YoVDO

Palo Alto Networks Cybersecurity Gateway II

Offered By: Palo Alto Networks via Coursera

Tags

Network Security Courses Cybersecurity Courses Cloud Computing Courses Virtualization Courses

Course Description

Overview

Cybersecurity Gateway II

Gateway II Course Description
Gateway II provides the student with a full understanding of the fundamental tenants of networking and covers the general concepts involved in maintaining a secure network computing environment. Upon successful completion of this course, students will be able to fully examine, describe general networking fundamentals and implement basic networking configuration techniques.

Gateway II Learning Objectives:
Upon completion of this course, students will be able to:
• Examine cybersecurity landscape environments, attack threat vectors, exposure, vulnerabilities, and risk factors.
• Accurately explain common use of cloud, virtualization, storage, backup, and recovery procedures.
• Apply the knowledge and skills necessary to plan, design, implement, troubleshoot, and maintain network infrastructure environments.

Syllabus

  • GATEWAY II: MODULE 1 - COURSE INFORMATION
    • ** Gateway II builds on top of the networking fundamentals content that was discovered in Gateway I.** Begin your Gateway II experience here. Carefully evaluate the Course Information and Resources content area and identify the tools and processes you will use in this course. *** NEW LAB OS: All NDG labs are now utilizing Palo Alto Networks Firewall OS 9. Lab topics and activities are now performed on the Next Generation Firewall OS 9 platform.
  • Gateway II: Module 2 - Cybersecurity Landscape and Threats
    • The term Cybersecurity Landscape is complex and difficult to define as it is ever changing. In this module security professionals will focus on identifying best practices for assessing and mitigating network vulnerabilities and their associated threats.
  • Gateway II: Module 3 - Cloud, Virtualization and Storage Security
    • Terms like 'redundancy', 'scalability', 'availability' and 'trust' are commonly used when describing either Cloud, Virtualization or Storage environments. Module 3 helps students apply those terms in specific relationships with cloud components, cloud connectivity, virtual services and storage management.
  • Gateway II: Module 4 - Networking Concepts and Principles
    • Networking and Security best practices often go hand in hand. You always begin by inventorying your resources and assets and identifying their vulnerabilities. Then you can apply appropriate measures to limit the threats that could exploit those vulnerabilities. In this module students will analyze different network appliances and define the troubleshooting measures that can be used to identify and remedy risks and vulnerabilities.

Taught by

James Dalton

Tags

Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera