PCNSE: Palo Alto Networks Certified Network Security Engineer Certification Video Training Course

What’s included
$14.99 / $24.99
Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.
Pay once, own it forever
Video Courses
Paloalto Intro and Deployment Options
Lectures | Duration |
---|---|
1. Preview2 | 2m 14s |
2. Palo Alto Firewalls overview | 7m 3s |
3. Deployment Options | 2m 41s |
4. Layer 2 deployment | 25m 15s |
5. Layer 3 deployment | 12m 29s |
6. Layer 2 deployment and spanning tree | 9m 14s |
7. Layer 2 Features and Limitations with demonstration | 9m 54s |
8. Virtual Wire deployment | 18m 35s |
9. Virtual Wire IP Classify | 19m 38s |
10. Tap Mode deployment | 9m 13s |
11. Initial Configuration | 3m 14s |
1. Preview2
2m 14s
2. Palo Alto Firewalls overview
7m 3s
3. Deployment Options
2m 41s
4. Layer 2 deployment
25m 15s
5. Layer 3 deployment
12m 29s
6. Layer 2 deployment and spanning tree
9m 14s
7. Layer 2 Features and Limitations with demonstration
9m 54s
8. Virtual Wire deployment
18m 35s
9. Virtual Wire IP Classify
19m 38s
10. Tap Mode deployment
9m 13s
11. Initial Configuration
3m 14s
Lab and AWS Palo Alto instance(s) Setup
Lectures | Duration |
---|---|
1. Create an Amazon AWS instance to practice | 10m 1s |
2. Setup Amazon AWS for lab testing, add a windows AD server | 12m 12s |
3. AWS VPC setup, routing setup, route traffic through the AWS instance | 19m 2s |
4. Create a DMZ segment in Amazon AWS, add a server to DMZ segment | 10m 11s |
5. AWS routing issue to be aware of | 4m 11s |
6. Unetlab EVE-NG name change | 0s |
1. Create an Amazon AWS instance to practice
10m 1s
2. Setup Amazon AWS for lab testing, add a windows AD server
12m 12s
3. AWS VPC setup, routing setup, route traffic through the AWS instance
19m 2s
4. Create a DMZ segment in Amazon AWS, add a server to DMZ segment
10m 11s
5. AWS routing issue to be aware of
4m 11s
6. Unetlab EVE-NG name change
0s
Basic Administrative Tasks
Lectures | Duration |
---|---|
1. Basic Settings | 5m 46s |
2. Changes and Committing changes | 6m 51s |
3. Local Administrator Account with External Authentication | 9m 54s |
4. External Authentication Using Radius Server | 7m 33s |
5. System software Upgrade / Downgrade, global protect client install | 4m 27s |
6. Dynamic Updates | 2m 52s |
7. Interface Management Profile | 4m 38s |
1. Basic Settings
5m 46s
2. Changes and Committing changes
6m 51s
3. Local Administrator Account with External Authentication
9m 54s
4. External Authentication Using Radius Server
7m 33s
5. System software Upgrade / Downgrade, global protect client install
4m 27s
6. Dynamic Updates
2m 52s
7. Interface Management Profile
4m 38s
Security Policy Configuration
Lectures | Duration |
---|---|
1. Security Zones and Traffic Processing | 10m 10s |
2. Packet Flow | 9m 33s |
3. Rules based on application using App-ID | 10m 4s |
4. Security Policy Rules for applications not running on application default ports | 7m 43s |
5. Application Override Policies - Custom Applications | 8m 1s |
6. URL Filtering Rules and Options | 13m 51s |
7. Custom URL Category | 2m 53s |
8. Using Address Objects | 5m 51s |
9. Using Service Objects | 3m 47s |
10. Using Dynamic Block Lists | 4m 42s |
11. Using Tags | 2m 19s |
1. Security Zones and Traffic Processing
10m 10s
2. Packet Flow
9m 33s
3. Rules based on application using App-ID
10m 4s
4. Security Policy Rules for applications not running on application default ports
