1/2. Understand How Palo Alto Networks Products Work Together/1. Course Introduction and Legacy Firewall Overview.mp411.9 MB
1/2. Understand How Palo Alto Networks Products Work Together/1. Course Introduction and Legacy Firewall Overview.srt12.6 KB
1/2. Understand How Palo Alto Networks Products Work Together/2. Next-generation Firewall Overview.mp44.9 MB
1/2. Understand How Palo Alto Networks Products Work Together/2. Next-generation Firewall Overview.srt6.1 KB
1/2. Understand How Palo Alto Networks Products Work Together/3. Strata- Palo Alto Networks_ Next-generation Firewall.mp48.9 MB
1/2. Understand How Palo Alto Networks Products Work Together/3. Strata- Palo Alto Networks_ Next-generation Firewall.srt10.6 KB
1/2. Understand How Palo Alto Networks Products Work Together/4. Network Diagram.mp411.5 MB
1/2. Understand How Palo Alto Networks Products Work Together/4. Network Diagram.srt7.1 KB
1/2. Understand How Palo Alto Networks Products Work Together/5. Strata- Panorama and Security Subscriptions.mp49.8 MB
1/2. Understand How Palo Alto Networks Products Work Together/5. Strata- Panorama and Security Subscriptions.srt10.0 KB
1/2. Understand How Palo Alto Networks Products Work Together/6. Prisma and Cortex Product Lines.mp44.0 MB
1/2. Understand How Palo Alto Networks Products Work Together/6. Prisma and Cortex Product Lines.srt5.2 KB
1/3. Initialize and License the Palo Alto Firewall/1. Initializing the Palo Alto Firewall.mp411.9 MB
1/3. Initialize and License the Palo Alto Firewall/1. Initializing the Palo Alto Firewall.srt10.0 KB
1/3. Initialize and License the Palo Alto Firewall/2. GUI Overview and Management Settings.mp423.7 MB
1/3. Initialize and License the Palo Alto Firewall/2. GUI Overview and Management Settings.srt15.9 KB
1/3. Initialize and License the Palo Alto Firewall/3. Licensing the Firewall.mp419.5 MB
1/3. Initialize and License the Palo Alto Firewall/3. Licensing the Firewall.srt14.0 KB
1/3. Initialize and License the Palo Alto Firewall/4. Configuration Management.mp413.9 MB
1/3. Initialize and License the Palo Alto Firewall/4. Configuration Management.srt11.1 KB
1/4. Administer the Palo Alto Firewall/1. Authentication Servers, Profiles, and Sequences.mp49.5 MB
1/4. Administer the Palo Alto Firewall/1. Authentication Servers, Profiles, and Sequences.srt8.0 KB
1/4. Administer the Palo Alto Firewall/2. Configure Authentication Profiles.mp48.2 MB
1/4. Administer the Palo Alto Firewall/2. Configure Authentication Profiles.srt6.0 KB
1/4. Administer the Palo Alto Firewall/3. Admin Roles and Administrator Accounts.mp44.6 MB
1/4. Administer the Palo Alto Firewall/3. Admin Roles and Administrator Accounts.srt6.7 KB
1/4. Administer the Palo Alto Firewall/4. Configure Administrative Accounts.mp418.0 MB
1/4. Administer the Palo Alto Firewall/4. Configure Administrative Accounts.srt14.2 KB
1/4. Administer the Palo Alto Firewall/5. Verify and Troubleshoot Administrator Login.mp49.4 MB
1/4. Administer the Palo Alto Firewall/5. Verify and Troubleshoot Administrator Login.srt5.5 KB
1/4. Administer the Palo Alto Firewall/6. Admin Level Commit.mp47.8 MB
1/4. Administer the Palo Alto Firewall/6. Admin Level Commit.srt4.9 KB
1/5. Update the Palo Alto Firewall/1. Potential Downfalls of Upgrading Content on a Palo Alto Firewall.mp48.3 MB
1/5. Update the Palo Alto Firewall/1. Potential Downfalls of Upgrading Content on a Palo Alto Firewall.srt9.2 KB
1/5. Update the Palo Alto Firewall/2. Updating Content ID.mp423.0 MB
1/5. Update the Palo Alto Firewall/2. Updating Content ID.srt13.8 KB
1/5. Update the Palo Alto Firewall/3. Upgrading the PAN OS on a Standalone Firewall.mp430.2 MB
1/5. Update the Palo Alto Firewall/3. Upgrading the PAN OS on a Standalone Firewall.srt14.1 KB
