Palo Alto Firewall Training
Join our interactive Palo Alto Firewall training to master advanced firewall skills and prepare for PCNSA and PCNSE certification exams.
in Palo AltoWhat you will learn?
Introduction to different Palo Alto firewall platform including various management interfaces
Configuring and Managing Palo Alto next-generation firewalls with security policies, NAT, security zones etc.
Understanding the fundamentals of application identification, user identification, content inspection, and threat prevention
Learn how to monitor and analyze network traffic using Palo Alto tools. Explore features like logs, reports, and packet captures
Learn how to set up and troubleshoot secure VPN connections using Palo Alto firewalls
Gain an in-depth knowledge on configuring high availability to ensure the continuous operation
About this course
Do you want to build a career in network security? The Palo Alto Firewall Training teaches the fundamentals of network security using the Palo Alto firewall. This course also covered the syllabus of PCNSA and PCNSE certifications, helping you get a major upgrade in your skills and career outlook.
"Include both PCNSA and PCNSE"!
By enrolling in this Palo Alto Firewall training, you can prepare for the Palo Alto Networks Certified Network Security Administrator (PCNSA) and Palo Alto Networks Certified Network Security Engineer (PCNSE) certification exams.
Upon completing this Palo Alto firewall course, you will be experts in designing, deploying, operating, managing, and troubleshooting Palo Alto Networks' next-generation firewalls.
"Interactive Sessions - Ask Questions"
The course will be held in live classes with a limited number of students. The live class format for the course allows students to interact with the teacher, ask questions, and get their questions solved instantly. The live class also helps with efficient learning, as students will be doing practicals with the instructor in free virtual labs provided with the course.
Palo Alto Firewall Course Highlights
|
|
|
|
|
|
Course Prerequisites
Before enrolling in Palo Alto Firewall training, you should be familiar with:
✔ Basic security concepts
✔ Fundamentals of computers and networks
✔ Basic understanding of IP addressing and TCP/IP protocols
Training Class Schedule
The Palo Alto Firewall classes will be held on Saturday and Sunday. Each class will be 3 hours long, and this Palo Alto firewall training will be completed in 4-5 weeks.
"Suitable for Professionals - Weekend Batches"
The weekend classes help work professionals manage their work with online classes.
To know about the next batch starting time, contact our learner advisors.
![]() |
Who should Enroll in the Palo Alto Firewall Course
The Palo Alto Firewall training will benefit security professionals looking to get PCNSA or PCNSE certification. Even if you are not looking for the certification, any professional in the following roles should attend Palo Alto Firewall classes.
- ● Network Security Specialist
- ● Network Security Analyst
- ● Network Specialist
- ● Network Security Consultants OR
- ● Any Network Security Professionals
Why Enroll in the Palo Alto Training
The online Palo Alto training offers numerous benefits for students. Classes are conveniently scheduled on weekends, and instruction is provided by certified professionals to ensure optimal exam preparation.
The training is affordably priced and includes hands-on practical experience using real-life scenarios. Additionally, students gain industry-relevant skills that can be highlighted on their resumes, enhancing their career prospects.
Lab Devices Used in Palo Alto Firewall Course
For the best Palo Alto Training online, students will get access to the Palo Alto virtual lab for hands-on practice. The virtual lab will use the following networking devices:
- ● Three Cisco routers
- ● One Switch
- ● Two Palo Alto Firewalls
- ● One Window Server
- ● One Workstation with Windows OS
List of Lab Tasks in Training
During the duration of the course, students will practice with the following lab practicals on the Palo Alto Firewall:
- ✔ Initialization
- ✔ Implementation of Zones and Virtual Routes, and L3 Interface
- ✔ Security Policy Implementation
- ✔ High Availability
- ✔ Static Nat Implementation
- ✔ Dynamic Nat implementation
- ✔ Site to Site VPN
- ✔ Layer 3 Sub-interface
- ✔ Interface type Virtual Wire
- ✔ Syslog
These tasks are designed to cover all important lab knowledge. Students can access the Palo Alto Virtual Lab for practice.
Related Exams
This online Palo Alto firewall training will prepare you for the PCNSA and PCNSE certification exams.
The details of these certifications are as follows:
1. PCNSA
Certification Name: Palo Alto Networks Certified Network Security Administrator
Exam Code: PCNSA
Exam Duration: 80 Minutes
Exam Cost: 160 USD + Tax
Language: English
2. PCNSE
Certification Name: Palo Alto Networks Certified Network Security Engineer
Exam Code: PCNSE
Exam Duration: 80 Minutes
Exam Cost: 160 USD + Tax
Language: English
Suggested by top companies
Top companies suggest this course to their employees and staff.