7m 43s
5. Application Override Policies - Custom Applications
8m 1s
6. URL Filtering Rules and Options
13m 51s
7. Custom URL Category
2m 53s
8. Using Address Objects
5m 51s
9. Using Service Objects
3m 47s
10. Using Dynamic Block Lists
4m 42s
11. Using Tags
2m 19s
User ID integration
Lectures | Duration |
---|---|
1. User ID integration | 8m 4s |
2. Installing User ID agent on AD | 10m 19s |
3. Configure the firewall to use user ID agent | 9m 3s |
4. Configuring integrated User ID agent | 5m 33s |
5. Group to User ID mapping | 5m 36s |
6. Making decisions based on user group membership example | 5m 5s |
7. Identifying Users using Captive Portal Redirect Mode | 6m 13s |
8. User ID mapping using CaptivePortal in Transparent Mode | 5m 17s |
9. Captive Portal using Broswer Challenge SSO example | 16m 51s |
10. Relaying UserID information using XML example | 6m 39s |
11. User ID mapping using Syslog Messages example | 3m 34s |
1. User ID integration
8m 4s
2. Installing User ID agent on AD
10m 19s
3. Configure the firewall to use user ID agent
9m 3s
4. Configuring integrated User ID agent
5m 33s
5. Group to User ID mapping
5m 36s
6. Making decisions based on user group membership example
5m 5s
7. Identifying Users using Captive Portal Redirect Mode
6m 13s
8. User ID mapping using CaptivePortal in Transparent Mode
5m 17s
9. Captive Portal using Broswer Challenge SSO example
16m 51s
10. Relaying UserID information using XML example
6m 39s
11. User ID mapping using Syslog Messages example
3m 34s
Threat Prevention
Lectures | Duration |
---|---|
1. AntiVirius configuration | 8m 19s |
2. Anti Spyware and DNS Sinkholing | 11m 36s |
3. Creating custom Anti-Spyware signatures | 10m 5s |
4. Configuring Vulnerability Protection and Custom Signatures | 11m 37s |
5. File Policies | 7m 2s |
6. Configuring Wildfire | 8m 35s |
7. Wildfire Portal | 1m 38s |
8. Configuring Data Filtering - Data Leakage Prevention | 8m 37s |
9. Denial Of Service Protection | 8m 21s |
10. Implementing Zone and Host Denial Of Service Protection | 10m 2s |
1. AntiVirius configuration
8m 19s
2. Anti Spyware and DNS Sinkholing
11m 36s
3. Creating custom Anti-Spyware signatures
10m 5s
4. Configuring Vulnerability Protection and Custom Signatures
11m 37s
5. File Policies
7m 2s
6. Configuring Wildfire
8m 35s
7. Wildfire Portal
1m 38s
8. Configuring Data Filtering - Data Leakage Prevention
8m 37s
9. Denial Of Service Protection
8m 21s
10. Implementing Zone and Host Denial Of Service Protection
10m 2s
SSL Decryption
Lectures | Duration |
---|---|
1. Certificates, Certificate of Autorities, and Decryption Concepts | 18m 17s |
2. SSL Forward Proxy - Trust Certificate - Local Cert on PaloAlto | 7m 33s |
3. SSL Forward Proxy - Untrust Certificate - Local Cert on PaloAlto | 6m 16s |
4. SSL Forward Proxy Using an Internal PKI Subordinate CA | 9m 5s |
5. SSL Forward Proxy Blocking Threats in Encrypted Traffic - Demo | 6m 52s |
6. SSL Inbound Inspection | 8m 24s |
1. Certificates, Certificate of Autorities, and Decryption Concepts
18m 17s
2. SSL Forward Proxy - Trust Certificate - Local Cert on PaloAlto
7m 33s
3. SSL Forward Proxy - Untrust Certificate - Local Cert on PaloAlto
6m 16s
4. SSL Forward Proxy Using an Internal PKI Subordinate CA
9m 5s
5. SSL Forward Proxy Blocking Threats in Encrypted Traffic - Demo
6m 52s
6. SSL Inbound Inspection
8m 24s
Network Address Translation
