PCNSE: Palo Alto Networks Certified Network Security Engineer Certification Video Training Course

PCNSE: Palo Alto Networks Certified Network Security Engineer Certification Video Training Course

Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.

$14.99 / $24.99

Paloalto Intro and Deployment Options

  • 1. Preview2
    2m 14s
  • 2. Palo Alto Firewalls overview
    7m 3s
  • 3. Deployment Options
    2m 41s
  • 4. Layer 2 deployment
    25m 15s
  • 5. Layer 3 deployment
    12m 29s
  • 6. Layer 2 deployment and spanning tree
    9m 14s
  • 7. Layer 2 Features and Limitations with demonstration
    9m 54s
  • 8. Virtual Wire deployment
    18m 35s
  • 9. Virtual Wire IP Classify
    19m 38s
  • 10. Tap Mode deployment
    9m 13s
  • 11. Initial Configuration
    3m 14s

Lab and AWS Palo Alto instance(s) Setup

  • 1. Create an Amazon AWS instance to practice
    10m 1s
  • 2. Setup Amazon AWS for lab testing, add a windows AD server
    12m 12s
  • 3. AWS VPC setup, routing setup, route traffic through the AWS instance
    19m 2s
  • 4. Create a DMZ segment in Amazon AWS, add a server to DMZ segment
    10m 11s
  • 5. AWS routing issue to be aware of
    4m 11s
  • 6. Unetlab EVE-NG name change
    0s

Basic Administrative Tasks

  • 1. Basic Settings
    5m 46s
  • 2. Changes and Committing changes
    6m 51s
  • 3. Local Administrator Account with External Authentication
    9m 54s
  • 4. External Authentication Using Radius Server
    7m 33s
  • 5. System software Upgrade / Downgrade, global protect client install
    4m 27s
  • 6. Dynamic Updates
    2m 52s
  • 7. Interface Management Profile
    4m 38s

Security Policy Configuration

  • 1. Security Zones and Traffic Processing
    10m 10s
  • 2. Packet Flow
    9m 33s
  • 3. Rules based on application using App-ID
    10m 4s
  • 4. Security Policy Rules for applications not running on application default ports
    7m 43s
  • 5. Application Override Policies - Custom Applications
    8m 1s
  • 6. URL Filtering Rules and Options
    13m 51s
  • 7. Custom URL Category
    2m 53s
  • 8. Using Address Objects
    5m 51s
  • 9. Using Service Objects
    3m 47s
  • 10. Using Dynamic Block Lists
    4m 42s
  • 11. Using Tags
    2m 19s

User ID integration

  • 1. User ID integration
    8m 4s
  • 2. Installing User ID agent on AD
    10m 19s
  • 3. Configure the firewall to use user ID agent
    9m 3s
  • 4. Configuring integrated User ID agent
    5m 33s
  • 5. Group to User ID mapping
    5m 36s
  • 6. Making decisions based on user group membership example
    5m 5s
  • 7. Identifying Users using Captive Portal Redirect Mode
    6m 13s
  • 8. User ID mapping using CaptivePortal in Transparent Mode
    5m 17s
  • 9. Captive Portal using Broswer Challenge SSO example
    16m 51s
  • 10. Relaying UserID information using XML example
    6m 39s
  • 11. User ID mapping using Syslog Messages example
    3m 34s

Threat Prevention

  • 1. AntiVirius configuration
    8m 19s
  • 2. Anti Spyware and DNS Sinkholing
    11m 36s
  • 3. Creating custom Anti-Spyware signatures
    10m 5s
  • 4. Configuring Vulnerability Protection and Custom Signatures
    11m 37s
  • 5. File Policies
    7m 2s
  • 6. Configuring Wildfire
    8m 35s
  • 7. Wildfire Portal
    1m 38s
  • 8. Configuring Data Filtering - Data Leakage Prevention
    8m 37s
  • 9. Denial Of Service Protection
    8m 21s
  • 10. Implementing Zone and Host Denial Of Service Protection
    10m 2s

