CBTNuggets - Palo Alto Next-Generation Firewall 2023-5 - TorrentBank

File Name:CBTNuggets - Palo Alto Next-Generation Firewall 2023-5

Create Tool:

Create Time:2024-06-06 15:10:24

File Size:17.71 GB

File Count:259

File Hash:90e8e6da9beeeaa98c2b017e53ce8742b739f36a

Magnet Link:

Magnet Link:

Torrent File:

7. Palo Alto SecOps and DevSecOps/4. Cloud Security Challenges .mp4
1. Palo Alto Networking Fundamentals/1. Intro to Palo Alto Networking Fundamentals .mp4
1. Palo Alto Networking Fundamentals/2. Network Devices .mp4
1. Palo Alto Networking Fundamentals/3. Routed vs Routing Protocols .mp4
1. Palo Alto Networking Fundamentals/4. Routing Protocol Example .mp4
1. Palo Alto Networking Fundamentals/5. Network Types and Topologies .mp4
1. Palo Alto Networking Fundamentals/6. Domain Name System .mp4
1. Palo Alto Networking Fundamentals/7. Internet of Things IoT .mp4
2. Palo Alto Next-gen Firewall Features/1. Intro to Next-gen Firewall Features .mp4
2. Palo Alto Next-gen Firewall Features/2. Next-gen Firewall Overview .mp4
2. Palo Alto Next-gen Firewall Features/3. SSL Decryption .mp4
2. Palo Alto Next-gen Firewall Features/4. User Awareness .mp4
2. Palo Alto Next-gen Firewall Features/5. Application Awareness .mp4
2. Palo Alto Next-gen Firewall Features/6. URL Filtering .mp4
2. Palo Alto Next-gen Firewall Features/7. Threat Prevention .mp4
2. Palo Alto Next-gen Firewall Features/8. WildFire .mp4
3. The Cyberattack Lifecycle/1. Intro to the Cyberattack Lifecycle .mp4
3. The Cyberattack Lifecycle/2. Cyberattack Examples .mp4
3. The Cyberattack Lifecycle/3. Attacker Profile and Motivations .mp4
3. The Cyberattack Lifecycle/4. Overview of the Cyberattack Lifecycle .mp4
3. The Cyberattack Lifecycle/5. Advanced Persistent Threats .mp4
3. The Cyberattack Lifecycle/6. Preventing a Successful Attack .mp4
3. The Cyberattack Lifecycle/7. Preventing Port Scanning .mp4
4. Vulnerabilities, Exploits, and Risk/1. Intro to Vulnerabilities, Exploits, and Risk .mp4
4. Vulnerabilities, Exploits, and Risk/2. Overview of Vulnerabilities, Exploits, and Risk .mp4
4. Vulnerabilities, Exploits, and Risk/3. Social Engineering .mp4
4. Vulnerabilities, Exploits, and Risk/4. Circumventing Port-Based Firewalls .mp4
4. Vulnerabilities, Exploits, and Risk/5. Types of Malware .mp4
4. Vulnerabilities, Exploits, and Risk/6. Spamming and Phishing .mp4
4. Vulnerabilities, Exploits, and Risk/7. DoS, DDoS, and Botnets .mp4
4. Vulnerabilities, Exploits, and Risk/8. Wi-Fi Attacks .mp4
5. Cloud Computing and Security/1. Intro to Cloud Computing and Security .mp4
5. Cloud Computing and Security/2. Cloud Computing and Security Overview .mp4
5. Cloud Computing and Security/3. SaaS Application Risks .mp4
5. Cloud Computing and Security/4. Cybersecurity Laws and Regulations .mp4
5. Cloud Computing and Security/5. User Identification .mp4
5. Cloud Computing and Security/6. App Identification .mp4
6. Strategies for Securing Networks/1. Intro to Strategies for Securing Networks .mp4
