Implementing and Managing Palo Alto Next Generation Firewalls - TorrentBank

File Name:Implementing and Managing Palo Alto Next Generation Firewalls

Create Tool:

Create Time:1970-01-01 08:00:00

File Size:2.25 GB

File Count:352

File Hash:38eb962f3f3c77541ad062366fbde605e633e45d

Magnet Link:

Magnet Link:

Torrent File:

1/1. Course Overview/1. Course Overview.mp4 2.96 MB
1/1. Course Overview/1. Course Overview.srt 2.29 KB
1/2. Understand How Palo Alto Networks Products Work Together/1. Course Introduction and Legacy Firewall Overview.mp4 11.87 MB
1/2. Understand How Palo Alto Networks Products Work Together/1. Course Introduction and Legacy Firewall Overview.srt 12.61 KB
1/2. Understand How Palo Alto Networks Products Work Together/2. Next-generation Firewall Overview.mp4 4.88 MB
1/2. Understand How Palo Alto Networks Products Work Together/2. Next-generation Firewall Overview.srt 6.12 KB
1/2. Understand How Palo Alto Networks Products Work Together/3. Strata- Palo Alto Networks_ Next-generation Firewall.mp4 8.95 MB
1/2. Understand How Palo Alto Networks Products Work Together/3. Strata- Palo Alto Networks_ Next-generation Firewall.srt 10.64 KB
1/2. Understand How Palo Alto Networks Products Work Together/4. Network Diagram.mp4 11.47 MB
1/2. Understand How Palo Alto Networks Products Work Together/4. Network Diagram.srt 7.08 KB
1/2. Understand How Palo Alto Networks Products Work Together/5. Strata- Panorama and Security Subscriptions.mp4 9.83 MB
1/2. Understand How Palo Alto Networks Products Work Together/5. Strata- Panorama and Security Subscriptions.srt 10.00 KB
1/2. Understand How Palo Alto Networks Products Work Together/6. Prisma and Cortex Product Lines.mp4 3.96 MB
1/2. Understand How Palo Alto Networks Products Work Together/6. Prisma and Cortex Product Lines.srt 5.21 KB
1/3. Initialize and License the Palo Alto Firewall/1. Initializing the Palo Alto Firewall.mp4 11.95 MB
1/3. Initialize and License the Palo Alto Firewall/1. Initializing the Palo Alto Firewall.srt 10.01 KB
1/3. Initialize and License the Palo Alto Firewall/2. GUI Overview and Management Settings.mp4 23.73 MB
1/3. Initialize and License the Palo Alto Firewall/2. GUI Overview and Management Settings.srt 15.92 KB
1/3. Initialize and License the Palo Alto Firewall/3. Licensing the Firewall.mp4 19.45 MB
1/3. Initialize and License the Palo Alto Firewall/3. Licensing the Firewall.srt 13.99 KB
1/3. Initialize and License the Palo Alto Firewall/4. Configuration Management.mp4 13.93 MB
1/3. Initialize and License the Palo Alto Firewall/4. Configuration Management.srt 11.08 KB
1/4. Administer the Palo Alto Firewall/1. Authentication Servers, Profiles, and Sequences.mp4 9.52 MB
1/4. Administer the Palo Alto Firewall/1. Authentication Servers, Profiles, and Sequences.srt 7.98 KB
1/4. Administer the Palo Alto Firewall/2. Configure Authentication Profiles.mp4 8.16 MB
1/4. Administer the Palo Alto Firewall/2. Configure Authentication Profiles.srt 6.01 KB
1/4. Administer the Palo Alto Firewall/3. Admin Roles and Administrator Accounts.mp4 4.57 MB
1/4. Administer the Palo Alto Firewall/3. Admin Roles and Administrator Accounts.srt 6.66 KB
1/4. Administer the Palo Alto Firewall/4. Configure Administrative Accounts.mp4 18.02 MB
1/4. Administer the Palo Alto Firewall/4. Configure Administrative Accounts.srt 14.15 KB
1/4. Administer the Palo Alto Firewall/5. Verify and Troubleshoot Administrator Login.mp4 9.43 MB
1/4. Administer the Palo Alto Firewall/5. Verify and Troubleshoot Administrator Login.srt 5.46 KB
1/4. Administer the Palo Alto Firewall/6. Admin Level Commit.mp4 7.83 MB
1/4. Administer the Palo Alto Firewall/6. Admin Level Commit.srt 4.93 KB
1/5. Update the Palo Alto Firewall/1. Potential Downfalls of Upgrading Content on a Palo Alto Firewall.mp4 8.28 MB
1/5. Update the Palo Alto Firewall/1. Potential Downfalls of Upgrading Content on a Palo Alto Firewall.srt 9.16 KB
1/5. Update the Palo Alto Firewall/2. Updating Content ID.mp4 22.96 MB
1/5. Update the Palo Alto Firewall/2. Updating Content ID.srt 13.78 KB
1/5. Update the Palo Alto Firewall/3. Upgrading the PAN OS on a Standalone Firewall.mp4 30.22 MB
1/5. Update the Palo Alto Firewall/3. Upgrading the PAN OS on a Standalone Firewall.srt 14.06 KB
1/6. Configure Security Zones and Layer 3 Interfaces/1. Deployment Methods (Interface Types).mp4 12.22 MB
1/6. Configure Security Zones and Layer 3 Interfaces/1. Deployment Methods (Interface Types).srt 11.15 KB
1/6. Configure Security Zones and Layer 3 Interfaces/2. Configuring Security Zones.mp4 27.33 MB
1/6. Configure Security Zones and Layer 3 Interfaces/2. Configuring Security Zones.srt 19.19 KB
