PCNSA: Palo Alto Networks Certified Network Security Administrator Certification Video Training Course

PCNSA: Palo Alto Networks Certified Network Security Administrator Certification Video Training Course

Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.

$14.99 / $24.99

Chapter 1 – PAN-Security Architecture

  • 1. 1.1 Security platform overview
    8m
  • 2. 1.2 Next-generation firewall architecture
    3m
  • 3. 1.3 Zero Trust security model
    4m
  • 4. 1.4 Firewall offerings
    5m

Chapter 2 - Initial Device Configuration

  • 1. 2.1 Administrative controls
    13m
  • 2. 2.2 Initial system access
    14m
  • 3. 2.3 Configuration management
    12m
  • 4. 2.4 Licensing and software updates
    10m
  • 5. 2.5 Account administration
    13m
  • 6. 2.6 Viewing and filtering logs
    8m
  • 7. 2.7 Lab Initial Configuration
    16m
  • 8. 2.8 Security zones and interfaces
    10m
  • 9. 2.9 Tap VirtualWire Layer2
    14m

Chapter 3 - Security and NAT Policies

  • 1. 3.1 Security policy fundamental concepts
    15m
  • 2. 3.2 Security policy administration
    33m
  • 3. 3.3 Network address translation, Source NAT configuration
    17m
  • 4. 3.4 Destination NAT configuration
    10m
  • 5. 3.5 Lab: Security and NAT Policies
    24m

Chapter 4 - App-ID

  • 1. 4.1 App-ID overview
    8m
  • 2. 4.2 Using App-ID in a Security policy
    26m
  • 3. 4.3 Migrating to an App-ID
    23m
  • 4. 4.4 Lab App-ID
    32m

Chapter 5 - Content-ID

  • 1. 5.1 Content-ID overview
    11m
  • 2. 5.2 Vulnerability Protection Security Profiles
    18m
  • 3. 5.3 Antivirus Security Profiles
    11m
  • 4. 5.4 Anti-Spyware Security Profiles
    18m
  • 5. 5.5 File Blocking Profiles
    10m
  • 6. 5.6 Data Filtering Profiles
    18m
  • 7. 5.7 Attaching Security Profiles to Security policy rules
    4m
  • 8. 5.8 Telemetry and threat intelligence
    3m
  • 9. 5.9 Denial-of-service protection
    21m
  • 10. 5.10 Lab Content-ID
    33m

Chapter 6 -URL Filtering

  • 1. 6.1 URL Filtering concepts
    10m
  • 2. 6.2 Configuring and managing URL Filtering
    18m
  • 3. 6.3 URL Filtering using Admin Override Option
    7m
  • 4. 6.4 Lab URL Filtering
    19m

Chapter 7 - Decryption

  • 1. 7.1 Decryption concepts
    13m
  • 2. 7.2 Certificate management
    14m
  • 3. 7.3 SSL forward proxy decryption
    13m
  • 4. 7.4 SSL inbound inspection
    8m
  • 5. 7.5 Other decryption topics
    7m
  • 6. 7.6 Lab Decryption
    26m

Chapter 8 - WildFire

  • 1. 8.1 WildFire concepts
    8m
  • 2. 8.2 Configuring and managing WildFire
    5m
  • 3. 8.3 WildFire reporting
    3m
  • 4. 8.4 Lab WildFire
    9m

Chapter 9 - User-ID

  • 1. 9.1 User-ID overview
    7m
  • 2. 9.2 User mapping methods overview
    6m
  • 3. 9.3 Configuring User-ID
    5m
  • 4. 9.4 PAN-OS integrated agent configuration
    13m
  • 5. 9.5 Windows-based agent configuration
    5m
  • 6. 9.6 Configuring group mapping
    10m
  • 7. 9.7 User-ID and security policy
    18m
  • 8. 9.8 Lab User-ID
    28m

Chapter 10 - Global Protect (Remote Access VPN)

  • 1. 10.1 GlobalProtect overview
    8m
  • 2. 10.2 Preparing the firewall for GlobalProtect
    14m
  • 3. 10.3 Configuration GlobalProtect portal
    14m
  • 4. 10.4 Configuration GlobalProtect gateway
    11m
  • 5. 10.5 Configuration GlobalProtect agents
    9m
  • 6. 10.6 Lab GlobalProtect
    25m

Chapter 10 - Site-to-site-VPN

  • 1. 10.7 Site-to-site VPN
    9m
  • 2. 10.8 Configuring site-to-site tunnels
    15m
  • 3. 10.9 IPsec troubleshooting
    7m
  • 4. 10.10 Lab Site-to-Site VPN
    21m

Chapter 11 - Monitoring and Reporting

  • 1. 11.1 Dashboard and Monitor
    16m
  • 2. 11.2 Application Command Center (ACC)
    9m
  • 3. 11.3 Reports
    7m
  • 4. 11.4 Log forwarding
    9m
  • 5. 11.5 Syslog
    10m
  • 6. 11.6 Configuring SNMP
    9m
  • 7. 11.7 Lab Monitoring and Reporting
    22m

Chapter 12 - HA (High Availability)

  • 1. 12.1 HA overview
    4m
  • 2. 12.2 HA components and operation
    8m
  • 3. 12.3 Active-Passive HA configuration
    13m
  • 4. 12.4 Monitoring HA state
    4m
  • 5. 12.5 Lab Active-Passive High Availability
    16m