6. Strategies for Securing Networks/2. Overview of Strategies for Securing Networks .mp4
6. Strategies for Securing Networks/3. Perimeter-based Network Security .mp4
6. Strategies for Securing Networks/4. Zero Trust and Least Privilege .mp4
6. Strategies for Securing Networks/5. Secure Platform Features .mp4
6. Strategies for Securing Networks/6. Palo Alto Networks Offerings .mp4
7. Palo Alto SecOps and DevSecOps/1. Intro to SecOps and DevSecOps .mp4
7. Palo Alto SecOps and DevSecOps/2. Dev, Ops, and Security Overview .mp4
7. Palo Alto SecOps and DevSecOps/3. SecOps Building Blocks .mp4
Readme.txt
7. Palo Alto SecOps and DevSecOps/5. VMs and Containers .mp4
7. Palo Alto SecOps and DevSecOps/6. Serverless Computing .mp4
7. Palo Alto SecOps and DevSecOps/7. Outsourcing Security .mp4
8. Build a Palo Alto Firewall Lab in EVE-NG/1. Intro to Building a Lab using EVE-NG .mp4
8. Build a Palo Alto Firewall Lab in EVE-NG/2. Lab Overview .mp4
8. Build a Palo Alto Firewall Lab in EVE-NG/3. Image Prep for EVE-NG .mp4
8. Build a Palo Alto Firewall Lab in EVE-NG/4. LAB design .mp4
8. Build a Palo Alto Firewall Lab in EVE-NG/5. Build the Lab Topology .mp4
8. Build a Palo Alto Firewall Lab in EVE-NG/6. Adding LAB Routing .mp4
8. Build a Palo Alto Firewall Lab in EVE-NG/7. Backup and Snapshots .mp4
9. Palo Alto FW Networking Fundamentals/1. Intro to Palo Alto FW Networking .mp4
9. Palo Alto FW Networking Fundamentals/2. Palo Alto FW Networking Overview .mp4
9. Palo Alto FW Networking Fundamentals/3. Initial BootstrapConfig .mp4
9. Palo Alto FW Networking Fundamentals/4. L3 Security Zones .mp4
9. Palo Alto FW Networking Fundamentals/5. L3 Interfaces .mp4
9. Palo Alto FW Networking Fundamentals/6. Virtual Router Overview .mp4
9. Palo Alto FW Networking Fundamentals/7. Adding Static Routes .mp4
9. Palo Alto FW Networking Fundamentals/8. Using Dynamic Routing .mp4
10. Palo Alto Source NAT & DHCP/1. Intro to DHCP and NAT .mp4
10. Palo Alto Source NAT & DHCP/2. Configure DHCP .mp4
10. Palo Alto Source NAT & DHCP/3. Testing DHCP .mp4
10. Palo Alto Source NAT & DHCP/4. Troubleshooting a Failed Ping Request .mp4
10. Palo Alto Source NAT & DHCP/5. NATPAT Overview .mp4
10. Palo Alto Source NAT & DHCP/6. Configure NATPAT .mp4
10. Palo Alto Source NAT & DHCP/7. Configure a Basic Security Policy Rule .mp4
11. Palo Alto Security Policy Fundamentals/1. Intro to Security Policies .mp4
11. Palo Alto Security Policy Fundamentals/2. Security Policy Overview .mp4
11. Palo Alto Security Policy Fundamentals/3. R&R (RNR) Review .mp4
11. Palo Alto Security Policy Fundamentals/4. Adding a DMZ .mp4
11. Palo Alto Security Policy Fundamentals/5. Inside to DMZ Security Rule .mp4
11. Palo Alto Security Policy Fundamentals/6. Outside to DMZ Game Plan .mp4
11. Palo Alto Security Policy Fundamentals/7. Destination NAT to DMZ Server .mp4
11. Palo Alto Security Policy Fundamentals/8 .Outside to DMZ Security Rule .mp4