SSL Decryption

  • 1. Certificates, Certificate of Autorities, and Decryption Concepts
    18m 17s
  • 2. SSL Forward Proxy - Trust Certificate - Local Cert on PaloAlto
    7m 33s
  • 3. SSL Forward Proxy - Untrust Certificate - Local Cert on PaloAlto
    6m 16s
  • 4. SSL Forward Proxy Using an Internal PKI Subordinate CA
    9m 5s
  • 5. SSL Forward Proxy Blocking Threats in Encrypted Traffic - Demo
    6m 52s
  • 6. SSL Inbound Inspection
    8m 24s

Network Address Translation

  • 1. Understanding Dynamic NAT and port
    15m 49s
  • 2. Dynamic NAT and port configuration examples
    19m 36s
  • 3. Dynamic NAT and port Egress Interface Multipe ISP consideration
    14m 8s
  • 4. What is the difference between Dynamic IP and Dynamic IP and port with examples
    10m 14s
  • 5. Static NAT concepts and example
    14m 41s
  • 6. Static NAT with Port Translation Use Case and scenario example
    18m 37s
  • 7. Static NAT with Port Translation Use Case and scenario example - part 2
    5m 35s
  • 8. Destination NAT and Destination NAT with Port Address Translation
    7m 31s
  • 9. UTurn NAT with port translation
    7m 15s
  • 10. Source and Destination NAT
    10m 30s

Basic and Intermediate Networking

  • 1. DHCP Services
    6m 26s
  • 2. Default Route
    5m 2s
  • 3. OSPF Routing
    9m 58s
  • 4. BGP Routing
    4m 51s
  • 5. BGP Advertise
    2m 46s
  • 6. Using Multiple Virtual Routers
    9m 6s
  • 7. Multiple Virtual Routers NAT and Security Policy Example
    11m 47s
  • 8. Multiple ISP Failover Scenario using BGP
    16m 39s
  • 9. Multiple ISP Failover using floating Static Route
    9m 35s
  • 10. Multiple ISP Failover using Policy Based Forwarding
    8m 7s
  • 11. Multiple ISP Load Sharing using Policy Based Forwarding
    5m 9s

High Availability

  • 1. High Availability Overview
    13m 22s
  • 2. Active Passive Configuration Configuration Example
    14m 55s
  • 3. High Availability Active / Passive different failure scenarios HA1 HA2 heartbeat
    15m 18s
  • 4. High Availability Active / Passive HA1-backup, HA2-backup configuration
    15m 8s
  • 5. High Availabilit active / passive link and path monitoring, HA operations
    13m
  • 6. Active Active High availability intro, Floating IP
    9m 17s
  • 7. Active Active with Floating IP configuration example
    22m 23s
  • 8. Active Active session owner, session setup using IP modulus, failover example
    19m 38s
  • 9. Active Active Static Nat Configuration Example using NAT HA binding Primary
    10m 50s
  • 10. Active Active High Availability Arp Load Sharing Configuration Example
    10m 53s

IPv6 configuration

  • 1. IPv6 structure, addressing, unicast (link local, site local, global), multicast
    14m 31s
  • 2. IPv6 neighbor discovery, icmpv6, dhcpv6
    12m 48s
  • 3. IPv6 Stateles, Statefull DHCP, M Flag O Flag concepts
    8m 4s
  • 4. IPv6 basic firewall configuration example
    12m 49s
  • 5. IPv6 Network Prefix Translation NPTv6 configuration example
    11m 5s
  • 6. IPv6 NAT64 example connecting IPv6 only network to IPv4 Internet example
    18m 23s
  • 7. IPv6 NAT64 example connecting IPv4 only network to IPv6 only network
    12m 9s
  • 8. IPv6 issues related to Windows and policy based on IPv6 addresses, example
    12m 52s
  • 9. IPv6 dhcpv6 relay on PaloAlto firewall example
    8m 1s