1/6. Configure Security Zones and Layer 3 Interfaces/3. Configuring Layer 3 Interfaces and Interface Management Profiles.mp4 20.82 MB
1/6. Configure Security Zones and Layer 3 Interfaces/3. Configuring Layer 3 Interfaces and Interface Management Profiles.srt 14.53 KB
1/6. Configure Security Zones and Layer 3 Interfaces/4. Virtual Router Overview.mp4 7.66 MB
1/6. Configure Security Zones and Layer 3 Interfaces/4. Virtual Router Overview.srt 6.14 KB
1/6. Configure Security Zones and Layer 3 Interfaces/5. Configuring the Virtual Router to Use OSPF.mp4 13.37 MB
1/6. Configure Security Zones and Layer 3 Interfaces/5. Configuring the Virtual Router to Use OSPF.srt 9.43 KB
1/6. Configure Security Zones and Layer 3 Interfaces/6. Verifying OSPF.mp4 16.05 MB
1/6. Configure Security Zones and Layer 3 Interfaces/6. Verifying OSPF.srt 9.68 KB
1/7. Understand App-ID and Other Objects/1. App-ID Overview.mp4 8.96 MB
1/7. Understand App-ID and Other Objects/1. App-ID Overview.srt 8.50 KB
1/7. Understand App-ID and Other Objects/2. Applications, Application Filters, and Application Groups.mp4 28.10 MB
1/7. Understand App-ID and Other Objects/2. Applications, Application Filters, and Application Groups.srt 17.53 KB
1/7. Understand App-ID and Other Objects/3. Create Address Objects and Address Groups.mp4 12.43 MB
1/7. Understand App-ID and Other Objects/3. Create Address Objects and Address Groups.srt 10.49 KB
1/7. Understand App-ID and Other Objects/4. External Dyanmic Lists and Security Profiles.mp4 23.65 MB
1/7. Understand App-ID and Other Objects/4. External Dyanmic Lists and Security Profiles.srt 14.99 KB
1/7. Understand App-ID and Other Objects/5. Tags.mp4 12.19 MB
1/7. Understand App-ID and Other Objects/5. Tags.srt 8.46 KB
1/8. Shape Traffic Using Security Policy Rules/1. Security Policy Rules - Define the Matching Criteria.mp4 13.70 MB
1/8. Shape Traffic Using Security Policy Rules/1. Security Policy Rules - Define the Matching Criteria.srt 11.12 KB
1/8. Shape Traffic Using Security Policy Rules/2. Security Policy Rules - Define the Actions.mp4 5.66 MB
1/8. Shape Traffic Using Security Policy Rules/2. Security Policy Rules - Define the Actions.srt 5.82 KB
1/8. Shape Traffic Using Security Policy Rules/3. Create the First Security Rule.mp4 22.13 MB
1/8. Shape Traffic Using Security Policy Rules/3. Create the First Security Rule.srt 16.38 KB
1/8. Shape Traffic Using Security Policy Rules/4. Test the Initial Internet Gateway Policy.mp4 21.52 MB
1/8. Shape Traffic Using Security Policy Rules/4. Test the Initial Internet Gateway Policy.srt 11.47 KB
1/8. Shape Traffic Using Security Policy Rules/5. Allow Management Updates on a Dataplane Interface and Allow OOBM Access.mp4 19.13 MB
1/8. Shape Traffic Using Security Policy Rules/5. Allow Management Updates on a Dataplane Interface and Allow OOBM Access.srt 11.72 KB
1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/1. Internet Gateway Best Practice Security Rules.mp4 31.59 MB
1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/1. Internet Gateway Best Practice Security Rules.srt 21.31 KB
1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/2. Datacenter Best Practice Security Rules.mp4 24.42 MB
1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/2. Datacenter Best Practice Security Rules.srt 16.83 KB
1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/3. Monitor Applications and Optimize Policies.mp4 19.00 MB
1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/3. Monitor Applications and Optimize Policies.srt 10.84 KB
1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/4. Course Summary.mp4 6.74 MB
1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/4. Course Summary.srt 8.09 KB
2/1. Course Overview/1. Course Overview.mp4 3.65 MB
2/1. Course Overview/1. Course Overview.srt 2.38 KB
2/2. Changing IP Addresses Using Network Address Translation/1. Course Intro.mp4 3.77 MB
2/2. Changing IP Addresses Using Network Address Translation/1. Course Intro.srt 4.80 KB
2/2. Changing IP Addresses Using Network Address Translation/2. Overview of NAT and Why We Use It.mp4 5.04 MB
2/2. Changing IP Addresses Using Network Address Translation/2. Overview of NAT and Why We Use It.srt 6.83 KB
2/2. Changing IP Addresses Using Network Address Translation/3. Types of NAT You Can Configure.mp4 10.23 MB
2/2. Changing IP Addresses Using Network Address Translation/3. Types of NAT You Can Configure.srt 12.96 KB
2/2. Changing IP Addresses Using Network Address Translation/4. Flow Logic on the Palo Alto.mp4 9.58 MB
2/2. Changing IP Addresses Using Network Address Translation/4. Flow Logic on the Palo Alto.srt 9.10 KB
