PCNSA: Palo Alto Networks Certified Network Security Administrator Certification Video Training Course

What’s included
$14.99 / $24.99
Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.
Pay once, own it forever
Video Courses
Chapter 1 – PAN-Security Architecture
Lectures | Duration |
---|---|
1. 1.1 Security platform overview | 8m |
2. 1.2 Next-generation firewall architecture | 3m |
3. 1.3 Zero Trust security model | 4m |
4. 1.4 Firewall offerings | 5m |
1. 1.1 Security platform overview
8m
2. 1.2 Next-generation firewall architecture
3m
3. 1.3 Zero Trust security model
4m
4. 1.4 Firewall offerings
5m
Chapter 2 - Initial Device Configuration
Lectures | Duration |
---|---|
1. 2.1 Administrative controls | 13m |
2. 2.2 Initial system access | 14m |
3. 2.3 Configuration management | 12m |
4. 2.4 Licensing and software updates | 10m |
5. 2.5 Account administration | 13m |
6. 2.6 Viewing and filtering logs | 8m |
7. 2.7 Lab Initial Configuration | 16m |
8. 2.8 Security zones and interfaces | 10m |
9. 2.9 Tap VirtualWire Layer2 | 14m |
1. 2.1 Administrative controls
13m
2. 2.2 Initial system access
14m
3. 2.3 Configuration management
12m
4. 2.4 Licensing and software updates
10m
5. 2.5 Account administration
13m
6. 2.6 Viewing and filtering logs
8m
7. 2.7 Lab Initial Configuration
16m
8. 2.8 Security zones and interfaces
10m
9. 2.9 Tap VirtualWire Layer2
14m
Chapter 3 - Security and NAT Policies
Lectures | Duration |
---|---|
1. 3.1 Security policy fundamental concepts | 15m |
2. 3.2 Security policy administration | 33m |
3. 3.3 Network address translation, Source NAT configuration | 17m |
4. 3.4 Destination NAT configuration | 10m |
5. 3.5 Lab: Security and NAT Policies | 24m |
1. 3.1 Security policy fundamental concepts
15m
2. 3.2 Security policy administration
33m
3. 3.3 Network address translation, Source NAT configuration
17m
4. 3.4 Destination NAT configuration
10m
5. 3.5 Lab: Security and NAT Policies
24m
Chapter 4 - App-ID
Lectures | Duration |
---|---|
1. 4.1 App-ID overview | 8m |
2. 4.2 Using App-ID in a Security policy | 26m |
3. 4.3 Migrating to an App-ID | 23m |
4. 4.4 Lab App-ID | 32m |
1. 4.1 App-ID overview
8m
2. 4.2 Using App-ID in a Security policy
26m
3. 4.3 Migrating to an App-ID
23m
4. 4.4 Lab App-ID
32m
Chapter 5 - Content-ID
Lectures | Duration |
---|---|
1. 5.1 Content-ID overview | 11m |
2. 5.2 Vulnerability Protection Security Profiles | 18m |
3. 5.3 Antivirus Security Profiles | 11m |
4. 5.4 Anti-Spyware Security Profiles | 18m |
5. 5.5 File Blocking Profiles | 10m |
6. 5.6 Data Filtering Profiles | 18m |
7. 5.7 Attaching Security Profiles to Security policy rules | 4m |
8. 5.8 Telemetry and threat intelligence | 3m |
9. 5.9 Denial-of-service protection | 21m |
10. 5.10 Lab Content-ID | 33m |
1. 5.1 Content-ID overview
11m
2. 5.2 Vulnerability Protection Security Profiles
18m
3. 5.3 Antivirus Security Profiles
11m
4. 5.4 Anti-Spyware Security Profiles
18m
5. 5.5 File Blocking Profiles
10m
6. 5.6 Data Filtering Profiles
18m
7. 5.7 Attaching Security Profiles to Security policy rules
4m
8. 5.8 Telemetry and threat intelligence
3m
9. 5.9 Denial-of-service protection
21m
10. 5.10 Lab Content-ID
33m
Chapter 6 -URL Filtering
Lectures | Duration |
---|---|
1. 6.1 URL Filtering concepts | 10m |
2. 6.2 Configuring and managing URL Filtering | 18m |
3. 6.3 URL Filtering using Admin Override Option | 7m |
4. 6.4 Lab URL Filtering | 19m |
1. 6.1 URL Filtering concepts
10m
2. 6.2 Configuring and managing URL Filtering