Lectures | Duration |
---|---|
1. Understanding Dynamic NAT and port | 15m 49s |
2. Dynamic NAT and port configuration examples | 19m 36s |
3. Dynamic NAT and port Egress Interface Multipe ISP consideration | 14m 8s |
4. What is the difference between Dynamic IP and Dynamic IP and port with examples | 10m 14s |
5. Static NAT concepts and example | 14m 41s |
6. Static NAT with Port Translation Use Case and scenario example | 18m 37s |
7. Static NAT with Port Translation Use Case and scenario example - part 2 | 5m 35s |
8. Destination NAT and Destination NAT with Port Address Translation | 7m 31s |
9. UTurn NAT with port translation | 7m 15s |
10. Source and Destination NAT | 10m 30s |
1. Understanding Dynamic NAT and port
15m 49s
2. Dynamic NAT and port configuration examples
19m 36s
3. Dynamic NAT and port Egress Interface Multipe ISP consideration
14m 8s
4. What is the difference between Dynamic IP and Dynamic IP and port with examples
10m 14s
5. Static NAT concepts and example
14m 41s
6. Static NAT with Port Translation Use Case and scenario example
18m 37s
7. Static NAT with Port Translation Use Case and scenario example - part 2
5m 35s
8. Destination NAT and Destination NAT with Port Address Translation
7m 31s
9. UTurn NAT with port translation
7m 15s
10. Source and Destination NAT
10m 30s
Basic and Intermediate Networking
Lectures | Duration |
---|---|
1. DHCP Services | 6m 26s |
2. Default Route | 5m 2s |
3. OSPF Routing | 9m 58s |
4. BGP Routing | 4m 51s |
5. BGP Advertise | 2m 46s |
6. Using Multiple Virtual Routers | 9m 6s |
7. Multiple Virtual Routers NAT and Security Policy Example | 11m 47s |
8. Multiple ISP Failover Scenario using BGP | 16m 39s |
9. Multiple ISP Failover using floating Static Route | 9m 35s |
10. Multiple ISP Failover using Policy Based Forwarding | 8m 7s |
11. Multiple ISP Load Sharing using Policy Based Forwarding | 5m 9s |
1. DHCP Services
6m 26s
2. Default Route
5m 2s
3. OSPF Routing
9m 58s
4. BGP Routing
4m 51s
5. BGP Advertise
2m 46s
6. Using Multiple Virtual Routers
9m 6s
7. Multiple Virtual Routers NAT and Security Policy Example
11m 47s
8. Multiple ISP Failover Scenario using BGP
16m 39s
9. Multiple ISP Failover using floating Static Route
9m 35s
10. Multiple ISP Failover using Policy Based Forwarding
8m 7s
11. Multiple ISP Load Sharing using Policy Based Forwarding
5m 9s
High Availability
Lectures | Duration |
---|---|
1. High Availability Overview | 13m 22s |
2. Active Passive Configuration Configuration Example | 14m 55s |
3. High Availability Active / Passive different failure scenarios HA1 HA2 heartbeat | 15m 18s |
4. High Availability Active / Passive HA1-backup, HA2-backup configuration | 15m 8s |
5. High Availabilit active / passive link and path monitoring, HA operations | 13m |
6. Active Active High availability intro, Floating IP | 9m 17s |
7. Active Active with Floating IP configuration example | 22m 23s |
8. Active Active session owner, session setup using IP modulus, failover example | 19m 38s |
9. Active Active Static Nat Configuration Example using NAT HA binding Primary | 10m 50s |
10. Active Active High Availability Arp Load Sharing Configuration Example | 10m 53s |
1. High Availability Overview
13m 22s
2. Active Passive Configuration Configuration Example
14m 55s
3. High Availability Active / Passive different failure scenarios HA1 HA2 heartbeat
15m 18s