2/3. Configuring NAT on the Palo Alto Firewall/1. Introduction.mp4 6.87 MB
2/3. Configuring NAT on the Palo Alto Firewall/1. Introduction.srt 8.17 KB
2/3. Configuring NAT on the Palo Alto Firewall/2. Configuring Static Source NAT.mp4 17.99 MB
2/3. Configuring NAT on the Palo Alto Firewall/2. Configuring Static Source NAT.srt 15.26 KB
2/3. Configuring NAT on the Palo Alto Firewall/3. Verifying NAT.mp4 9.39 MB
2/3. Configuring NAT on the Palo Alto Firewall/3. Verifying NAT.srt 5.97 KB
2/3. Configuring NAT on the Palo Alto Firewall/4. Configuring Dynamic NAT And DIPP.mp4 12.00 MB
2/3. Configuring NAT on the Palo Alto Firewall/4. Configuring Dynamic NAT And DIPP.srt 9.66 KB
2/3. Configuring NAT on the Palo Alto Firewall/5. Configuring Destination NAT.mp4 23.37 MB
2/3. Configuring NAT on the Palo Alto Firewall/5. Configuring Destination NAT.srt 16.75 KB
2/3. Configuring NAT on the Palo Alto Firewall/6. Verifying NAT, Part II.mp4 13.50 MB
2/3. Configuring NAT on the Palo Alto Firewall/6. Verifying NAT, Part II.srt 8.06 KB
2/3. Configuring NAT on the Palo Alto Firewall/7. Configuring U-turn NAT and No-NAT.mp4 20.76 MB
2/3. Configuring NAT on the Palo Alto Firewall/7. Configuring U-turn NAT and No-NAT.srt 12.17 KB
2/3. Configuring NAT on the Palo Alto Firewall/8. Bidirectional NAT.mp4 4.53 MB
2/3. Configuring NAT on the Palo Alto Firewall/8. Bidirectional NAT.srt 5.42 KB
2/4. Understanding the Concepts of VPNs/1. Introduction.mp4 960.40 KB
2/4. Understanding the Concepts of VPNs/1. Introduction.srt 1.38 KB
2/4. Understanding the Concepts of VPNs/2. VPN Basics.mp4 2.70 MB
2/4. Understanding the Concepts of VPNs/2. VPN Basics.srt 4.26 KB
2/4. Understanding the Concepts of VPNs/3. IKE VPNs Using IPSec.mp4 8.31 MB
2/4. Understanding the Concepts of VPNs/3. IKE VPNs Using IPSec.srt 12.93 KB
2/4. Understanding the Concepts of VPNs/4. SSL VPNs.mp4 3.15 MB
2/4. Understanding the Concepts of VPNs/4. SSL VPNs.srt 5.88 KB
2/4. Understanding the Concepts of VPNs/5. Route Base vs Policy Based VPNs.mp4 3.67 MB
2/4. Understanding the Concepts of VPNs/5. Route Base vs Policy Based VPNs.srt 5.88 KB
2/5. Configuring S2S VPNs on the Palo Alto Firewall/1. Introduction.mp4 1.30 MB
2/5. Configuring S2S VPNs on the Palo Alto Firewall/1. Introduction.srt 1.98 KB
2/5. Configuring S2S VPNs on the Palo Alto Firewall/2. Configuring a Site to Site VPN Overview.mp4 2.44 MB
2/5. Configuring S2S VPNs on the Palo Alto Firewall/2. Configuring a Site to Site VPN Overview.srt 3.00 KB
2/5. Configuring S2S VPNs on the Palo Alto Firewall/3. Configuring a Site to Site VPN with a Palo Alto Firewall.mp4 21.63 MB
2/5. Configuring S2S VPNs on the Palo Alto Firewall/3. Configuring a Site to Site VPN with a Palo Alto Firewall.srt 15.19 KB
2/5. Configuring S2S VPNs on the Palo Alto Firewall/4. Using Certificates with Site to Site VPNs.mp4 9.53 MB
2/5. Configuring S2S VPNs on the Palo Alto Firewall/4. Using Certificates with Site to Site VPNs.srt 7.17 KB
2/5. Configuring S2S VPNs on the Palo Alto Firewall/5. Configuring a Site to Site with a Cisco IOS Router.mp4 15.46 MB
2/5. Configuring S2S VPNs on the Palo Alto Firewall/5. Configuring a Site to Site with a Cisco IOS Router.srt 9.22 KB
2/5. Configuring S2S VPNs on the Palo Alto Firewall/6. Troubleshooting Site to Site VPNs.mp4 21.73 MB
2/5. Configuring S2S VPNs on the Palo Alto Firewall/6. Troubleshooting Site to Site VPNs.srt 13.11 KB
2/6. Using Global Connect to Configure Remote Access VPNs/1. Introduction.mp4 1.65 MB
2/6. Using Global Connect to Configure Remote Access VPNs/1. Introduction.srt 2.22 KB
2/6. Using Global Connect to Configure Remote Access VPNs/2. Global Protect Overview and Components.mp4 5.28 MB
2/6. Using Global Connect to Configure Remote Access VPNs/2. Global Protect Overview and Components.srt 7.63 KB
2/6. Using Global Connect to Configure Remote Access VPNs/3. Configuring GlobalProtect Prerequisites.mp4 8.87 MB
2/6. Using Global Connect to Configure Remote Access VPNs/3. Configuring GlobalProtect Prerequisites.srt 8.39 KB
2/6. Using Global Connect to Configure Remote Access VPNs/4. Configuring GlobalProtect Gateways.mp4 21.46 MB
2/6. Using Global Connect to Configure Remote Access VPNs/4. Configuring GlobalProtect Gateways.srt 16.93 KB
2/6. Using Global Connect to Configure Remote Access VPNs/5. Configuring GlobalProtect Portals.mp4 11.79 MB
2/6. Using Global Connect to Configure Remote Access VPNs/5. Configuring GlobalProtect Portals.srt 9.81 KB
2/6. Using Global Connect to Configure Remote Access VPNs/6. Configuring Security Rules for GlobalProtect.mp4 7.11 MB