1/6. Configure Security Zones and Layer 3 Interfaces/1. Deployment Methods (Interface Types).mp412.2 MB
1/6. Configure Security Zones and Layer 3 Interfaces/1. Deployment Methods (Interface Types).srt11.2 KB
1/6. Configure Security Zones and Layer 3 Interfaces/2. Configuring Security Zones.mp427.3 MB
1/6. Configure Security Zones and Layer 3 Interfaces/2. Configuring Security Zones.srt19.2 KB
1/6. Configure Security Zones and Layer 3 Interfaces/3. Configuring Layer 3 Interfaces and Interface Management Profiles.mp420.8 MB
1/6. Configure Security Zones and Layer 3 Interfaces/3. Configuring Layer 3 Interfaces and Interface Management Profiles.srt14.5 KB
1/6. Configure Security Zones and Layer 3 Interfaces/4. Virtual Router Overview.mp47.7 MB
1/6. Configure Security Zones and Layer 3 Interfaces/4. Virtual Router Overview.srt6.1 KB
1/6. Configure Security Zones and Layer 3 Interfaces/5. Configuring the Virtual Router to Use OSPF.mp413.4 MB
1/6. Configure Security Zones and Layer 3 Interfaces/5. Configuring the Virtual Router to Use OSPF.srt9.4 KB
1/6. Configure Security Zones and Layer 3 Interfaces/6. Verifying OSPF.mp416.1 MB
1/6. Configure Security Zones and Layer 3 Interfaces/6. Verifying OSPF.srt9.7 KB
1/7. Understand App-ID and Other Objects/1. App-ID Overview.mp49.0 MB
1/7. Understand App-ID and Other Objects/1. App-ID Overview.srt8.5 KB
1/7. Understand App-ID and Other Objects/2. Applications, Application Filters, and Application Groups.mp428.1 MB
1/7. Understand App-ID and Other Objects/2. Applications, Application Filters, and Application Groups.srt17.5 KB
1/7. Understand App-ID and Other Objects/3. Create Address Objects and Address Groups.mp412.4 MB
1/7. Understand App-ID and Other Objects/3. Create Address Objects and Address Groups.srt10.5 KB
1/7. Understand App-ID and Other Objects/4. External Dyanmic Lists and Security Profiles.mp423.6 MB
1/7. Understand App-ID and Other Objects/4. External Dyanmic Lists and Security Profiles.srt15.0 KB
1/7. Understand App-ID and Other Objects/5. Tags.mp412.2 MB
1/7. Understand App-ID and Other Objects/5. Tags.srt8.5 KB
1/8. Shape Traffic Using Security Policy Rules/1. Security Policy Rules - Define the Matching Criteria.mp413.7 MB
1/8. Shape Traffic Using Security Policy Rules/1. Security Policy Rules - Define the Matching Criteria.srt11.1 KB
1/8. Shape Traffic Using Security Policy Rules/2. Security Policy Rules - Define the Actions.mp45.7 MB
1/8. Shape Traffic Using Security Policy Rules/2. Security Policy Rules - Define the Actions.srt5.8 KB
1/8. Shape Traffic Using Security Policy Rules/3. Create the First Security Rule.mp422.1 MB
1/8. Shape Traffic Using Security Policy Rules/3. Create the First Security Rule.srt16.4 KB
1/8. Shape Traffic Using Security Policy Rules/4. Test the Initial Internet Gateway Policy.mp421.5 MB
1/8. Shape Traffic Using Security Policy Rules/4. Test the Initial Internet Gateway Policy.srt11.5 KB
1/8. Shape Traffic Using Security Policy Rules/5. Allow Management Updates on a Dataplane Interface and Allow OOBM Access.mp419.1 MB
1/8. Shape Traffic Using Security Policy Rules/5. Allow Management Updates on a Dataplane Interface and Allow OOBM Access.srt11.7 KB
1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/1. Internet Gateway Best Practice Security Rules.mp431.6 MB
1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/1. Internet Gateway Best Practice Security Rules.srt21.3 KB
1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/2. Datacenter Best Practice Security Rules.mp424.4 MB
1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/2. Datacenter Best Practice Security Rules.srt16.8 KB
1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/3. Monitor Applications and Optimize Policies.mp419.0 MB
