94 KB |
5/2. Understand and Configure Palo Alto Networks’ User-ID/1. Palo Alto Networks’ User-ID.mp4 | 12.76 MB |
5/2. Understand and Configure Palo Alto Networks’ User-ID/1. Palo Alto Networks’ User-ID.srt | 15.19 KB |
5/2. Understand and Configure Palo Alto Networks’ User-ID/2. User-ID Requirements.mp4 | 15.36 MB |
5/2. Understand and Configure Palo Alto Networks’ User-ID/2. User-ID Requirements.srt | 14.72 KB |
5/2. Understand and Configure Palo Alto Networks’ User-ID/3. Demo- Create a Secure User-ID Service Account.mp4 | 14.60 MB |
5/2. Understand and Configure Palo Alto Networks’ User-ID/3. Demo- Create a Secure User-ID Service Account.srt | 9.39 KB |
5/2. Understand and Configure Palo Alto Networks’ User-ID/4. Demo- Configure User-ID Agent on an Active Directory Server.mp4 | 23.61 MB |
5/2. Understand and Configure Palo Alto Networks’ User-ID/4. Demo- Configure User-ID Agent on an Active Directory Server.srt | 18.68 KB |
5/2. Understand and Configure Palo Alto Networks’ User-ID/5. Demo- Implement User-ID Components on a Palo Alto Firewall.mp4 | 12.94 MB |
5/2. Understand and Configure Palo Alto Networks’ User-ID/5. Demo- Implement User-ID Components on a Palo Alto Firewall.srt | 8.82 KB |
5/2. Understand and Configure Palo Alto Networks’ User-ID/6. Demo- Implement User-ID Into Security Policies.mp4 | 10.57 MB |
5/2. Understand and Configure Palo Alto Networks’ User-ID/6. Demo- Implement User-ID Into Security Policies.srt | 7.86 KB |
5/2. Understand and Configure Palo Alto Networks’ User-ID/7. Demo- Verify User-ID is Working Properly.mp4 | 15.04 MB |
5/2. Understand and Configure Palo Alto Networks’ User-ID/7. Demo- Verify User-ID is Working Properly.srt | 8.53 KB |
5/2. Understand and Configure Palo Alto Networks’ User-ID/8. Demo- Redistribute User-ID Mappings to Other Firewalls.mp4 | 24.45 MB |
5/2. Understand and Configure Palo Alto Networks’ User-ID/8. Demo- Redistribute User-ID Mappings to Other Firewalls.srt | 17.34 KB |
5/3. Implement Dynamic User Groups and Dynamic Address Groups/1. Dynamic User Groups and Their Components.mp4 | 11.32 MB |
5/3. Implement Dynamic User Groups and Dynamic Address Groups/1. Dynamic User Groups and Their Components.srt | 12.88 KB |
5/3. Implement Dynamic User Groups and Dynamic Address Groups/2. Demo- Configure Components for a Dynamic User Group.mp4 | 15.22 MB |
5/3. Implement Dynamic User Groups and Dynamic Address Groups/2. Demo- Configure Components for a Dynamic User Group.srt | 15.25 KB |
5/3. Implement Dynamic User Groups and Dynamic Address Groups/3. Demo- Verify Dynamic User Groups.mp4 | 21.73 MB |
5/3. Implement Dynamic User Groups and Dynamic Address Groups/3. Demo- Verify Dynamic User Groups.srt | 12.86 KB |
5/3. Implement Dynamic User Groups and Dynamic Address Groups/4. Dynamic Address Groups.mp4 | 3.30 MB |
5/3. Implement Dynamic User Groups and Dynamic Address Groups/4. Dynamic Address Groups.srt | 4.24 KB |
5/3. Implement Dynamic User Groups and Dynamic Address Groups/5. Demo- Configure Dynamic Address Groups.mp4 | 14.54 MB |
5/3. Implement Dynamic User Groups and Dynamic Address Groups/5. Demo- Configure Dynamic Address Groups.srt | 9.96 KB |
5/3. Implement Dynamic User Groups and Dynamic Address Groups/6. Demo- Verify Dynamic Address Groups.mp4 | 13.25 MB |
5/3. Implement Dynamic User Groups and Dynamic Address Groups/6. Demo- Verify Dynamic Address Groups.srt | 9.29 KB |
5/4. Implement Multifactor Authentication on a Palo Alto Firewall/1. Multifactor Authentication.mp4 | 11.56 MB |
5/4. Implement Multifactor Authentication on a Palo Alto Firewall/1. Multifactor Authentication.srt | 9.79 KB |
5/4. Implement Multifactor Authentication on a Palo Alto Firewall/2. Configure A Multifactor Authentication Server Profile.mp4 | 15.59 MB |
5/4. Implement Multifactor Authentication on a Palo Alto Firewall/2. Configure A Multifactor Authentication Server Profile.srt | 11.48 KB |
5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/1. Authentication Portal Overview and Components.mp4 | 14.63 MB |
5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/1. Authentication Portal Overview and Components.srt | 16.22 KB |
5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/2. Demo- Configure Components for an Authentication Portal.mp4 | 16.11 MB |
5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/2. Demo- Configure Components for an Authentication Portal.srt | 12.09 KB |
5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/3. Demo- Configure Authentication Policies.mp4 | 8.99 MB |
5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/3. Demo- Configure Authentication Policies.srt | 6.61 KB |