2/6. Using Global Connect to Configure Remote Access VPNs/6. Configuring Security Rules for GlobalProtect.srt 4.28 KB
2/6. Using Global Connect to Configure Remote Access VPNs/7. Connecting a Client to the VPN Using the GlobalProtect App.mp4 16.08 MB
2/6. Using Global Connect to Configure Remote Access VPNs/7. Connecting a Client to the VPN Using the GlobalProtect App.srt 9.46 KB
3/1. Course Overview/1. Course Overview.mp4 3.37 MB
3/1. Course Overview/1. Course Overview.srt 2.33 KB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/01. Course Intro.mp4 4.47 MB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/01. Course Intro.srt 5.98 KB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/02. New Features in PAN-OS 9.0, Overview of the Network Diagram, and Content ID Introduction.mp4 8.02 MB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/02. New Features in PAN-OS 9.0, Overview of the Network Diagram, and Content ID Introduction.srt 10.77 KB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/03. Configuring Antivirus.mp4 36.55 MB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/03. Configuring Antivirus.srt 20.60 KB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/04. Configuring Anti-Spyware.mp4 11.71 MB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/04. Configuring Anti-Spyware.srt 8.96 KB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/05. Configuring Vulnerability Protection.mp4 14.74 MB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/05. Configuring Vulnerability Protection.srt 8.29 KB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/06. Configuring URL Filtering.mp4 21.07 MB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/06. Configuring URL Filtering.srt 17.07 KB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/07. Configuring Data Filtering.mp4 16.99 MB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/07. Configuring Data Filtering.srt 14.65 KB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/08. Configuring Zone Protection Profiles.mp4 21.50 MB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/08. Configuring Zone Protection Profiles.srt 18.80 KB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/09. Configuring DoS Protection Profiles.mp4 14.80 MB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/09. Configuring DoS Protection Profiles.srt 15.78 KB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/10. Best Practices.mp4 20.11 MB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/10. Best Practices.srt 17.03 KB
3/3. Integrating with WildFire® and AutoFocus™/1. Module Introduction _ Flow Logic.mp4 2.37 MB
3/3. Integrating with WildFire® and AutoFocus™/1. Module Introduction _ Flow Logic.srt 3.19 KB
3/3. Integrating with WildFire® and AutoFocus™/2. WildFire® _ AutoFocus™ Overview.mp4 11.03 MB
3/3. Integrating with WildFire® and AutoFocus™/2. WildFire® _ AutoFocus™ Overview.srt 16.63 KB
3/3. Integrating with WildFire® and AutoFocus™/3. Configuring WildFire® _ File Blocking.mp4 20.33 MB
3/3. Integrating with WildFire® and AutoFocus™/3. Configuring WildFire® _ File Blocking.srt 13.13 KB
3/3. Integrating with WildFire® and AutoFocus™/4. Verifying File Blocking _ WildFire®.mp4 28.40 MB
3/3. Integrating with WildFire® and AutoFocus™/4. Verifying File Blocking _ WildFire®.srt 19.23 KB
3/3. Integrating with WildFire® and AutoFocus™/5. Threat Vault _ WildFire® Portal.mp4 14.60 MB
3/3. Integrating with WildFire® and AutoFocus™/5. Threat Vault _ WildFire® Portal.srt 9.27 KB
3/3. Integrating with WildFire® and AutoFocus™/6. Security Profile Groups _ Security Rule Audit Logs.mp4 10.47 MB
3/3. Integrating with WildFire® and AutoFocus™/6. Security Profile Groups _ Security Rule Audit Logs.srt 8.87 KB
3/3. Integrating with WildFire® and AutoFocus™/7. Implementing AutoFocus.mp4 4.31 MB
3/3. Integrating with WildFire® and AutoFocus™/7. Implementing AutoFocus.srt 5.78 KB
3/4. Joining the Enterprise PKI Infrastructure/1. Module Introduction.mp4 1.42 MB
3/4. Joining the Enterprise PKI Infrastructure/1. Module Introduction.srt 1.95 KB
3/4. Joining the Enterprise PKI Infrastructure/2. Certificate Authorities, Certificate Signing Requests, and Public Key Infrastructure(1).mp4 6.19 MB
3/4. Joining the Enterprise PKI Infrastructure/2. Certificate Authorities, Certificate Signing Requests, and Public Key Infrastructure(1).srt 7.56 KB
3/4. Joining the Enterprise PKI Infrastructure/2. Certificate Authorities, Certificate Signing Requests, and Public Key Infrastructure.mp4 6.19 MB
3/4. Joining the Enterprise PKI Infrastructure/2. Certificate Authorities, Certificate Signing Requests, and Public Key Infrastructure.srt 7.56 KB