1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/3. Monitor Applications and Optimize Policies.srt10.8 KB
1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/4. Course Summary.mp46.7 MB
1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/4. Course Summary.srt8.1 KB
2/1. Course Overview/1. Course Overview.mp43.6 MB
2/1. Course Overview/1. Course Overview.srt2.4 KB
2/2. Changing IP Addresses Using Network Address Translation/1. Course Intro.mp43.8 MB
2/2. Changing IP Addresses Using Network Address Translation/1. Course Intro.srt4.8 KB
2/2. Changing IP Addresses Using Network Address Translation/2. Overview of NAT and Why We Use It.mp45.0 MB
2/2. Changing IP Addresses Using Network Address Translation/2. Overview of NAT and Why We Use It.srt6.8 KB
2/2. Changing IP Addresses Using Network Address Translation/3. Types of NAT You Can Configure.mp410.2 MB
2/2. Changing IP Addresses Using Network Address Translation/3. Types of NAT You Can Configure.srt13.0 KB
2/2. Changing IP Addresses Using Network Address Translation/4. Flow Logic on the Palo Alto.mp49.6 MB
2/2. Changing IP Addresses Using Network Address Translation/4. Flow Logic on the Palo Alto.srt9.1 KB
2/3. Configuring NAT on the Palo Alto Firewall/1. Introduction.mp46.9 MB
2/3. Configuring NAT on the Palo Alto Firewall/1. Introduction.srt8.2 KB
2/3. Configuring NAT on the Palo Alto Firewall/2. Configuring Static Source NAT.mp418.0 MB
2/3. Configuring NAT on the Palo Alto Firewall/2. Configuring Static Source NAT.srt15.3 KB
2/3. Configuring NAT on the Palo Alto Firewall/3. Verifying NAT.mp49.4 MB
2/3. Configuring NAT on the Palo Alto Firewall/3. Verifying NAT.srt6.0 KB
2/3. Configuring NAT on the Palo Alto Firewall/4. Configuring Dynamic NAT And DIPP.mp412.0 MB
2/3. Configuring NAT on the Palo Alto Firewall/4. Configuring Dynamic NAT And DIPP.srt9.7 KB
2/3. Configuring NAT on the Palo Alto Firewall/5. Configuring Destination NAT.mp423.4 MB
2/3. Configuring NAT on the Palo Alto Firewall/5. Configuring Destination NAT.srt16.7 KB
2/3. Configuring NAT on the Palo Alto Firewall/6. Verifying NAT, Part II.mp413.5 MB
2/3. Configuring NAT on the Palo Alto Firewall/6. Verifying NAT, Part II.srt8.1 KB
2/3. Configuring NAT on the Palo Alto Firewall/7. Configuring U-turn NAT and No-NAT.mp420.8 MB
2/3. Configuring NAT on the Palo Alto Firewall/7. Configuring U-turn NAT and No-NAT.srt12.2 KB
2/3. Configuring NAT on the Palo Alto Firewall/8. Bidirectional NAT.mp44.5 MB
2/3. Configuring NAT on the Palo Alto Firewall/8. Bidirectional NAT.srt5.4 KB
2/4. Understanding the Concepts of VPNs/1. Introduction.mp4960.4 KB
2/4. Understanding the Concepts of VPNs/1. Introduction.srt1.4 KB
2/4. Understanding the Concepts of VPNs/2. VPN Basics.mp42.7 MB
2/4. Understanding the Concepts of VPNs/2. VPN Basics.srt4.3 KB
2/4. Understanding the Concepts of VPNs/3. IKE VPNs Using IPSec.mp48.3 MB
2/4. Understanding the Concepts of VPNs/3. IKE VPNs Using IPSec.srt12.9 KB
2/4. Understanding the Concepts of VPNs/4. SSL VPNs.mp43.1 MB
2/4. Understanding the Concepts of VPNs/4. SSL VPNs.srt5.9 KB
2/4. Understanding the Concepts of VPNs/5. Route Base vs Policy Based VPNs.mp43.7 MB
2/4. Understanding the Concepts of VPNs/5. Route Base vs Policy Based VPNs.srt5.9 KB
2/5. Configuring S2S VPNs on the Palo Alto Firewall/1. Introduction.mp41.3 MB
2/5. Configuring S2S VPNs on the Palo Alto Firewall/1. Introduction.srt2.0 KB
2/5. Configuring S2S VPNs on the Palo Alto Firewall/2. Configuring a Site to Site VPN Overview.mp42.4 MB
2/5. Configuring S2S VPNs on the Palo Alto Firewall/2. Configuring a Site to Site VPN Overview.srt3.0 KB
2/5. Configuring S2S VPNs on the Palo Alto Firewall/3. Configuring a Site to Site VPN with a Palo Alto Firewall.mp421.6 MB