11. Palo Alto Security Policy Fundamentals/9. Testing Outside to DMZ Server .mp4
12. Palo Alto Virtual Wire and Tap Interfaces/1. Intro to Virtual Wire and Tap Interfaces .mp4
12. Palo Alto Virtual Wire and Tap Interfaces/2. Interface Type Overview .mp4
12. Palo Alto Virtual Wire and Tap Interfaces/3. Tap Interface Overview .mp4
12. Palo Alto Virtual Wire and Tap Interfaces/4. Implement a Tap Interface .mp4
12. Palo Alto Virtual Wire and Tap Interfaces/5. Virtual Wire Overview .mp4
12. Palo Alto Virtual Wire and Tap Interfaces/6. Implement a Virtual Wire .mp4
12. Palo Alto Virtual Wire and Tap Interfaces/7. Security Policy Rules for V-Wire .mp4
12. Palo Alto Virtual Wire and Tap Interfaces/8. Layer 2 Interfaces .mp4
13. Build a Palo Alto Firewall Lab in ESXi/1. Intro to Building a Lab using ESXi .mp4
13. Build a Palo Alto Firewall Lab in ESXi/2. ESXi Based Lab Overview .mp4
13. Build a Palo Alto Firewall Lab in ESXi/3. Lab Components .mp4
13. Build a Palo Alto Firewall Lab in ESXi/4. ESXi Networking .mp4
13. Build a Palo Alto Firewall Lab in ESXi/5. Lab Routing with Vyos .mp4
13. Build a Palo Alto Firewall Lab in ESXi/6. Setting up Lab VMs .mp4
14. Palo Alto App-ID/1. Intro to App-ID .mp4
14. Palo Alto App-ID/2. App-ID Fundamentals .mp4
14. Palo Alto App-ID/3. App-ID Dependencies .mp4
14. Palo Alto App-ID/4. Application Groups .mp4
14. Palo Alto App-ID/5. Application Filters .mp4
14. Palo Alto App-ID/6. Convert to App-ID Security Rules .mp4
14. Palo Alto App-ID/7. Updates to App-ID .mp4
15. Palo Alto SSLTLS Decryption/1. Intro to SSL-TLS Decryption .mp4
15. Palo Alto SSLTLS Decryption/2. SSL-TLS Decryption Overview .mp4
15. Palo Alto SSLTLS Decryption/3. Generate a Self-signed Cert .mp4
15. Palo Alto SSLTLS Decryption/4. Adding a Trusted CA to Clients .mp4
15. Palo Alto SSLTLS Decryption/5. Implement Decryption Policy Rules .mp4
15. Palo Alto SSLTLS Decryption/6. Verify Decryption Policy .mp4
15. Palo Alto SSLTLS Decryption/7. Add a Decryption Policy to PA-FW2 .mp4
16. Palo Alto Site-to-Site VPNs/1. Intro to Site to Site VPNs .mp4
16. Palo Alto Site-to-Site VPNs/2. Site to Site VPNs Overview .mp4
16. Palo Alto Site-to-Site VPNs/3. Ingredients for Palo Alto Site to Site VPN .mp4
16. Palo Alto Site-to-Site VPNs/4. Site to Site Game Plan .mp4
16. Palo Alto Site-to-Site VPNs/5. Implement Site to Site VPN .mp4
16. Palo Alto Site-to-Site VPNs/6. VPNs and Routing .mp4
16. Palo Alto Site-to-Site VPNs/7. Security Policy Rules for VPN .mp4
17. Palo Alto User-ID/1. Intro to Palo Alto User-ID .mp4
17. Palo Alto User-ID/2. User-ID Fundamentals .mp4
17. Palo Alto User-ID/3. User-ID Game Plan .mp4
17. Palo Alto User-ID/4. User-ID Setup .mp4
17. Palo Alto User-ID/5. LDAP and Group Mapping .mp4
17. Palo Alto User-ID/6. Security Policies with User-ID .mp4
17. Palo Alto User-ID/7. User-ID Example & Review .mp4
18. Palo Alto URL Filtering/1. Intro to URL Filtering .mp4
18. Palo Alto URL Filtering/2. URL Filtering Overview .mp4
18. Palo Alto URL Filtering/3. URLs in Rules .mp4