Requirements
Good understanding and knowledge on TCP/IP protocol suits and OSI layer model
Basic understanding and configuration knowledge of routing and switching concepts
Fundamental knowledge on information security and basic security concepts
Working knowledge on at least any one firewall other than Palo Alto is recommended (Not Mandatory)
Similar Courses
FAQ
Comments (1)
I will be covering Palo Alto firewall certification details in this session.
This Is Palo Alto Course Content
1.What is Firewall ?
2.Why Palo Alto?
3.Packet Flow of Palo Alto
4.Initial setup of Palo Alto Firewall
5. Policy
6.Zone
7.Q&A
In this session, I will cover "Demonstrate knowledge of firewall management interfaces" including following topics:
✔ Management interfaces
✔ Methods of access
✔ Access restrictions
✔ Identity-management traffic flow
✔ Management services
✔ Service routes
In this session, I will explain about provision local administrators with these points:
✔ Authentication profile
✔ Authentication sequence
In this session you will learn about "Maintain firewall configurations" including following points:
✔ Running configuration
✔ Candidate configuration
✔ Discern when to use load, save, import, and export
✔ Differentiate between configuration states
✔ Back up Panorama configurations and firewalls from Panorama
In this session you will learn about "Push policy updates to Panorama-managed firewalls" with following points:
✔ Device groups and hierarchy
✔ Where to place policies
✔ Implications of Panorama management
✔ Impact of templates, template stacks, and hierarchy
In this session, you will learn about "Schedule and install dynamic updates" with below points:
✔ From Panorama
✔ From the firewall
✔ Scheduling and staggering updates on an HA pair
In this session, I will cover "Create and apply security zones to policies" with following points:
✔ Identify zone types
✔ External types
✔ Layer 2
✔ Layer 3
✔ TAP
✔ VWire
✔ Tunnel
In this session, I will cover "Identify and configure firewall interfaces" with these points:
✔ Different types of interfaces
✔ How interface types affect Security policies
This session will provide clear understanding of "Maintain and enhance the configuration of a virtual or logical router" with below points:
✔ Steps to create a static route
✔ How to use the routing
table
✔ What interface types can be added to a virtual or logical router
✔ How to configure route monitoring
This session will provide you in-depth concepts of "Create and maintain address and address group objects" with following points"
✔ How to tag objects
✔ Differentiate between address objects
✔ Static groups versus dynamic groups
In this session, I will cover "Configure and maintain application filters and application groups" with following topics:
✔ When to use filters versus groups
✔ The purpose of application characteristics as defined in the App-ID database
In this session you will learn about "Develop the appropriate application-based Security policy" with given points:
✔ Create an appropriate App-ID rule
✔ Rule shadowing
✔ Group rules by tag
✔ The potential impact of App-ID updates to existing Security policy rules
✔ Policy usage statistics
✔ Interzone
✔ Intrazone
✔ Universal
In this session, I will cover "Configure Security policy match conditions, actions, and logging
options" with given points:
✔ Application filters and groups
✔ Logging options
✔ App-ID
✔ User-ID
✔ Device-ID
✔ Application filter in policy
✔ Application group in policy
✔ EDLs
In this session, I will cover "Identify and implement proper NAT policies" with given course topics:
✔ Destination
✔ Source
In this session, you will learn about "Optimize Security policies using appropriate tools" with below points:
✔ Policy test match tool
✔ Policy Optimizer
In this session, you will learn "Compare and contrast different types of Security profiles" with given points:
✔ Antivirus
✔ Anti-Spyware
✔ Vulnerability Protection
✔ URL Filtering
✔ WildFire Analysis
In this session, you will learn "Create, modify, add, and apply the appropriate Security profiles and
groups" with below points:
✔ Antivirus
✔ Anti-Spyware
✔ Vulnerability Protection
✔ URL Filtering
✔ WildFire Analysis
✔ Configure threat prevention policy
In this session, you will learn "Use information available in logs" with following points:
✔ Traffic
✔ Threat
✔ Data
✔ System logs
In this session you will learn about "Enable DNS Security to control traffic based on domains" with below points:
✔ Configure DNS Security
✔ Apply DNS Security in policy
In this session, you will learn about "Create and deploy URL-filtering-based controls" with below points:
✔ Apply a URL profile in a Security policy
✔ Create a URL Filtering profile