2/5. Configuring S2S VPNs on the Palo Alto Firewall/3. Configuring a Site to Site VPN with a Palo Alto Firewall.srt15.2 KB
2/5. Configuring S2S VPNs on the Palo Alto Firewall/4. Using Certificates with Site to Site VPNs.mp49.5 MB
2/5. Configuring S2S VPNs on the Palo Alto Firewall/4. Using Certificates with Site to Site VPNs.srt7.2 KB
2/5. Configuring S2S VPNs on the Palo Alto Firewall/5. Configuring a Site to Site with a Cisco IOS Router.mp415.5 MB
2/5. Configuring S2S VPNs on the Palo Alto Firewall/5. Configuring a Site to Site with a Cisco IOS Router.srt9.2 KB
2/5. Configuring S2S VPNs on the Palo Alto Firewall/6. Troubleshooting Site to Site VPNs.mp421.7 MB
2/5. Configuring S2S VPNs on the Palo Alto Firewall/6. Troubleshooting Site to Site VPNs.srt13.1 KB
2/6. Using Global Connect to Configure Remote Access VPNs/1. Introduction.mp41.6 MB
2/6. Using Global Connect to Configure Remote Access VPNs/1. Introduction.srt2.2 KB
2/6. Using Global Connect to Configure Remote Access VPNs/2. Global Protect Overview and Components.mp45.3 MB
2/6. Using Global Connect to Configure Remote Access VPNs/2. Global Protect Overview and Components.srt7.6 KB
2/6. Using Global Connect to Configure Remote Access VPNs/3. Configuring GlobalProtect Prerequisites.mp48.9 MB
2/6. Using Global Connect to Configure Remote Access VPNs/3. Configuring GlobalProtect Prerequisites.srt8.4 KB
2/6. Using Global Connect to Configure Remote Access VPNs/4. Configuring GlobalProtect Gateways.mp421.5 MB
2/6. Using Global Connect to Configure Remote Access VPNs/4. Configuring GlobalProtect Gateways.srt16.9 KB
2/6. Using Global Connect to Configure Remote Access VPNs/5. Configuring GlobalProtect Portals.mp411.8 MB
2/6. Using Global Connect to Configure Remote Access VPNs/5. Configuring GlobalProtect Portals.srt9.8 KB
2/6. Using Global Connect to Configure Remote Access VPNs/6. Configuring Security Rules for GlobalProtect.mp47.1 MB
2/6. Using Global Connect to Configure Remote Access VPNs/6. Configuring Security Rules for GlobalProtect.srt4.3 KB
2/6. Using Global Connect to Configure Remote Access VPNs/7. Connecting a Client to the VPN Using the GlobalProtect App.mp416.1 MB
2/6. Using Global Connect to Configure Remote Access VPNs/7. Connecting a Client to the VPN Using the GlobalProtect App.srt9.5 KB
3/1. Course Overview/1. Course Overview.mp43.4 MB
3/1. Course Overview/1. Course Overview.srt2.3 KB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/01. Course Intro.mp44.5 MB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/01. Course Intro.srt6.0 KB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/02. New Features in PAN-OS 9.0, Overview of the Network Diagram, and Content ID Introduction.mp48.0 MB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/02. New Features in PAN-OS 9.0, Overview of the Network Diagram, and Content ID Introduction.srt10.8 KB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/03. Configuring Antivirus.mp436.5 MB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/03. Configuring Antivirus.srt20.6 KB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/04. Configuring Anti-Spyware.mp411.7 MB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/04. Configuring Anti-Spyware.srt9.0 KB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/05. Configuring Vulnerability Protection.mp414.7 MB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/05. Configuring Vulnerability Protection.srt8.3 KB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/06. Configuring URL Filtering.mp421.1 MB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/06. Configuring URL Filtering.srt17.1 KB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/07. Configuring Data Filtering.mp417.0 