PCNSE: Palo Alto Networks Certified Network Security Engineer Certification Video Training Course

PCNSE: Palo Alto Networks Certified Network Security Engineer Certification Video Training Course

Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.

$13.74 / $24.99

Paloalto Intro and Deployment Options

  • 1. Preview2
    2m 14s
  • 2. Palo Alto Firewalls overview
    7m 3s
  • 3. Deployment Options
    2m 41s
  • 4. Layer 2 deployment
    25m 15s
  • 5. Layer 3 deployment
    12m 29s
  • 6. Layer 2 deployment and spanning tree
    9m 14s
  • 7. Layer 2 Features and Limitations with demonstration
    9m 54s
  • 8. Virtual Wire deployment
    18m 35s
  • 9. Virtual Wire IP Classify
    19m 38s
  • 10. Tap Mode deployment
    9m 13s
  • 11. Initial Configuration
    3m 14s

Lab and AWS Palo Alto instance(s) Setup

  • 1. Create an Amazon AWS instance to practice
    10m 1s
  • 2. Setup Amazon AWS for lab testing, add a windows AD server
    12m 12s
  • 3. AWS VPC setup, routing setup, route traffic through the AWS instance
    19m 2s
  • 4. Create a DMZ segment in Amazon AWS, add a server to DMZ segment
    10m 11s
  • 5. AWS routing issue to be aware of
    4m 11s
  • 6. Unetlab EVE-NG name change
    0s

Basic Administrative Tasks

  • 1. Basic Settings
    5m 46s
  • 2. Changes and Committing changes
    6m 51s
  • 3. Local Administrator Account with External Authentication
    9m 54s
  • 4. External Authentication Using Radius Server
    7m 33s
  • 5. System software Upgrade / Downgrade, global protect client install
    4m 27s
  • 6. Dynamic Updates
    2m 52s
  • 7. Interface Management Profile
    4m 38s

Security Policy Configuration

  • 1. Security Zones and Traffic Processing
    10m 10s
  • 2. Packet Flow
    9m 33s
  • 3. Rules based on application using App-ID
    10m 4s
  • 4. Security Policy Rules for applications not running on application default ports
    7m 43s
  • 5. Application Override Policies - Custom Applications
    8m 1s
  • 6. URL Filtering Rules and Options
    13m 51s
  • 7. Custom URL Category
    2m 53s
  • 8. Using Address Objects
    5m 51s
  • 9. Using Service Objects
    3m 47s
  • 10. Using Dynamic Block Lists
    4m 42s
  • 11. Using Tags
    2m 19s

User ID integration

  • 1. User ID integration
    8m 4s
  • 2. Installing User ID agent on AD
    10m 19s
  • 3. Configure the firewall to use user ID agent
    9m 3s
  • 4. Configuring integrated User ID agent
    5m 33s
  • 5. Group to User ID mapping
    5m 36s
  • 6. Making decisions based on user group membership example
    5m 5s
  • 7. Identifying Users using Captive Portal Redirect Mode
    6m 13s
  • 8. User ID mapping using CaptivePortal in Transparent Mode
    5m 17s
  • 9. Captive Portal using Broswer Challenge SSO example
    16m 51s
  • 10. Relaying UserID information using XML example
    6m 39s
  • 11. User ID mapping using Syslog Messages example
    3m 34s

Threat Prevention

  • 1. AntiVirius configuration
    8m 19s
  • 2. Anti Spyware and DNS Sinkholing
    11m 36s
  • 3. Creating custom Anti-Spyware signatures
    10m 5s
  • 4. Configuring Vulnerability Protection and Custom Signatures
    11m 37s
  • 5. File Policies
    7m 2s
  • 6. Configuring Wildfire
    8m 35s
  • 7. Wildfire Portal
    1m 38s
  • 8. Configuring Data Filtering - Data Leakage Prevention
    8m 37s
  • 9. Denial Of Service Protection
    8m 21s
  • 10. Implementing Zone and Host Denial Of Service Protection
    10m 2s

SSL Decryption

  • 1. Certificates, Certificate of Autorities, and Decryption Concepts
    18m 17s
  • 2. SSL Forward Proxy - Trust Certificate - Local Cert on PaloAlto
    7m 33s
  • 3. SSL Forward Proxy - Untrust Certificate - Local Cert on PaloAlto
    6m 16s
  • 4. SSL Forward Proxy Using an Internal PKI Subordinate CA
    9m 5s
  • 5. SSL Forward Proxy Blocking Threats in Encrypted Traffic - Demo
    6m 52s
  • 6. SSL Inbound Inspection
    8m 24s

Network Address Translation

  • 1. Understanding Dynamic NAT and port
    15m 49s
  • 2. Dynamic NAT and port configuration examples
    19m 36s
  • 3. Dynamic NAT and port Egress Interface Multipe ISP consideration
    14m 8s
  • 4. What is the difference between Dynamic IP and Dynamic IP and port with examples
    10m 14s
  • 5. Static NAT concepts and example
    14m 41s
  • 6. Static NAT with Port Translation Use Case and scenario example
    18m 37s
  • 7. Static NAT with Port Translation Use Case and scenario example - part 2
    5m 35s
  • 8. Destination NAT and Destination NAT with Port Address Translation
    7m 31s
  • 9. UTurn NAT with port translation
    7m 15s
  • 10. Source and Destination NAT
    10m 30s