18. Palo Alto URL Filtering/4. Custom URL Categories .mp4
18. Palo Alto URL Filtering/5. External Dynamic Lists (EDL) .mp4
18. Palo Alto URL Filtering/6. URL Security Profiles .mp4
19. Palo Alto Threat Prevention/1. Intro to Threat Prevention .mp4
19. Palo Alto Threat Prevention/2. Threat Prevention Overview .mp4
19. Palo Alto Threat Prevention/3. Licensing and Updates .mp4
19. Palo Alto Threat Prevention/4. Vulnerability Protection Profiles .mp4
19. Palo Alto Threat Prevention/5. Antivirus Security Profiles .mp4
19. Palo Alto Threat Prevention/6. Anti-Spyware Security Profiles .mp4
20. Palo Alto WildFire Malware Analysis/1. Intro to Palo Alto WildFire .mp4
20. Palo Alto WildFire Malware Analysis/2. WildFire Overview .mp4
20. Palo Alto WildFire Malware Analysis/3. WildFire Files and Flowchart .mp4
20. Palo Alto WildFire Malware Analysis/4. WildFire Initial Configuration .mp4
20. Palo Alto WildFire Malware Analysis/5. Testing WildFire Submissions .mp4
20. Palo Alto WildFire Malware Analysis/6. Monitoring WildFire .mp4
21. Palo Alto Firewall Management/1. Intro to Firewall Management .mp4
21. Palo Alto Firewall Management/2. Cyber Attack Lifecycle .mp4
21. Palo Alto Firewall Management/3. Configuration Management .mp4
21. Palo Alto Firewall Management/4. Managing Administrators .mp4
21. Palo Alto Firewall Management/5. Monitoring .mp4
22. Palo Alto FW High Availability/1. Introduction to Firewall HA .mp4
22. Palo Alto FW High Availability/2. HA Overview .mp4
22. Palo Alto FW High Availability/3. HA Pair InterfacesLinks .mp4
22. Palo Alto FW High Availability/4. ActivePassive Game Plan .mp4
22. Palo Alto FW High Availability/5. Configure Active-Passive HA .mp4
22. Palo Alto FW High Availability/6. Configurations on Active Firewall .mp4
22. Palo Alto FW High Availability/7. Testing the HA Pair .mp4
23. Using Panorama for FW Mgmt/1. Intro to Panorama .mp4
23. Using Panorama for FW Mgmt/2. Panorama Overview .mp4
23. Using Panorama for FW Mgmt/3. Deploying Panorama .mp4
23. Using Panorama for FW Mgmt/4. Adding FWs to Panorama .mp4
23. Using Panorama for FW Mgmt/5. Device Groups .mp4
23. Using Panorama for FW Mgmt/6. Templates .mp4
23. Using Panorama for FW Mgmt/7. Import FW Configuration .mp4
23. Using Panorama for FW Mgmt/8. Verifying FW Mgmt .mp4
24. Palo Alto Zone, Buffer, and DoS Protection/1. Intro to Zone, Buffer, and DoS Protection .mp4
24. Palo Alto Zone, Buffer, and DoS Protection/2. Protection Overview .mp4
24. Palo Alto Zone, Buffer, and DoS Protection/3. Packet Buffer Protection .mp4
24. Palo Alto Zone, Buffer, and DoS Protection/4. Zone Protection .mp4
24. Palo Alto Zone, Buffer, and DoS Protection/5. DoS Protection Profile and Policy .mp4
25. Palo Alto FW Routing/1. Intro to Palo Alto FW Routing .mp4
25. Palo Alto FW Routing/2. IP Routing Overview .mp4
25. Palo Alto FW Routing/3. Static Routing .mp4
25. Palo Alto FW Routing/4. RIP Routing .mp4
25. Palo Alto FW Routing/5. OSPF Routing .mp4