MB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/07. Configuring Data Filtering.srt14.7 KB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/08. Configuring Zone Protection Profiles.mp421.5 MB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/08. Configuring Zone Protection Profiles.srt18.8 KB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/09. Configuring DoS Protection Profiles.mp414.8 MB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/09. Configuring DoS Protection Profiles.srt15.8 KB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/10. Best Practices.mp420.1 MB
3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/10. Best Practices.srt17.0 KB
3/3. Integrating with WildFire® and AutoFocus™/1. Module Introduction _ Flow Logic.mp42.4 MB
3/3. Integrating with WildFire® and AutoFocus™/1. Module Introduction _ Flow Logic.srt3.2 KB
3/3. Integrating with WildFire® and AutoFocus™/2. WildFire® _ AutoFocus™ Overview.mp411.0 MB
3/3. Integrating with WildFire® and AutoFocus™/2. WildFire® _ AutoFocus™ Overview.srt16.6 KB
3/3. Integrating with WildFire® and AutoFocus™/3. Configuring WildFire® _ File Blocking.mp420.3 MB
3/3. Integrating with WildFire® and AutoFocus™/3. Configuring WildFire® _ File Blocking.srt13.1 KB
3/3. Integrating with WildFire® and AutoFocus™/4. Verifying File Blocking _ WildFire®.mp428.4 MB
3/3. Integrating with WildFire® and AutoFocus™/4. Verifying File Blocking _ WildFire®.srt19.2 KB
3/3. Integrating with WildFire® and AutoFocus™/5. Threat Vault _ WildFire® Portal.mp414.6 MB
3/3. Integrating with WildFire® and AutoFocus™/5. Threat Vault _ WildFire® Portal.srt9.3 KB
3/3. Integrating with WildFire® and AutoFocus™/6. Security Profile Groups _ Security Rule Audit Logs.mp410.5 MB
3/3. Integrating with WildFire® and AutoFocus™/6. Security Profile Groups _ Security Rule Audit Logs.srt8.9 KB
3/3. Integrating with WildFire® and AutoFocus™/7. Implementing AutoFocus.mp44.3 MB
3/3. Integrating with WildFire® and AutoFocus™/7. Implementing AutoFocus.srt5.8 KB
3/4. Joining the Enterprise PKI Infrastructure/1. Module Introduction.mp41.4 MB
3/4. Joining the Enterprise PKI Infrastructure/1. Module Introduction.srt1.9 KB
3/4. Joining the Enterprise PKI Infrastructure/2. Certificate Authorities, Certificate Signing Requests, and Public Key Infrastructure(1).mp46.2 MB
3/4. Joining the Enterprise PKI Infrastructure/2. Certificate Authorities, Certificate Signing Requests, and Public Key Infrastructure(1).srt7.6 KB
3/4. Joining the Enterprise PKI Infrastructure/2. Certificate Authorities, Certificate Signing Requests, and Public Key Infrastructure.mp46.2 MB
3/4. Joining the Enterprise PKI Infrastructure/2. Certificate Authorities, Certificate Signing Requests, and Public Key Infrastructure.srt7.6 KB
3/4. Joining the Enterprise PKI Infrastructure/3. Generating a CSR _ Installing a Certificate.mp416.3 MB
3/4. Joining the Enterprise PKI Infrastructure/3. Generating a CSR _ Installing a Certificate.srt10.8 KB
3/4. Joining the Enterprise PKI Infrastructure/4. Using a Certificate for Web Management Traffic.mp47.5 MB
3/4. Joining the Enterprise PKI Infrastructure/4. Using a Certificate for Web Management Traffic.srt6.7 KB
3/5. Decrypting Traffic on the Palo Alto Firewall/1. Module Introduction.mp43.1 MB
3/5. Decrypting Traffic on the Palo Alto Firewall/1. Module Introduction.srt3.5 KB
3/5. Decrypting Traffic on the Palo Alto Firewall/2. Palo Alto Firewall Decryption Overview.mp45.1 MB
3/5. Decrypting Traffic on the Palo Alto Firewall/2. Palo Alto Firewall Decryption Overview.srt8.3 KB
3/5. Decrypting Traffic on the Palo Alto Firewall/3. Decryption Rollout Strategy.mp46.8 MB
3/5. Decrypting Traffic on the Palo Alto Firewall/3. Decryption Rollout Strategy.srt11.1 KB
