TOPICS

Course Outline
1. Course Introduction
2. Threat Landscape
Palo Alto Networks Technologies
WildFire Architecture
Advanced Persistent Threats
Threat Management Strategies
3. Integrated Approach to Threat Protection
Apply Best Practices
Reduce the Attack Surface
Control Attack Methodology
4. Handling Known Threats
Configuring Security Profiles
Zone and DoS Protection
Control Advance Threat Enablers
Handling Drive-By Downloads
5. Investigating Attacks
Threat Vault
Wildfire Logs and Reports
Log Correlation
Using AppScope
Creating Custom App-IDs
6. Dealing with Zero-Day Attacks
Researching Threat Events
Identifying Unknown Threats
Finding Infected Hosts
7. Creating Custom Threat Signatures
Build Custom Signatures
Create Emerging Threat Signature
Labs
You will spend approximately 50% of class in hands-on labs.

  • PRIVATE
  • 10 Days
  • 0 Units
  • 0 Hrs

Select Your Currency

WOOCS 1.1.8
Drop Us A Query
[contact-form-7 id="5639" title="Drop Us A Query"]
© 2016, ALL RIGHTS RESERVED.
Create an Account