3/4. Joining the Enterprise PKI Infrastructure/3. Generating a CSR _ Installing a Certificate.mp4 16.26 MB
3/4. Joining the Enterprise PKI Infrastructure/3. Generating a CSR _ Installing a Certificate.srt 10.83 KB
3/4. Joining the Enterprise PKI Infrastructure/4. Using a Certificate for Web Management Traffic.mp4 7.52 MB
3/4. Joining the Enterprise PKI Infrastructure/4. Using a Certificate for Web Management Traffic.srt 6.69 KB
3/5. Decrypting Traffic on the Palo Alto Firewall/1. Module Introduction.mp4 3.11 MB
3/5. Decrypting Traffic on the Palo Alto Firewall/1. Module Introduction.srt 3.46 KB
3/5. Decrypting Traffic on the Palo Alto Firewall/2. Palo Alto Firewall Decryption Overview.mp4 5.07 MB
3/5. Decrypting Traffic on the Palo Alto Firewall/2. Palo Alto Firewall Decryption Overview.srt 8.28 KB
3/5. Decrypting Traffic on the Palo Alto Firewall/3. Decryption Rollout Strategy.mp4 6.77 MB
3/5. Decrypting Traffic on the Palo Alto Firewall/3. Decryption Rollout Strategy.srt 11.06 KB
3/5. Decrypting Traffic on the Palo Alto Firewall/4. Configuring Forward Trust _ Untrust Certificates, and Understanding Response Pages(1).mp4 18.29 MB
3/5. Decrypting Traffic on the Palo Alto Firewall/4. Configuring Forward Trust _ Untrust Certificates, and Understanding Response Pages(1).srt 14.24 KB
3/5. Decrypting Traffic on the Palo Alto Firewall/4. Configuring Forward Trust _ Untrust Certificates, and Understanding Response Pages.mp4 18.29 MB
3/5. Decrypting Traffic on the Palo Alto Firewall/4. Configuring Forward Trust _ Untrust Certificates, and Understanding Response Pages.srt 14.24 KB
3/5. Decrypting Traffic on the Palo Alto Firewall/5. Configuring Decryption Profiles.mp4 5.72 MB
3/5. Decrypting Traffic on the Palo Alto Firewall/5. Configuring Decryption Profiles.srt 4.43 KB
3/5. Decrypting Traffic on the Palo Alto Firewall/6. Configuring SSL Forward Proxy.mp4 21.73 MB
3/5. Decrypting Traffic on the Palo Alto Firewall/6. Configuring SSL Forward Proxy.srt 14.56 KB
3/5. Decrypting Traffic on the Palo Alto Firewall/7. Configuring SSL Inbound Proxy, SSH Proxy, and Decyrption Mirroring(1).mp4 11.39 MB
3/5. Decrypting Traffic on the Palo Alto Firewall/7. Configuring SSL Inbound Proxy, SSH Proxy, and Decyrption Mirroring(1).srt 7.20 KB
3/5. Decrypting Traffic on the Palo Alto Firewall/7. Configuring SSL Inbound Proxy, SSH Proxy, and Decyrption Mirroring.mp4 11.39 MB
3/5. Decrypting Traffic on the Palo Alto Firewall/7. Configuring SSL Inbound Proxy, SSH Proxy, and Decyrption Mirroring.srt 7.20 KB
3/5. Decrypting Traffic on the Palo Alto Firewall/8. Decryption Broker Overview.mp4 5.61 MB
3/5. Decrypting Traffic on the Palo Alto Firewall/8. Decryption Broker Overview.srt 8.24 KB
3/5. Decrypting Traffic on the Palo Alto Firewall/9. Course Wrap Up.mp4 3.13 MB
3/5. Decrypting Traffic on the Palo Alto Firewall/9. Course Wrap Up.srt 5.23 KB
4/1. Course Overview/1. Course Overview.mp4 2.89 MB
4/1. Course Overview/1. Course Overview.srt 2.07 KB
4/2. Implement High Availability/1. Palo Alto Firewalls_ High Availability.mp4 13.84 MB
4/2. Implement High Availability/1. Palo Alto Firewalls_ High Availability.srt 14.17 KB
4/2. Implement High Availability/2. Palo Alto HA Modes and Link Types.mp4 11.54 MB
4/2. Implement High Availability/2. Palo Alto HA Modes and Link Types.srt 10.94 KB
4/2. Implement High Availability/3. Globomantics HA Deployment.mp4 8.27 MB
4/2. Implement High Availability/3. Globomantics HA Deployment.srt 8.45 KB
4/2. Implement High Availability/4. Demo- Configure Active-Passive HA on the Primary Firewall.mp4 19.10 MB
4/2. Implement High Availability/4. Demo- Configure Active-Passive HA on the Primary Firewall.srt 12.03 KB
4/2. Implement High Availability/5. Demo- Configure Active-Passive HA on the Secondary Firewall.mp4 14.10 MB
4/2. Implement High Availability/5. Demo- Configure Active-Passive HA on the Secondary Firewall.srt 7.82 KB
4/2. Implement High Availability/6. Demo- Verify that Active-Passive HA is Operational.mp4 13.65 MB
4/2. Implement High Availability/6. Demo- Verify that Active-Passive HA is Operational.srt 6.81 KB
4/2. Implement High Availability/7. Demo- Tune the Failover Conditions for an Active-Passive Configuration.mp4 23.21 MB
4/2. Implement High Availability/7. Demo- Tune the Failover Conditions for an Active-Passive Configuration.srt 13.16 KB
4/2. Implement High Availability/8. Active-Active HA Firewall Clustering.mp4 13.81 MB
4/2. Implement High Availability/8. Active-Active HA Firewall Clustering.srt 12.62 KB
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/1. What Is Panorama-.mp4 10.88 MB
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/1. What Is Panorama-.srt 10.08 KB