3/5. Decrypting Traffic on the Palo Alto Firewall/4. Configuring Forward Trust _ Untrust Certificates, and Understanding Response Pages(1).mp418.3 MB
3/5. Decrypting Traffic on the Palo Alto Firewall/4. Configuring Forward Trust _ Untrust Certificates, and Understanding Response Pages(1).srt14.2 KB
3/5. Decrypting Traffic on the Palo Alto Firewall/4. Configuring Forward Trust _ Untrust Certificates, and Understanding Response Pages.mp418.3 MB
3/5. Decrypting Traffic on the Palo Alto Firewall/4. Configuring Forward Trust _ Untrust Certificates, and Understanding Response Pages.srt14.2 KB
3/5. Decrypting Traffic on the Palo Alto Firewall/5. Configuring Decryption Profiles.mp45.7 MB
3/5. Decrypting Traffic on the Palo Alto Firewall/5. Configuring Decryption Profiles.srt4.4 KB
3/5. Decrypting Traffic on the Palo Alto Firewall/6. Configuring SSL Forward Proxy.mp421.7 MB
3/5. Decrypting Traffic on the Palo Alto Firewall/6. Configuring SSL Forward Proxy.srt14.6 KB
3/5. Decrypting Traffic on the Palo Alto Firewall/7. Configuring SSL Inbound Proxy, SSH Proxy, and Decyrption Mirroring(1).mp411.4 MB
3/5. Decrypting Traffic on the Palo Alto Firewall/7. Configuring SSL Inbound Proxy, SSH Proxy, and Decyrption Mirroring(1).srt7.2 KB
3/5. Decrypting Traffic on the Palo Alto Firewall/7. Configuring SSL Inbound Proxy, SSH Proxy, and Decyrption Mirroring.mp411.4 MB
3/5. Decrypting Traffic on the Palo Alto Firewall/7. Configuring SSL Inbound Proxy, SSH Proxy, and Decyrption Mirroring.srt7.2 KB
3/5. Decrypting Traffic on the Palo Alto Firewall/8. Decryption Broker Overview.mp45.6 MB
3/5. Decrypting Traffic on the Palo Alto Firewall/8. Decryption Broker Overview.srt8.2 KB
3/5. Decrypting Traffic on the Palo Alto Firewall/9. Course Wrap Up.mp43.1 MB
3/5. Decrypting Traffic on the Palo Alto Firewall/9. Course Wrap Up.srt5.2 KB
4/1. Course Overview/1. Course Overview.mp42.9 MB
4/1. Course Overview/1. Course Overview.srt2.1 KB
4/2. Implement High Availability/1. Palo Alto Firewalls_ High Availability.mp413.8 MB
4/2. Implement High Availability/1. Palo Alto Firewalls_ High Availability.srt14.2 KB
4/2. Implement High Availability/2. Palo Alto HA Modes and Link Types.mp411.5 MB
4/2. Implement High Availability/2. Palo Alto HA Modes and Link Types.srt10.9 KB
4/2. Implement High Availability/3. Globomantics HA Deployment.mp48.3 MB
4/2. Implement High Availability/3. Globomantics HA Deployment.srt8.5 KB
4/2. Implement High Availability/4. Demo- Configure Active-Passive HA on the Primary Firewall.mp419.1 MB
4/2. Implement High Availability/4. Demo- Configure Active-Passive HA on the Primary Firewall.srt12.0 KB
4/2. Implement High Availability/5. Demo- Configure Active-Passive HA on the Secondary Firewall.mp414.1 MB
4/2. Implement High Availability/5. Demo- Configure Active-Passive HA on the Secondary Firewall.srt7.8 KB
4/2. Implement High Availability/6. Demo- Verify that Active-Passive HA is Operational.mp413.7 MB
4/2. Implement High Availability/6. Demo- Verify that Active-Passive HA is Operational.srt6.8 KB
4/2. Implement High Availability/7. Demo- Tune the Failover Conditions for an Active-Passive Configuration.mp423.2 MB
4/2. Implement High Availability/7. Demo- Tune the Failover Conditions for an Active-Passive Configuration.srt13.2 KB
4/2. Implement High Availability/8. Active-Active HA Firewall Clustering.mp413.8 MB
4/2. Implement High Availability/8. Active-Active HA Firewall Clustering.srt12.6 KB
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/1. What Is Panorama-.mp410.9 MB
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/1. What Is Panorama-.srt10.1 KB
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/2. Demo- Panorama Overview.mp412.6 MB