✔ Create a custom URL category
✔ Control traffic based on a URL category
✔ Why a URL was blocked
✔ How to allow a blocked URL
✔ How to request a URL recategorization
In this session, you will learn about "Differentiate between group mapping and IP-to-user mapping
within policies and logs" with below points:
✔ How to control access to specific locations
✔ How to apply to specific policies
✔ Identify users within the ACC and the monitor tab
This session will teach you about "Identify how Palo Alto Networks products work together to improve PAN-OS services" with below points:
Security components
✔ Firewall components
✔ Panorama components
✔ PAN-OS subscriptions and the features they enable
✔ Plug-in components
✔ Heatmap and BPA reports
✔ Artificial intelligence operations (AIOps)/Telemetry
✔ IPv6
✔ Internet of things (IoT)
This session will teach you about "Determine and assess appropriate interface or zone types for various environments" with following points:
✔ Layer 2 interfaces
✔ Layer 3 interfaces
✔ Virtual wire (vwire) interfaces
✔ Tap interfaces
✔ Subinterfaces
✔ Tunnel interfaces
✔ Aggregate interfaces
✔ Loopback interfaces
✔ Decrypt mirror interfaces
✔ VLAN interfaces
This session will provide you clear understanding of "Identify decryption deployment strategies" with following points:
✔ Risks and implications of enabling decryption
✔ Use cases
✔ Decryption types
✔ Decryption profiles and certificates
✔ Create decryption policy in the firewall
✔ Configure SSH Proxy
In this session you will learn about detained knowledge of "Enforce User-ID" with following points:
✔ Methods of building user-to-IP mappings
✔ Determine if User-ID agent or agentless should be used
✔ Compare and contrast User-ID agents
✔ Methods of User-ID redistribution
✔ Methods of group mapping
✔ Server profile & authentication profile
In this session, you will learn about "Determine how and when to use the Authentication policy" with given points:
✔ Purpose of, and use case for, the Authentication policy
✔ Dependencies
✔ Captive portal versus GlobalProtect (GP) client
This session will help you to define multiple virtual systems (multi-vsys) environment with following topics:
✔ User-ID hub
✔ Inter-vsys routing
✔ Service routes
✔ Administration
This session will provide good understanding of "Configuration of management profiles" with these points:
✔ Interface management profile
✔ SSL/TLS service profile
This lab based session will provide clear understanding of "deployment and configuration of security profiles" with these points:
✔ Custom configuration of different Security profiles and Security profile
groups
✔ Relationship between URL filtering and credential theft prevention
✔ Use of username and domain name in HTTP header insertion
✔ DNS Security
✔ How to tune or add exceptions to a Security profile
✔ Compare and contrast threat prevention and advanced threat prevention
✔ Compare and contrast URL Filtering and Advanced URL Filtering
This session will provide good understanding of "how to configure zone protection, packet buffer protection, and DoS protection" with these points:
✔ Customized values versus default settings
✔ Classified versus aggregate profile types
✔ Layer 3 and Layer 4 header inspection
Learn how to design the deploy configuration of a Palo Alto Networks firewall in this session with these points:
✔ Advanced high availability (HA) deployments
✔ HA pair
✔ Zero Touch Provisioning (ZTP)
✔ Bootstrapping
This session will teach you how to configure authorization, authentication, and device access with these points:
✔ Role-based access control for authorization
✔ Different methods used to authenticate
✔ The authentication sequence
✔ The device access method
You will learn how to configure and manage certificates with below points in this session:
✔ Usage
✔ Profiles
✔ Chains
This session will cover how to configure routing, NAT and site-to-site tunnels with following points:
✔ Dynamic routing
✔ Redistribution profiles
✔ Static routes
✔ Path monitoring
✔ Policy-based forwarding
✔ Virtual router versus logical router
✔ NAT policy rules
✔ Security rules
✔ Source NAT
✔ No NAT
✔ Use session browser to find NAT rule name
✔ U-Turn NAT
✔ Check HIT counts
✔ IPSec components
✔ Static peers and dynamic peers for IPSec
✔ IPSec tunnel monitor profiles
✔ IPSec tunnel testing
✔ Generic Routing Encapsulation (GRE)
✔ One-to-one and one-to-many tunnels
✔ Determine when to use proxy IDs
In this session you will learn about "service routes and application-based QoS configuration with these points:
✔ Default
✔ Custom
✔ Destination
✔ Custom routes for different vsys versus destination routes
✔ How to verify service routes
✔ Enablement requirements
✔ QoS policy rule