VPN IPSec configuration details

  • 1. VPN IPSEC L2L intro and configuration steps
    17m 38s
  • 2. VPN IPSEc L2L PaloAlto to PaloAlto Example
    18m 31s
  • 3. VPN IPSEc Site To Site Hub Spoke, Dynamic IP address example
    10m 44s
  • 4. VPN IPSEC L2L Paloalto to Cisco ASA configuration example
    9m 34s
  • 5. VPN IPSEC L2L Paloalto to Cisco ASA with Dynamic IP address
    2m 58s
  • 6. IPsec Quick mode negotiation understanding
    8m 49s
  • 7. IKE main mode more details, explanation
    20m 17s
  • 8. Understanding IPSec Quick mode with PFS
    12m 28s
  • 9. IKE security policies required and NAT-T explanation / example
    15m 7s
  • 10. IKEv1 main mode versus agressive mode, understand the difference
    13m 4s
  • 11. IKEv2 intro and differences between IKEv2 and IKEv1
    17m 3s
  • 12. IKEv2 Auth phase, IPsec associations, differences between Ikev1 and Ikev2
    20m 34s

Global Protect

  • 1. Global Protect Setup example
    14m 9s
  • 2. Getting a free publicly trusted ssl certificate to test Global Protect
    11m 3s
  • 3. Setting up global protect for on-demand mode, discover agent settings
    12m 6s
  • 4. Dual Factor Authentication Using Open Source Solution PrivacyIdea - demo
    16m 53s
  • 5. Joining a windows PC to AWS windows domain - vpn tunnel to AWS
    9m 49s
  • 6. Installing CA services on windows, certificate enrollment policy service, OCSP
    11m 17s
  • 7. Global Protect Authentication using Dual Factor Token and Computer Certificate
    6m 33s
  • 8. Global Protect Always On User-Logon and Pre-Logon configuration
    7m 29s
  • 9. Global Protect Pre-Logon with User Logon (on demand) configuration example
    7m 52s
  • 10. Global Protect HIP Check
    10m 59s

Azure Palo Alto VM Deployment

  • 1. Azure Networking Concepts
    11m 14s
  • 2. Setup Palo Alto VM In Azure
    12m 8s
  • 3. Protecting Virtual Machines in Azure behind Palo Alto firewall
    23m

Panorama

  • 1. Panorama concepts, hardware, template and template stack
    18m 56s
  • 2. Panorama Device Group Concepts Part 1
    12m 6s
  • 3. Panorama Device Group and Object Iheritance
    12m 46s

QoS

  • 1. QoS Introduction
    13m 7s
  • 2. QoS Download Upload Bandwidth Restriction
    11m 35s
  • 3. QoS Classification and Marking
    12m 27s
  • 4. QoS Classification and Markings Example
    12m 32s
  • 5. IPSec QoS lab setup overview
    4m 24s
  • 6. Bandwidth Throttling IPSEc tunnels demo
    7m 34s
  • 7. IPSec Tunnel QoS traffic classification
    7m 10s
  • 8. IPSec Tunnel QoS controlling traffic bidirectionaly
    9m 22s
  • 9. IPSec QoS Copy ToS Header Explanation and demo
    12m 42s

Optional - Installing PaloAlto 8.1 In AWS

  • 1. Palo Alto 8.1 Section Intro
    7m 8s
  • 2. Provisioning PaloAlto Firewall 8.1 in AWS - Part 1
    15m 35s
  • 3. Provisioning PaloAlto Firewall 8.1 in AWS - Part 2
    23m
Study4Pass does not provide real Microsoft exam questions. Similarly, Study4Pass does not supply real Amazon exam questions. The materials offered by Study4Pass lack real questions and answers from Cisco's certification exams. The CFA Institute neither endorses nor assures the accuracy or quality of Study4Pass content. CFA® and Chartered Financial Analyst® are registered trademarks held by the CFA Institute.

© study4pass.com 2025. All rights reserved.