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/2. Demo- Panorama Overview.srt8.3 KB
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/3. Templates and Template Stacks.mp410.5 MB
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/3. Templates and Template Stacks.srt13.3 KB
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/4. Demo- Create Templates and Template Stacks on Panorama.mp49.0 MB
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/4. Demo- Create Templates and Template Stacks on Panorama.srt6.1 KB
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/5. Demo- Add Values to Templates.mp413.4 MB
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/5. Demo- Add Values to Templates.srt7.4 KB
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/6. Demo- Add Firewalls to Templates.mp416.4 MB
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/6. Demo- Add Firewalls to Templates.srt9.8 KB
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/7. Panorama Template Variables.mp47.3 MB
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/7. Panorama Template Variables.srt5.5 KB
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/8. Demo- Configure Variables in Templates.mp418.5 MB
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/8. Demo- Configure Variables in Templates.srt13.0 KB
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/9. Demo- Push Panorama Configurations to Managed Firewalls.mp422.4 MB
4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/9. Demo- Push Panorama Configurations to Managed Firewalls.srt16.4 KB
4/4. Implement Panorama Device Groups/1. Panorama Device Groups Overview.mp412.1 MB
4/4. Implement Panorama Device Groups/1. Panorama Device Groups Overview.srt9.7 KB
4/4. Implement Panorama Device Groups/2. Demo- Configure Device Groups On Panorama.mp419.0 MB
4/4. Implement Panorama Device Groups/2. Demo- Configure Device Groups On Panorama.srt13.8 KB
4/4. Implement Panorama Device Groups/8. Clean up Panorama after Firewall Imports and Push Configurations to Firewalls.mp420.5 MB
4/4. Implement Panorama Device Groups/8. Clean up Panorama after Firewall Imports and Push Configurations to Firewalls.srt13.8 KB
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/1. Panorama Log Collectors.mp45.0 MB
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/1. Panorama Log Collectors.srt4.0 KB
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/2. Demo- Configure a Log Collector on Panorama.mp411.3 MB
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/2. Demo- Configure a Log Collector on Panorama.srt8.9 KB
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/3. Demo- Using Panorama to View Logs from All Firewalls.mp417.7 MB
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/3. Demo- Using Panorama to View Logs from All Firewalls.srt10.1 KB
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/4. Demo- Testing Firewall Loggin Appears on Panorama.mp430.2 MB
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/4. Demo- Testing Firewall Loggin Appears on Panorama.srt11.8 KB
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/5. Demo- Using Panorama to Update Software on Firewalls.mp417.0 MB
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/5. Demo- Using Panorama to Update Software on Firewalls.srt9.4 KB
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/6. Demo- Explore Panorama_s Troubleshooting and Administrative Tools.mp429.4 MB
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/6. Demo- Explore Panorama_s Troubleshooting and Administrative Tools.srt17.0 KB
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/7. Course Summary.mp45.7 MB
4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/7. Course Summary.srt7.1 KB