Palo Alto Networks: Traps 4.2 - Deploy and Optimize Training (EDU-285)

Palo Alto Networks: Traps 4.2 - Deploy and Optimize Training (EDU-285)

Course Delivery

This Course is available in the following format:

Request this course in a different delivery format

GSA Schedule 70 Saving for Government Customers

Course Overview:

Palo Alto Networks: Traps 4.2 – Deploy and Optimize Training (EDU-285)

Palo Alto Networks Traps Advanced Endpoint Protection prevents sophisticated vulnerability exploits and unknown malware-driven attacks. Successful completion of this two-day, instructor-led Palo Alto Networks: Traps 4.2 – Deploy and Optimize Training (EDU-285) course should prepare the student to deploy on-premise Traps in large-scale or complex configurations and optimize its configuration.

Related Courses:

Palo Alto Networks: Firewall 8.1: Essentials – Configuration and Management Training (EDU-210)
Palo Alto Networks: Panorama 8.1: Managing Firewalls at Scale Training (EDU-220)
Palo Alto Networks: Traps 4.2 – Deploy and Optimize Training (EDU-285)
Palo Alto Networks: Firewall 8.1: Troubleshooting Training (EDU-330)
Palo Alto Networks: Firewall 8.1 – Optimizing Firewall Threat Prevention Training (EDU-214)

Customize It:

• If you are familiar with some aspects of this Palo Alto Networks: Traps 4.2 – Deploy and Optimize Training (EDU-285) course, we can omit or shorten their discussion.
• We can adjust the emphasis placed on the various topics or build the Palo Alto Networks: Traps 4.2 – Deploy and Optimize Training (EDU-285) course around the mix of technologies of interest to you (including technologies other than those included in this outline).
• If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Palo Alto Networks: Traps 4.2 – Deploy and Optimize Training (EDU-285) course in manner understandable to lay audiences.

Audience / Target Group:

This Palo Alto Networks: Traps 4.2 – Deploy and Optimize Training (EDU-285) course is intended for:

• Security engineers
• Security administrators
• Security operations specialists
• Security analysts
• Network engineers
• Support staff

Class Prerequisites

The knowledge and skills that a learner must have before attending this Palo Alto Networks: Traps 4.2 – Deploy and Optimize Training course are:

• Windows system administration skills and familiarity with enterprise security concepts are required.
• An elementary level of Linux shell experience is needed for the Linux lab activity.
• Palo Alto Networks: TRAPS 4.2 – Install, Configure, and Manage

Palo Alto Networks: Traps 4.2 – Deploy and Optimize Training – Objectives:

The Palo Alto Networks: Traps 4.2 – Deploy and Optimize Training (EDU-285) course is five days of instructor-led training that will enable you to:

• Design, build, implement, and optimize large-scale Traps deployments
• Distribute Traps endpoint software in an automated way
• Prepare master images for VDI deployment
• Create a Traps Linux installation package and install the agent onto a Linux endpoint
• Build multi-ESM deployments
• Design and implement customized policies
• Test Traps with exploits created using Metasploit
• Examine prevention dumps with windbg

Palo Alto Networks: Traps 4.2 – Deploy and Optimize Training – Syllabus:

Module 1: Scaling Server Infrastructure

Small site architectures
Large site architectures
TLS/SSL deployment considerations
Installing and configuring the Linux agent

Module 2: Scaling Agent Deployment

Distributing Traps via GPO
Configuring Virtual Desktop Infrastructure with Traps

Module 3: ESM Tuning

Tuning ESM settings
External logging and SIEM integration
Role-based access control (RBAC)
Virtual groups
Defining conditions
Tuning policies
Implementing ongoing maintenance

Module 4: Windows Migrations for Traps

SQL database migration
SSL certificate migration

Module 5: Advanced Traps Forensics

Best practices for managing forensic data
Agent queries
Resources for malicious software testing
Exploit challenge testing with Metasploit
Exploit dump analysis with windbg

Module 6: Advanced Traps Troubleshooting

ESM and Traps architecture
Troubleshooting scenarios using dbconfig and cytool
Troubleshooting application compatibility and BITS connectivity

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

Print Friendly, PDF & Email