18m
3. 6.3 URL Filtering using Admin Override Option
7m
4. 6.4 Lab URL Filtering
19m
Chapter 7 - Decryption
Lectures | Duration |
---|---|
1. 7.1 Decryption concepts | 13m |
2. 7.2 Certificate management | 14m |
3. 7.3 SSL forward proxy decryption | 13m |
4. 7.4 SSL inbound inspection | 8m |
5. 7.5 Other decryption topics | 7m |
6. 7.6 Lab Decryption | 26m |
1. 7.1 Decryption concepts
13m
2. 7.2 Certificate management
14m
3. 7.3 SSL forward proxy decryption
13m
4. 7.4 SSL inbound inspection
8m
5. 7.5 Other decryption topics
7m
6. 7.6 Lab Decryption
26m
Chapter 8 - WildFire
Lectures | Duration |
---|---|
1. 8.1 WildFire concepts | 8m |
2. 8.2 Configuring and managing WildFire | 5m |
3. 8.3 WildFire reporting | 3m |
4. 8.4 Lab WildFire | 9m |
1. 8.1 WildFire concepts
8m
2. 8.2 Configuring and managing WildFire
5m
3. 8.3 WildFire reporting
3m
4. 8.4 Lab WildFire
9m
Chapter 9 - User-ID
Lectures | Duration |
---|---|
1. 9.1 User-ID overview | 7m |
2. 9.2 User mapping methods overview | 6m |
3. 9.3 Configuring User-ID | 5m |
4. 9.4 PAN-OS integrated agent configuration | 13m |
5. 9.5 Windows-based agent configuration | 5m |
6. 9.6 Configuring group mapping | 10m |
7. 9.7 User-ID and security policy | 18m |
8. 9.8 Lab User-ID | 28m |
1. 9.1 User-ID overview
7m
2. 9.2 User mapping methods overview
6m
3. 9.3 Configuring User-ID
5m
4. 9.4 PAN-OS integrated agent configuration
13m
5. 9.5 Windows-based agent configuration
5m
6. 9.6 Configuring group mapping
10m
7. 9.7 User-ID and security policy
18m
8. 9.8 Lab User-ID
28m
Chapter 10 - Global Protect (Remote Access VPN)
Lectures | Duration |
---|---|
1. 10.1 GlobalProtect overview | 8m |
2. 10.2 Preparing the firewall for GlobalProtect | 14m |
3. 10.3 Configuration GlobalProtect portal | 14m |
4. 10.4 Configuration GlobalProtect gateway | 11m |
5. 10.5 Configuration GlobalProtect agents | 9m |
6. 10.6 Lab GlobalProtect | 25m |
1. 10.1 GlobalProtect overview
8m
2. 10.2 Preparing the firewall for GlobalProtect
14m
3. 10.3 Configuration GlobalProtect portal
14m
4. 10.4 Configuration GlobalProtect gateway
11m
5. 10.5 Configuration GlobalProtect agents
9m
6. 10.6 Lab GlobalProtect
25m
Chapter 10 - Site-to-site-VPN
Lectures | Duration |
---|---|
1. 10.7 Site-to-site VPN | 9m |
2. 10.8 Configuring site-to-site tunnels | 15m |
3. 10.9 IPsec troubleshooting | 7m |
4. 10.10 Lab Site-to-Site VPN | 21m |
1. 10.7 Site-to-site VPN
9m
2. 10.8 Configuring site-to-site tunnels
15m
3. 10.9 IPsec troubleshooting
7m
4. 10.10 Lab Site-to-Site VPN
21m
Chapter 11 - Monitoring and Reporting
Lectures | Duration |
---|---|
1. 11.1 Dashboard and Monitor | 16m |
2. 11.2 Application Command Center (ACC) | 9m |
3. 11.3 Reports | 7m |
4. 11.4 Log forwarding | 9m |
5. 11.5 Syslog | 10m |
6. 11.6 Configuring SNMP | 9m |
7. 11.7 Lab Monitoring and Reporting | 22m |
1. 11.1 Dashboard and Monitor
16m
2. 11.2 Application Command Center (ACC)
9m
3. 11.3 Reports
7m
4. 11.4 Log forwarding
9m
5. 11.5 Syslog
10m
6. 11.6 Configuring SNMP
9m
7. 11.7 Lab Monitoring and Reporting
22m
Chapter 12 - HA (High Availability)
Lectures | Duration |
---|---|
1. 12.1 HA overview | 4m |
2. 12.2 HA components and operation | 8m |
3. 12.3 Active-Passive HA configuration | 13m |
4. 12.4 Monitoring HA state | 4m |
5. 12.5 Lab Active-Passive High Availability | 16m |
1. 12.1 HA overview
4m
2. 12.2 HA components and operation
8m
3. 12.3 Active-Passive HA configuration
13m
4. 12.4 Monitoring HA state
4m
5. 12.5 Lab Active-Passive High Availability
16m