25. Palo Alto FW Routing/6. BGP Routing .mp4
25. Palo Alto FW Routing/7. Service Routes .mp4
26. Palo Alto GlobalProtect/1. Intro to Palo Alto GlobalProtect .mp4
26. Palo Alto GlobalProtect/2. GlobalProtect Overview .mp4
26. Palo Alto GlobalProtect/3. GlobalProtect Game Plan .mp4
26. Palo Alto GlobalProtect/4. Certificates for GlobalProtect .mp4
26. Palo Alto GlobalProtect/5. GlobalProtect Authentication .mp4
26. Palo Alto GlobalProtect/6. GlobalProtect Portal .mp4
26. Palo Alto GlobalProtect/7. GlobalProtect Gateway .mp4
26. Palo Alto GlobalProtect/8. Testing GlobalProtect .mp4
26. Palo Alto GlobalProtect/9. Logging and Troubleshooting .mp4
27. Panorama HA, Logging, and Troubleshooting/1. Intro to Panorama HA, Logging, & Troubleshooting .mp4
27. Panorama HA, Logging, and Troubleshooting/2. Overview of Panorama HA .mp4
27. Panorama HA, Logging, and Troubleshooting/3. Configure HA .mp4
27. Panorama HA, Logging, and Troubleshooting/4. Automated Commit Recovery .mp4
27. Panorama HA, Logging, and Troubleshooting/5. Panorama Log Collection .mp4
27. Panorama HA, Logging, and Troubleshooting/6. Configure Panorama Mode .mp4
27. Panorama HA, Logging, and Troubleshooting/7. Forwarding Logs to Panorama .mp4
27. Panorama HA, Logging, and Troubleshooting/8. Forwarding From Panorama .mp4
27. Panorama HA, Logging, and Troubleshooting/9. Troubleshooting .mp4
28. Palo Alto Decryption Strategies/1. Intro to Decryption Strategies .mp4
28. Palo Alto Decryption Strategies/2. Decryption Overview .mp4
28. Palo Alto Decryption Strategies/3. Game Plan for SSL Forward Proxy .mp4
28. Palo Alto Decryption Strategies/4. Configure SSL Forward Proxy .mp4
28. Palo Alto Decryption Strategies/5. Game Plan for SSL Inbound Inspection .mp4
28. Palo Alto Decryption Strategies/6. Verify Routing, NAT, and Rights .mp4
28. Palo Alto Decryption Strategies/7. Configure Certificates .mp4
28. Palo Alto Decryption Strategies/8. Configure SSL Inbound Inspection .mp4
28. Palo Alto Decryption Strategies/9. SSH Proxy .mp4
29. Digital Certificates and Palo Alto/1. Intro to Digital Certificates and Palo Alto .mp4
29. Digital Certificates and Palo Alto/2. Digital Certificate Overview .mp4
29. Digital Certificates and Palo Alto/3. Enterprise CA .mp4
29. Digital Certificates and Palo Alto/4. Master Key .mp4
29. Digital Certificates and Palo Alto/5. SSLTLS Service Profiles .mp4
29. Digital Certificates and Palo Alto/6. Additional Certificate Tidbits .mp4
30. Palo Alto NAT, PAT, & Security/1. Intro to NAT, PAT, & Security Best Practices .mp4
30. Palo Alto NAT, PAT, & Security/2. Best Practices Overview .mp4
30. Palo Alto NAT, PAT, & Security/3. Begin with No .mp4
30. Palo Alto NAT, PAT, & Security/4. Permitting Apps .mp4
30. Palo Alto NAT, PAT, & Security/5. Temporary Tuning Rules .mp4
30. Palo Alto NAT, PAT, & Security/6. Using Tags In Security Policy Rules .mp4
30. Palo Alto NAT, PAT, & Security/7. NAT, PAT, and Security Rules .mp4
31. Palo Alto Quality of Service (QoS)/1. Intro to Palo Alto QoS .mp4
