Trainer 1 : Amol Walde
Trainer 2 : Pownraj A
PCNSE - Study guide.
1 - Orientation - PaloAlto Products - NG Labs
2 - Legacy vs NGFW - PanOS - License - Form Factor
3 - Day 1 Config of Firewall
4 - Review of Day 1 Config & Interface Types
5 - Interface Mgmt Profile & Overview of Virtual Router
6 - Theory ECMP, Path Monitoring & Routing Protocol Config
7 - Service Route, Pan OS Upgrade & Dynamic Updates
8 - L2 , VLAN, L3, Subinterface & Intervlan routing
9 - ECMP, Path Monitoring & Policy Based Forwarding
10 - NAT Policy Part 1
11 - NAT Part -2
12 - U-Turn NAT & Security Profiles
13 - Security Profiles - Part -1
14 - Security Profiles - DOS & Zone Protection
15 - SSL Forward Proxy
16 - SSL Inbound Inspection
17 - Application Override & Basics of IPSec
18 - IPSec
19 - High Availability - Part 1
20 - High Availability - Part -2
21 - User ID - Part -1
22 - User ID - Part - 2
23 - Global Protect - Part 1
24 - Global Protect - Part 2
Lab - Global Protect Using Local DB Auth
25 - Global Protect - Part 3
Global Protect Admin Guide
Global Protect
26 - Panorama
27 - Troubleshooting & ACC
SSL Inbound Inspection
TLS Handshake
Lab Guide - 1
Lab Guide 2 - Virtual Wire Lab.
Lab Guide 3 - Interface Management Profile
Lab Guide 4 - DNS - NTP - Service Route Confg
Lab Guide 5 - PAN OS Upgrade Procedure
Lab Guide 6 - Dynamic Updates
Lab Guide 7 - L2 - VLAN & Intervlan Routing
Lab Guide 8 - ECMP - Static Route Monitoring & PBF.
Lab Guide 9 - NAT Policy for Source NAT
Lab Guide 10 - DNAT
Lab Guide 11 - U-Turn NAT
Virtual Router
IkeV1 - IPsec
PA - Assessment - I
Determine Your Active/Active Use Case
Meta Data
Panorama Administrator's Guide
List of important daemons
1 - Orientation
2 - L2/L3 Attacks_I _DHCP Starvation
3 - L2/L3 Attacks _II _Rouge DHCP _ARP Spoofing _DNS Spoofing
4 - SW vs HW fw_Zone Based fw_ PA Initial Config_DHCP Server_Mgmt Profile
5 - Default Route _Security Policy_Dyn & Stat NAT _Control Plane vs Data Plane _PA Service Route
6 - Configuration
7 - NTP Server _Monitoring and Logs _Security Policy with Service Restrictions _Port Tunneling
8 - Understanding Application Filtering _Prevent Port Tunneling _Application vs Service Filtering
9 - Configuration
10 - Blocking Apps like Whatsapp,etc_App category filters_Time Based ACL_Geo Based ACL
11 - Config Management _Admin Roles & Privileges
12 - URL Filtering_PAN DB _URL Filtering_Custom Object_URL Filtering_EDL
13 - SSL Decryption_Trusted and Untrusted Certificate
14 - Role Based Access Control_Captive Portal_Active Directory Concepts
15 - User ID integration with AD in PA
16 - User ID integration with AD in PA
17 - PA Sub Interface_Floating Default Route
18 - Policy Based Forwarding & ECMP
19 - PA Deployment Modes
20 - HA - Active/Passive - I
21 - HA - Active/Passive - II
22 - Site to Site VPN Cisco
23 - NAT - T on Cisco and S2S VPN PA
24 - Remote Access VPN - PA
25 - S2S VPN