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/2. Demo- Panorama Overview.mp4 12.63 MB
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/2. Demo- Panorama Overview.srt 8.30 KB
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/3. Templates and Template Stacks.mp4 10.45 MB
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/3. Templates and Template Stacks.srt 13.34 KB
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/4. Demo- Create Templates and Template Stacks on Panorama.mp4 8.95 MB
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/4. Demo- Create Templates and Template Stacks on Panorama.srt 6.09 KB
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/5. Demo- Add Values to Templates.mp4 13.39 MB
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/5. Demo- Add Values to Templates.srt 7.40 KB
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/6. Demo- Add Firewalls to Templates.mp4 16.37 MB
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/6. Demo- Add Firewalls to Templates.srt 9.80 KB
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/7. Panorama Template Variables.mp4 7.33 MB
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/7. Panorama Template Variables.srt 5.49 KB
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/8. Demo- Configure Variables in Templates.mp4 18.49 MB
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/8. Demo- Configure Variables in Templates.srt 13.04 KB
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/9. Demo- Push Panorama Configurations to Managed Firewalls.mp4 22.38 MB
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/9. Demo- Push Panorama Configurations to Managed Firewalls.srt 16.37 KB
4/4. Implement Panorama Device Groups/1. Panorama Device Groups Overview.mp4 12.09 MB
4/4. Implement Panorama Device Groups/1. Panorama Device Groups Overview.srt 9.72 KB
4/4. Implement Panorama Device Groups/2. Demo- Configure Device Groups On Panorama.mp4 18.95 MB
4/4. Implement Panorama Device Groups/2. Demo- Configure Device Groups On Panorama.srt 13.79 KB
4/4. Implement Panorama Device Groups/3. Panorama Objects.mp4 4.17 MB
4/4. Implement Panorama Device Groups/3. Panorama Objects.srt 4.78 KB
4/4. Implement Panorama Device Groups/4. Demo- Configure Objects In Device Groups.mp4 19.02 MB
4/4. Implement Panorama Device Groups/4. Demo- Configure Objects In Device Groups.srt 13.28 KB
4/4. Implement Panorama Device Groups/5. Panorama Policies.mp4 2.91 MB
4/4. Implement Panorama Device Groups/5. Panorama Policies.srt 3.02 KB
4/4. Implement Panorama Device Groups/6. Demo- Configure Policies in Device Groups.mp4 20.13 MB
4/4. Implement Panorama Device Groups/6. Demo- Configure Policies in Device Groups.srt 14.53 KB
4/4. Implement Panorama Device Groups/7. Demo- Import Existing Firewall Configuration into Panorama.mp4 21.32 MB
4/4. Implement Panorama Device Groups/7. Demo- Import Existing Firewall Configuration into Panorama.srt 11.62 KB
4/4. Implement Panorama Device Groups/8. Clean up Panorama after Firewall Imports and Push Configurations to Firewalls.mp4 20.53 MB
4/4. Implement Panorama Device Groups/8. Clean up Panorama after Firewall Imports and Push Configurations to Firewalls.srt 13.75 KB
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/1. Panorama Log Collectors.mp4 4.96 MB
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/1. Panorama Log Collectors.srt 4.00 KB
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/2. Demo- Configure a Log Collector on Panorama.mp4 11.35 MB
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/2. Demo- Configure a Log Collector on Panorama.srt 8.93 KB
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/3. Demo- Using Panorama to View Logs from All Firewalls.mp4 17.73 MB
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/3. Demo- Using Panorama to View Logs from All Firewalls.srt 10.12 KB
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/4. Demo- Testing Firewall Loggin Appears on Panorama.mp4 30.24 MB
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/4. Demo- Testing Firewall Loggin Appears on Panorama.srt 11.76 KB
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/5. Demo- Using Panorama to Update Software on Firewalls.mp4 16.99 MB
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/5. Demo- Using Panorama to Update Software on Firewalls.srt 9.40 KB
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/6. Demo- Explore Panorama_s Troubleshooting and Administrative Tools.mp4 29.35 MB
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/6. Demo- Explore Panorama_s Troubleshooting and Administrative Tools.srt 16.96 KB
