YoVDO

Palo Alto Networks Cybersecurity Essentials I

Offered By: Palo Alto Networks via Coursera

Tags

Network Security Courses Cybersecurity Courses Cryptography Courses Public Key Infrastructure (PKI) Courses

Course Description

Overview

Palo Alto Networks Cybersecurity Essentials I

Course Description:
Essentials I provides the student with a partial understanding of the fundamental tenants of cybersecurity and covers the general security concepts involved in maintaining a secure network computing environment. Students will partially learn the nature and scope of today’s cybersecurity challenges, strategies for network defense, as well as detailed information about next-generation cybersecurity solutions. Students will also deploy a variety of security methodologies as well as technologies and concepts used for implementing a secure network environment.

Learning Objectives:
Upon completion of this course, students will be able to:
• Formulate an industry-standard design to protect infrastructure against cybersecurity threats.
• Apply advanced filtering methodologies such as user, application, and content ID to protect against all known and unknown attack vectors.
• Describe the basics of cryptography including synchronous/asynchronous encryption, PKI, and certificates.

Syllabus

  • Essentials I: Module 1 - Course Information
    • Essentials 1 builds on the knowledge and experience you gained in the Palo Alto Networks Cybersecurity Specialization courses. Carefully evaluate the Course Information and Resources content area, identify the tools and processes you will use in this course, and confirm that you have proper registration and access to the NDG NetLab+ lab environment. *** NEW LAB OS: All NDG labs are now utilizing Palo Alto Networks Firewall OS 9. Lab topics and activities are now performed on the Next Generation Firewall OS 9 platform.
  • Essentials I: Module 2 - Cybersecurity Design Principles
    • In this module students investigate cybersecurity design models that are used to establish Zero Trust reliance and and compliance with standards such as Payment Card Industry [PCI]. Hands-on practices focus on establishing security policies that define secure authentication and Zero Trust connectivity.
  • Essentials I: Module 3 - Security Operating Platform / Firewall Technology
  • Essentials I: Module 4 - Cryptography, PKI, and Certificate Protection

Taught by

James Dalton

Tags

Related Courses

Certified Ethical Hacker (CEH) - Linux Academy's Prep Course
A Cloud Guru
Certified Information Systems Security Professional (CISSP)
A Cloud Guru
CompTIA Security+ Certification Prep
A Cloud Guru
Encryption Fundamentals
A Cloud Guru
LPIC-3 Exam 303: Security
A Cloud Guru