5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/4. Demo- Verify Authentication Policies.mp4 | 9.61 MB |
5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/4. Demo- Verify Authentication Policies.srt | 6.42 KB |
5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/5. Insert Values into HTTP Headers.mp4 | 2.03 MB |
5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/5. Insert Values into HTTP Headers.srt | 2.24 KB |
5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/6. Demo- Troubleshoot User-ID Issues.mp4 | 22.36 MB |
5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/6. Demo- Troubleshoot User-ID Issues.srt | 18.56 KB |
5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/7. Course Summary.mp4 | 4.84 MB |
5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/7. Course Summary.srt | 6.30 KB |
6/1. Course Overview/1. Course Overview.mp4 | 3.20 MB |
6/1. Course Overview/1. Course Overview.srt | 2.37 KB |
6/2. Deploy a Home Lab and Obtain Palo Alto Software/1. Components You Need for a Palo Alto Home Lab.mp4 | 14.75 MB |
6/2. Deploy a Home Lab and Obtain Palo Alto Software/1. Components You Need for a Palo Alto Home Lab.srt | 14.68 KB |
6/2. Deploy a Home Lab and Obtain Palo Alto Software/2. Demo- Deploy a Palo Alto NGFW in AWS to Obtain Licensing.mp4 | 29.93 MB |
6/2. Deploy a Home Lab and Obtain Palo Alto Software/2. Demo- Deploy a Palo Alto NGFW in AWS to Obtain Licensing.srt | 15.11 KB |
6/2. Deploy a Home Lab and Obtain Palo Alto Software/3. Demo- Register with Palo Alto Support and Download Palo Alto Firewall Software.mp4 | 11.56 MB |
6/2. Deploy a Home Lab and Obtain Palo Alto Software/3. Demo- Register with Palo Alto Support and Download Palo Alto Firewall Software.srt | 6.92 KB |
6/2. Deploy a Home Lab and Obtain Palo Alto Software/4. Demo- Configure ESXi Networks to Support a Palo Alto NGFW.mp4 | 13.07 MB |
6/2. Deploy a Home Lab and Obtain Palo Alto Software/4. Demo- Configure ESXi Networks to Support a Palo Alto NGFW.srt | 9.47 KB |
6/2. Deploy a Home Lab and Obtain Palo Alto Software/5. Demo- Import a Palo Alto NGFW into Your Hypervisor.mp4 | 20.84 MB |
6/2. Deploy a Home Lab and Obtain Palo Alto Software/5. Demo- Import a Palo Alto NGFW into Your Hypervisor.srt | 12.95 KB |
6/3. Deploy and Configure Microsoft Server and Windows 10/1. What Devices You Add to Your Palo Alto Home Lab-.mp4 | 12.31 MB |
6/3. Deploy and Configure Microsoft Server and Windows 10/1. What Devices You Add to Your Palo Alto Home Lab-.srt | 9.40 KB |
6/3. Deploy and Configure Microsoft Server and Windows 10/2. Demo- Deploy Microsoft Server into Hypervisor.mp4 | 18.45 MB |
6/3. Deploy and Configure Microsoft Server and Windows 10/2. Demo- Deploy Microsoft Server into Hypervisor.srt | 11.70 KB |
6/3. Deploy and Configure Microsoft Server and Windows 10/3. Demo- Configure Active Directory for LDAP Authentication and User-ID.mp4 | 11.96 MB |
6/3. Deploy and Configure Microsoft Server and Windows 10/3. Demo- Configure Active Directory for LDAP Authentication and User-ID.srt | 7.33 KB |
6/3. Deploy and Configure Microsoft Server and Windows 10/4. Demo- Configuring Certificate Services for Decryption.mp4 | 24.34 MB |
6/3. Deploy and Configure Microsoft Server and Windows 10/4. Demo- Configuring Certificate Services for Decryption.srt | 11.49 KB |
6/3. Deploy and Configure Microsoft Server and Windows 10/5. Demo- Deploy Windows 10iInto Hypervisor to Use for Testing.mp4 | 9.28 MB |
6/3. Deploy and Configure Microsoft Server and Windows 10/5. Demo- Deploy Windows 10iInto Hypervisor to Use for Testing.srt | 6.87 KB |
6/3. Deploy and Configure Microsoft Server and Windows 10/6. Demo- Deploy a VyOS Router in Your Lab.mp4 | 13.62 MB |
6/3. Deploy and Configure Microsoft Server and Windows 10/6. Demo- Deploy a VyOS Router in Your Lab.srt | 7.99 KB |
6/3. Deploy and Configure Microsoft Server and Windows 10/7. Demo- Verify Lab Components.mp4 | 12.06 MB |
6/3. Deploy and Configure Microsoft Server and Windows 10/7. Demo- Verify Lab Components.srt | 5.98 KB |
6/3. Deploy and Configure Microsoft Server and Windows 10/8. Course Summary.mp4 | 4.24 MB |
6/3. Deploy and Configure Microsoft Server and Windows 10/8. Course Summary.srt | 4.00 KB |
http://tracker.openbittorrent.com:80/announce |
udp://coppersurfer.tk:6969/announce |
udp://inferno.demonoid.is:3391/announce |
udp://opentracker.i2p.rocks:6969/announce |
udp://p4p.arenabg.com:1337 |
udp://tracker.internetwarriors.net:1337/announce |
udp://tracker.leechers-paradise.org:6969/announce |
udp://tracker.openbittorrent.com:80 |
udp://tracker.opentrackr.org:1337/announce |
udp://tracker.pomf.se:80 |
udp://tracker.zer0day.to:1337/announce |
TorrentBank
Copyright © 2024