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/7. Course Summary.mp4 5.68 MB
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/7. Course Summary.srt 7.10 KB
5/1. Course Overview/1. Course Overview.mp4 2.76 MB
5/1. Course Overview/1. Course Overview.srt 1.94 KB
5/2. Understand and Configure Palo Alto Networks’ User-ID/1. Palo Alto Networks’ User-ID.mp4 12.76 MB
5/2. Understand and Configure Palo Alto Networks’ User-ID/1. Palo Alto Networks’ User-ID.srt 15.19 KB
5/2. Understand and Configure Palo Alto Networks’ User-ID/2. User-ID Requirements.mp4 15.36 MB
5/2. Understand and Configure Palo Alto Networks’ User-ID/2. User-ID Requirements.srt 14.72 KB
5/2. Understand and Configure Palo Alto Networks’ User-ID/3. Demo- Create a Secure User-ID Service Account.mp4 14.60 MB
5/2. Understand and Configure Palo Alto Networks’ User-ID/3. Demo- Create a Secure User-ID Service Account.srt 9.39 KB
5/2. Understand and Configure Palo Alto Networks’ User-ID/4. Demo- Configure User-ID Agent on an Active Directory Server.mp4 23.61 MB
5/2. Understand and Configure Palo Alto Networks’ User-ID/4. Demo- Configure User-ID Agent on an Active Directory Server.srt 18.68 KB
5/2. Understand and Configure Palo Alto Networks’ User-ID/5. Demo- Implement User-ID Components on a Palo Alto Firewall.mp4 12.94 MB
5/2. Understand and Configure Palo Alto Networks’ User-ID/5. Demo- Implement User-ID Components on a Palo Alto Firewall.srt 8.82 KB
5/2. Understand and Configure Palo Alto Networks’ User-ID/6. Demo- Implement User-ID Into Security Policies.mp4 10.57 MB
5/2. Understand and Configure Palo Alto Networks’ User-ID/6. Demo- Implement User-ID Into Security Policies.srt 7.86 KB
5/2. Understand and Configure Palo Alto Networks’ User-ID/7. Demo- Verify User-ID is Working Properly.mp4 15.04 MB
5/2. Understand and Configure Palo Alto Networks’ User-ID/7. Demo- Verify User-ID is Working Properly.srt 8.53 KB
5/2. Understand and Configure Palo Alto Networks’ User-ID/8. Demo- Redistribute User-ID Mappings to Other Firewalls.mp4 24.45 MB
5/2. Understand and Configure Palo Alto Networks’ User-ID/8. Demo- Redistribute User-ID Mappings to Other Firewalls.srt 17.34 KB
5/3. Implement Dynamic User Groups and Dynamic Address Groups/1. Dynamic User Groups and Their Components.mp4 11.32 MB
5/3. Implement Dynamic User Groups and Dynamic Address Groups/1. Dynamic User Groups and Their Components.srt 12.88 KB
5/3. Implement Dynamic User Groups and Dynamic Address Groups/2. Demo- Configure Components for a Dynamic User Group.mp4 15.22 MB
5/3. Implement Dynamic User Groups and Dynamic Address Groups/2. Demo- Configure Components for a Dynamic User Group.srt 15.25 KB
5/3. Implement Dynamic User Groups and Dynamic Address Groups/3. Demo- Verify Dynamic User Groups.mp4 21.73 MB
5/3. Implement Dynamic User Groups and Dynamic Address Groups/3. Demo- Verify Dynamic User Groups.srt 12.86 KB
5/3. Implement Dynamic User Groups and Dynamic Address Groups/4. Dynamic Address Groups.mp4 3.30 MB
5/3. Implement Dynamic User Groups and Dynamic Address Groups/4. Dynamic Address Groups.srt 4.24 KB
5/3. Implement Dynamic User Groups and Dynamic Address Groups/5. Demo- Configure Dynamic Address Groups.mp4 14.54 MB
5/3. Implement Dynamic User Groups and Dynamic Address Groups/5. Demo- Configure Dynamic Address Groups.srt 9.96 KB
5/3. Implement Dynamic User Groups and Dynamic Address Groups/6. Demo- Verify Dynamic Address Groups.mp4 13.25 MB
5/3. Implement Dynamic User Groups and Dynamic Address Groups/6. Demo- Verify Dynamic Address Groups.srt 9.29 KB
5/4. Implement Multifactor Authentication on a Palo Alto Firewall/1. Multifactor Authentication.mp4 11.56 MB
5/4. Implement Multifactor Authentication on a Palo Alto Firewall/1. Multifactor Authentication.srt 9.79 KB
5/4. Implement Multifactor Authentication on a Palo Alto Firewall/2. Configure A Multifactor Authentication Server Profile.mp4 15.59 MB
5/4. Implement Multifactor Authentication on a Palo Alto Firewall/2. Configure A Multifactor Authentication Server Profile.srt 11.48 KB
5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/1. Authentication Portal Overview and Components.mp4 14.63 MB
5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/1. Authentication Portal Overview and Components.srt 16.22 KB
5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/2. Demo- Configure Components for an Authentication Portal.mp4 16.11 MB
5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/2. Demo- Configure Components for an Authentication Portal.srt 12.09 KB
5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/3. Demo- Configure Authentication Policies.mp4 8.99 MB