✔ Add DSCP/TOS component
✔ QoS profile
✔ Determine how to control bandwidth use on a per-application basis
✔ Use QoS to monitor bandwidth utilization
In this session you will learn about how to configure App-ID, GlobalProtect, decryption, User-ID with following points:
✔ Create security rules with App-ID
✔ Convert port and protocol rules to App-ID rules
✔ Identify the impact of application override to the overall functionality of the firewall
✔ Create custom apps and threats
✔ Review App-ID dependencies
✔ GlobalProtect licensing
✔ Configure gateway and portal
✔ GlobalProtect agent
✔ Differentiate between login methods
✔ Configure Clientless VPN
✔ Host information profile (HIP)
✔ Configure multip
✔ Split tunneling
✔ Inbound decryption
✔ SSL forward proxy
✔ SSL decryption exclusions
✔ SSH proxy
✔ User-ID agent and agentless
✔ User-ID group mapping
✔ Shared User-ID mapping across virtual systems
✔ Data redistribution
✔ User-ID methods
✔ Benefits of using dynamic user groups in policy rules
✔ Requirements to support dynamic user groups
✔ How GlobalProtect internal and external gateways can be used
In this session you will learn about how to configure WildFire and Web Proxy with these points:
✔ Submission profile
✔ Action profile
✔ Submissions and verdicts
✔ Signature actions
✔ File types and file sizes
✔ Update schedule
✔ Forwarding of decrypted traffic
✔ Transparent proxy
✔ Explicit proxy
In this session you will learn about how to configure templates and template stacks and device groups with following points:
✔ Components configured in a template
✔ How the order of templates in a stack affects the configuration push to a firewall
✔ Overriding a template value in a stack
✔ Configure variables in templates
✔ Relationship between Panorama and devices as pertaining to dynamic updates versions, policy implementation, and/or HA peers
✔ Device group hierarchies
✔ Identify what device groups contain
✔ Differentiate between different use cases for pre-rules, local rules, the default rules, and post-rules
✔ Identify the impact of configuring a primary device
✔ Assign firewalls to device groups
In this session you will learn about how to configure firewalls within Panorama with these points:
✔ Licensing
✔ Commit recovery feature
✔ Automatic commit recovery
✔ Commit types and schedules
✔ Config backups
✔ Commit type options
✔ Manage dynamic updates for Panorama and Panorama-managed devices
✔ Software and dynamic updates
✔ Import firewall configuration into Panorama
✔ Configure log collectors
✔ Check firewall health and status from Panorama
✔ Configure role-based access on Panorama
In this session you will learn about how to manage and configure Log Forwarding with these points:
✔ Identify log types and criticalities
✔ Manage external services
✔ Create and manage tags
✔ Identify system and traffic issues using the web interface and CLI tools
✔ Configure Log Forwarding profile and device log settings
✔ Log monitoring
✔ Customize logging and reporting settings
This session will provide clear understanding of plan and execution of the process to upgrade a Palo Alto Networks system with following points:
✔ Single firewall
✔ HA pairs
✔ Panorama push
✔ Dynamic updates
In this session you will learn to manage HA functions with these points:
✔ Link monitoring
✔ Path monitoring
✔ HA links
✔ Failover
✔ Active/active and active/passive
✔ HA interfaces
✔ Clustering
✔ Election setting
In this session you will learn about Troubleshooting including site-to-site tunnels, interfaces, decryption, routing, general, resource protections, GlobalProtect, policies, HA functions troubleshooting with these points:
✔ IPSec
✔ GRE
✔ One-to-one and one-to-many tunnels
✔ Route-based versus policy-based remote hosts
✔ Tunnel monitoring
✔ Transceivers
✔ Settings
✔ Aggregate interfaces, LACP
✔ Counters
✔ Tagging
✔ Inbound decryption
✔ SSL forward proxy
✔ SSH proxy
✔ Identify what cannot be decrypted and configure exclusions and bypasses
✔ Certificates
✔ Dynamic routing
✔ Redistribution profiles
✔ Static routes
✔ Route monitoring
✔ Policy-based forwarding
✔ Multicast routing
✔ Service routes
✔ Logs
✔ Packet capture (pcap)
✔ Reports
✔ Zone protection profiles
✔ DoS protections
✔ Packet buffer protections
✔ Portal and Gateway
✔ Access to resources
✔ GlobalProtect client
✔ NAT
✔ Security
✔ Decryption
✔ Authentication
✔ Monitor
✔ Failover triggers

is the certification cost included in this training? please contact me I want to join this online training on palo alto asap.
I think its not included, they have also mentioned the same in FAQ. I am also going to join their upcoming back. I have already enrolled. You can directly contact uninets sales team for enrollment.