31. Palo Alto Quality of Service (QoS)/2. QoS Overview .mp4
31. Palo Alto Quality of Service (QoS)/3. Palo Alto QoS Components .mp4
31. Palo Alto Quality of Service (QoS)/4. QoS Game Plan .mp4
31. Palo Alto Quality of Service (QoS)/5. Create a QoS Profile .mp4
31. Palo Alto Quality of Service (QoS)/6. Create a QoS Policy .mp4
31. Palo Alto Quality of Service (QoS)/7. Apply QoS to Interfaces .mp4
31. Palo Alto Quality of Service (QoS)/8. Modifying QoS .mp4
32. Palo Alto Interface Types/1. Intro to Interface Types .mp4
32. Palo Alto Interface Types/2. Interface Type Overview .mp4
32. Palo Alto Interface Types/3. Tap Interface Configuration .mp4
32. Palo Alto Interface Types/4. Virtual Wire .mp4
32. Palo Alto Interface Types/5. Layer 2 Interfaces .mp4
32. Palo Alto Interface Types/6. VLAN Interfaces .mp4
32. Palo Alto Interface Types/7. Layer 3 Sub-interfaces .mp4
33. Palo Alto Advanced App-ID/1. Into to Advanced App-ID .mp4
33. Palo Alto Advanced App-ID/2. App-ID Overview .mp4
33. Palo Alto Advanced App-ID/3. Apps, Groups, & Filters .mp4
33. Palo Alto Advanced App-ID/4. Custom Apps and Overrides .mp4
33. Palo Alto Advanced App-ID/5. New or Modified App-IDs .mp4
33. Palo Alto Advanced App-ID/6. App Filters for New App-IDs .mp4
33. Palo Alto Advanced App-ID/7. Monitoring New App-IDs .mp4
33. Palo Alto Advanced App-ID/8. Resolving App Dependencies .mp4
34. Palo Alto Authentication Portal/1. Intro to Authentication Portal .mp4
34. Palo Alto Authentication Portal/2. Authentication Portal Overview .mp4
34. Palo Alto Authentication Portal/3. Certificates .mp4
34. Palo Alto Authentication Portal/4. Authentication Settings .mp4
34. Palo Alto Authentication Portal/5. Interface Profile .mp4
34. Palo Alto Authentication Portal/6. Authentication Portal Settings .mp4
34. Palo Alto Authentication Portal/7. Authentication Policy Rules .mp4
34. Palo Alto Authentication Portal/8. Testing Authentication Portal .mp4
34. Palo Alto Authentication Portal/9. Multi Factor Authentication Overview .mp4
35. Palo Alto Dynamic Groups/1. Intro to Dynamic Groups .mp4
35. Palo Alto Dynamic Groups/2. Overview of Dynamic Groups .mp4
35. Palo Alto Dynamic Groups/3. Game Plan for DAG .mp4
35. Palo Alto Dynamic Groups/4. Log Forwarding Profile .mp4
35. Palo Alto Dynamic Groups/5. Create a Dynamic Address Group (DAG) .mp4
35. Palo Alto Dynamic Groups/6. Using the DAG in Policy .mp4
35. Palo Alto Dynamic Groups/7. Dynamic User Groups .mp4
35. Palo Alto Dynamic Groups/8. Dynamic Tag Removal .mp4
36. Palo Alto Firewall Best Practices/1. Intro to Best Practices .mp4
36. Palo Alto Firewall Best Practices/2. Tools for Best Practices .mp4
36. Palo Alto Firewall Best Practices/3. Core Admin Documentation .mp4
36. Palo Alto Firewall Best Practices/4. Decryption Best Practices .mp4
36. Palo Alto Firewall Best Practices/5. User-ID Best Practices .mp4
36. Palo Alto Firewall Best Practices/6. Internet Gateway Best Practices .mp4

TorrentBank
Copyright © 2024