Palo Alto Networks Cybersecurity Foundation

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Palo Alto Networks Cybersecurity Foundation

Coursera · Intermediate ·🔐 Cybersecurity ·1mo ago
Palo Alto Networks Cybersecurity Foundation Course Description: In this course, students will learn fundamental principles associated with the current cybersecurity landscape and identify concepts required to recognize and potentially mitigate attacks against enterprise networks as well as mission critical infrastructure. Students will also learn how to initially setup and configure security zones, authentication, and policies on a next generation firewall. Learning Objectives: Upon completion of this course, students will be able to: Upon completion of this course students will be able to perform the following: • Discover modern computing trends and application threat vectors. • Configure a network interface and test for connectivity. • Identify cloud computing and software-as-a-service (SaaS) application challenges. • Explore recent cyberattacks and their impact on business. • Review attacker profiles, motivations and the Cyber-Attack Lifecycle. • Recognize high-profile cybersecurity attacks and Advanced Persistent Threats. • Identify malware types, vulnerabilities, exploits, spamming and phishing attacks. • Configure and test a malware analysis security profile. • Describe how bots and botnets are used to attack enterprise networks. • Explore Zero Trust design principles, architecture, capabilities, and implementation. • Review perimeter network security strategies, policies, models, and trust boundaries. • Setup and configure inside, outside and DMZ security zones on a NGFW. • Create and test an authentication policy on a next generation firewall. • Review capabilities of the Security Operating Platform and components. • Explore how to secure the enterprise with NGFW and Traps endpoint protection. • Discover how to secure the cloud with Prisma Access, SaaS, and Cloud. • Examine how to secure the future with Cortex Data Lake and XDR. • Apply two-factor authentication on the next generation firewall (NGFW). • Configure the NGFW to allow only trusted applicati
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

How to secure your macOS games
Secure your macOS games with these steps to protect your device from potential threats
Dev.to · GuardingPearSoftware
The Hidden Risk in Emergency Evacuation Plans Nobody Talks About
Organizations struggle to identify who is inside their buildings during emergencies, posing a hidden risk in evacuation plans
Medium · Cybersecurity
3 Key Takeaways on Why Cybersecurity Product Management Matters More Than Ever
Cybersecurity product management is crucial for building trust in digital products, learn how to prioritize security in product design
Medium · Cybersecurity
The Coding Challenge That Came for Your development Directory: Anatomy of a Job Interview Infostealer
Learn to identify and protect against malicious coding challenges that can steal sensitive information from your development directory
Dev.to · Alex Chen
Up next
Cryptography
Coursera
Watch →