5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/3. Demo- Configure Authentication Policies.srt 6.61 KB
5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/4. Demo- Verify Authentication Policies.mp4 9.61 MB
5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/4. Demo- Verify Authentication Policies.srt 6.42 KB
5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/5. Insert Values into HTTP Headers.mp4 2.03 MB
5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/5. Insert Values into HTTP Headers.srt 2.24 KB
5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/6. Demo- Troubleshoot User-ID Issues.mp4 22.36 MB
5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/6. Demo- Troubleshoot User-ID Issues.srt 18.56 KB
5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/7. Course Summary.mp4 4.84 MB
5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/7. Course Summary.srt 6.30 KB
6/1. Course Overview/1. Course Overview.mp4 3.20 MB
6/1. Course Overview/1. Course Overview.srt 2.37 KB
6/2. Deploy a Home Lab and Obtain Palo Alto Software/1. Components You Need for a Palo Alto Home Lab.mp4 14.75 MB
6/2. Deploy a Home Lab and Obtain Palo Alto Software/1. Components You Need for a Palo Alto Home Lab.srt 14.68 KB
6/2. Deploy a Home Lab and Obtain Palo Alto Software/2. Demo- Deploy a Palo Alto NGFW in AWS to Obtain Licensing.mp4 29.93 MB
6/2. Deploy a Home Lab and Obtain Palo Alto Software/2. Demo- Deploy a Palo Alto NGFW in AWS to Obtain Licensing.srt 15.11 KB
6/2. Deploy a Home Lab and Obtain Palo Alto Software/3. Demo- Register with Palo Alto Support and Download Palo Alto Firewall Software.mp4 11.56 MB
6/2. Deploy a Home Lab and Obtain Palo Alto Software/3. Demo- Register with Palo Alto Support and Download Palo Alto Firewall Software.srt 6.92 KB
6/2. Deploy a Home Lab and Obtain Palo Alto Software/4. Demo- Configure ESXi Networks to Support a Palo Alto NGFW.mp4 13.07 MB
6/2. Deploy a Home Lab and Obtain Palo Alto Software/4. Demo- Configure ESXi Networks to Support a Palo Alto NGFW.srt 9.47 KB
6/2. Deploy a Home Lab and Obtain Palo Alto Software/5. Demo- Import a Palo Alto NGFW into Your Hypervisor.mp4 20.84 MB
6/2. Deploy a Home Lab and Obtain Palo Alto Software/5. Demo- Import a Palo Alto NGFW into Your Hypervisor.srt 12.95 KB
6/3. Deploy and Configure Microsoft Server and Windows 10/1. What Devices You Add to Your Palo Alto Home Lab-.mp4 12.31 MB
6/3. Deploy and Configure Microsoft Server and Windows 10/1. What Devices You Add to Your Palo Alto Home Lab-.srt 9.40 KB
6/3. Deploy and Configure Microsoft Server and Windows 10/2. Demo- Deploy Microsoft Server into Hypervisor.mp4 18.45 MB
6/3. Deploy and Configure Microsoft Server and Windows 10/2. Demo- Deploy Microsoft Server into Hypervisor.srt 11.70 KB
6/3. Deploy and Configure Microsoft Server and Windows 10/3. Demo- Configure Active Directory for LDAP Authentication and User-ID.mp4 11.96 MB
6/3. Deploy and Configure Microsoft Server and Windows 10/3. Demo- Configure Active Directory for LDAP Authentication and User-ID.srt 7.33 KB
6/3. Deploy and Configure Microsoft Server and Windows 10/4. Demo- Configuring Certificate Services for Decryption.mp4 24.34 MB
6/3. Deploy and Configure Microsoft Server and Windows 10/4. Demo- Configuring Certificate Services for Decryption.srt 11.49 KB
6/3. Deploy and Configure Microsoft Server and Windows 10/5. Demo- Deploy Windows 10iInto Hypervisor to Use for Testing.mp4 9.28 MB
6/3. Deploy and Configure Microsoft Server and Windows 10/5. Demo- Deploy Windows 10iInto Hypervisor to Use for Testing.srt 6.87 KB
6/3. Deploy and Configure Microsoft Server and Windows 10/6. Demo- Deploy a VyOS Router in Your Lab.mp4 13.62 MB
6/3. Deploy and Configure Microsoft Server and Windows 10/6. Demo- Deploy a VyOS Router in Your Lab.srt 7.99 KB
6/3. Deploy and Configure Microsoft Server and Windows 10/7. Demo- Verify Lab Components.mp4 12.06 MB
6/3. Deploy and Configure Microsoft Server and Windows 10/7. Demo- Verify Lab Components.srt 5.98 KB
6/3. Deploy and Configure Microsoft Server and Windows 10/8. Course Summary.mp4 4.24 MB
6/3. Deploy and Configure Microsoft Server and Windows 10/8. Course Summary.srt 4.00 KB
http://tracker.openbittorrent.com:80/announce
udp://coppersurfer.tk:6969/announce
udp://inferno.demonoid.is:3391/announce
udp://opentracker.i2p.rocks:6969/announce
udp://p4p.arenabg.com:1337
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.openbittorrent.com:80
udp://tracker.opentrackr.org:1337/announce
udp://tracker.pomf.se:80
udp://tracker.zer0day.to:1337/announce

TorrentBank
Copyright © 2024