Basic and Intermediate Networking

  • 1. DHCP Services
    6m 26s
  • 2. Default Route
    5m 2s
  • 3. OSPF Routing
    9m 58s
  • 4. BGP Routing
    4m 51s
  • 5. BGP Advertise
    2m 46s
  • 6. Using Multiple Virtual Routers
    9m 6s
  • 7. Multiple Virtual Routers NAT and Security Policy Example
    11m 47s
  • 8. Multiple ISP Failover Scenario using BGP
    16m 39s
  • 9. Multiple ISP Failover using floating Static Route
    9m 35s
  • 10. Multiple ISP Failover using Policy Based Forwarding
    8m 7s
  • 11. Multiple ISP Load Sharing using Policy Based Forwarding
    5m 9s

High Availability

  • 1. High Availability Overview
    13m 22s
  • 2. Active Passive Configuration Configuration Example
    14m 55s
  • 3. High Availability Active / Passive different failure scenarios HA1 HA2 heartbeat
    15m 18s
  • 4. High Availability Active / Passive HA1-backup, HA2-backup configuration
    15m 8s
  • 5. High Availabilit active / passive link and path monitoring, HA operations
    13m
  • 6. Active Active High availability intro, Floating IP
    9m 17s
  • 7. Active Active with Floating IP configuration example
    22m 23s
  • 8. Active Active session owner, session setup using IP modulus, failover example
    19m 38s
  • 9. Active Active Static Nat Configuration Example using NAT HA binding Primary
    10m 50s
  • 10. Active Active High Availability Arp Load Sharing Configuration Example
    10m 53s

IPv6 configuration

  • 1. IPv6 structure, addressing, unicast (link local, site local, global), multicast
    14m 31s
  • 2. IPv6 neighbor discovery, icmpv6, dhcpv6
    12m 48s
  • 3. IPv6 Stateles, Statefull DHCP, M Flag O Flag concepts
    8m 4s
  • 4. IPv6 basic firewall configuration example
    12m 49s
  • 5. IPv6 Network Prefix Translation NPTv6 configuration example
    11m 5s
  • 6. IPv6 NAT64 example connecting IPv6 only network to IPv4 Internet example
    18m 23s
  • 7. IPv6 NAT64 example connecting IPv4 only network to IPv6 only network
    12m 9s
  • 8. IPv6 issues related to Windows and policy based on IPv6 addresses, example
    12m 52s
  • 9. IPv6 dhcpv6 relay on PaloAlto firewall example
    8m 1s

VPN IPSec configuration details

  • 1. VPN IPSEC L2L intro and configuration steps
    17m 38s
  • 2. VPN IPSEc L2L PaloAlto to PaloAlto Example
    18m 31s
  • 3. VPN IPSEc Site To Site Hub Spoke, Dynamic IP address example
    10m 44s
  • 4. VPN IPSEC L2L Paloalto to Cisco ASA configuration example
    9m 34s
  • 5. VPN IPSEC L2L Paloalto to Cisco ASA with Dynamic IP address
    2m 58s
  • 6. IPsec Quick mode negotiation understanding
    8m 49s
  • 7. IKE main mode more details, explanation
    20m 17s
  • 8. Understanding IPSec Quick mode with PFS
    12m 28s
  • 9. IKE security policies required and NAT-T explanation / example
    15m 7s
  • 10. IKEv1 main mode versus agressive mode, understand the difference
    13m 4s
  • 11. IKEv2 intro and differences between IKEv2 and IKEv1
    17m 3s
  • 12. IKEv2 Auth phase, IPsec associations, differences between Ikev1 and Ikev2
    20m 34s

Global Protect

  • 1. Global Protect Setup example
    14m 9s
  • 2. Getting a free publicly trusted ssl certificate to test Global Protect
    11m 3s
  • 3. Setting up global protect for on-demand mode, discover agent settings
    12m 6s
  • 4. Dual Factor Authentication Using Open Source Solution PrivacyIdea - demo
    16m 53s
  • 5. Joining a windows PC to AWS windows domain - vpn tunnel to AWS
    9m 49s
  • 6. Installing CA services on windows, certificate enrollment policy service, OCSP
    11m 17s
  • 7. Global Protect Authentication using Dual Factor Token and Computer Certificate
    6m 33s
  • 8. Global Protect Always On User-Logon and Pre-Logon configuration
    7m 29s
  • 9. Global Protect Pre-Logon with User Logon (on demand) configuration example
    7m 52s
  • 10. Global Protect HIP Check
    10m 59s

Azure Palo Alto VM Deployment

  • 1. Azure Networking Concepts
    11m 14s
  • 2. Setup Palo Alto VM In Azure
    12m 8s
  • 3. Protecting Virtual Machines in Azure behind Palo Alto firewall
    23m

Panorama

  • 1. Panorama concepts, hardware, template and template stack
    18m 56s
  • 2. Panorama Device Group Concepts Part 1
    12m 6s
  • 3. Panorama Device Group and Object Iheritance
    12m 46s

QoS

  • 1. QoS Introduction
    13m 7s
  • 2. QoS Download Upload Bandwidth Restriction
    11m 35s
  • 3. QoS Classification and Marking
    12m 27s
  • 4. QoS Classification and Markings Example
    12m 32s
  • 5. IPSec QoS lab setup overview
    4m 24s
  • 6. Bandwidth Throttling IPSEc tunnels demo
    7m 34s
  • 7. IPSec Tunnel QoS traffic classification
    7m 10s
  • 8. IPSec Tunnel QoS controlling traffic bidirectionaly
    9m 22s
  • 9. IPSec QoS Copy ToS Header Explanation and demo
    12m 42s

Optional - Installing PaloAlto 8.1 In AWS

  • 1. Palo Alto 8.1 Section Intro
    7m 8s
  • 2. Provisioning PaloAlto Firewall 8.1 in AWS - Part 1
    15m 35s
  • 3. Provisioning PaloAlto Firewall 8.1 in AWS - Part 2
    23m