4. High Availability Active / Passive HA1-backup, HA2-backup configuration
15m 8s
5. High Availabilit active / passive link and path monitoring, HA operations
13m
6. Active Active High availability intro, Floating IP
9m 17s
7. Active Active with Floating IP configuration example
22m 23s
8. Active Active session owner, session setup using IP modulus, failover example
19m 38s
9. Active Active Static Nat Configuration Example using NAT HA binding Primary
10m 50s
10. Active Active High Availability Arp Load Sharing Configuration Example
10m 53s
IPv6 configuration
Lectures | Duration |
---|---|
1. IPv6 structure, addressing, unicast (link local, site local, global), multicast | 14m 31s |
2. IPv6 neighbor discovery, icmpv6, dhcpv6 | 12m 48s |
3. IPv6 Stateles, Statefull DHCP, M Flag O Flag concepts | 8m 4s |
4. IPv6 basic firewall configuration example | 12m 49s |
5. IPv6 Network Prefix Translation NPTv6 configuration example | 11m 5s |
6. IPv6 NAT64 example connecting IPv6 only network to IPv4 Internet example | 18m 23s |
7. IPv6 NAT64 example connecting IPv4 only network to IPv6 only network | 12m 9s |
8. IPv6 issues related to Windows and policy based on IPv6 addresses, example | 12m 52s |
9. IPv6 dhcpv6 relay on PaloAlto firewall example | 8m 1s |
1. IPv6 structure, addressing, unicast (link local, site local, global), multicast
14m 31s
2. IPv6 neighbor discovery, icmpv6, dhcpv6
12m 48s
3. IPv6 Stateles, Statefull DHCP, M Flag O Flag concepts
8m 4s
4. IPv6 basic firewall configuration example
12m 49s
5. IPv6 Network Prefix Translation NPTv6 configuration example
11m 5s
6. IPv6 NAT64 example connecting IPv6 only network to IPv4 Internet example
18m 23s
7. IPv6 NAT64 example connecting IPv4 only network to IPv6 only network
12m 9s
8. IPv6 issues related to Windows and policy based on IPv6 addresses, example
12m 52s
9. IPv6 dhcpv6 relay on PaloAlto firewall example
8m 1s
VPN IPSec configuration details
Lectures | Duration |
---|---|
1. VPN IPSEC L2L intro and configuration steps | 17m 38s |
2. VPN IPSEc L2L PaloAlto to PaloAlto Example | 18m 31s |
3. VPN IPSEc Site To Site Hub Spoke, Dynamic IP address example | 10m 44s |
4. VPN IPSEC L2L Paloalto to Cisco ASA configuration example | 9m 34s |
5. VPN IPSEC L2L Paloalto to Cisco ASA with Dynamic IP address | 2m 58s |
6. IPsec Quick mode negotiation understanding | 8m 49s |
7. IKE main mode more details, explanation | 20m 17s |
8. Understanding IPSec Quick mode with PFS | 12m 28s |
9. IKE security policies required and NAT-T explanation / example | 15m 7s |
10. IKEv1 main mode versus agressive mode, understand the difference | 13m 4s |
11. IKEv2 intro and differences between IKEv2 and IKEv1 | 17m 3s |
12. IKEv2 Auth phase, IPsec associations, differences between Ikev1 and Ikev2 | 20m 34s |
1. VPN IPSEC L2L intro and configuration steps
17m 38s
2. VPN IPSEc L2L PaloAlto to PaloAlto Example
18m 31s
3. VPN IPSEc Site To Site Hub Spoke, Dynamic IP address example
10m 44s
4. VPN IPSEC L2L Paloalto to Cisco ASA configuration example
9m 34s
5. VPN IPSEC L2L Paloalto to Cisco ASA with Dynamic IP address
2m 58s
6. IPsec Quick mode negotiation understanding
8m 49s
7. IKE main mode more details, explanation
20m 17s
8. Understanding IPSec Quick mode with PFS
12m 28s
9. IKE security policies required and NAT-T explanation / example
15m 7s
10. IKEv1 main mode versus agressive mode, understand the difference
13m 4s
11. IKEv2 intro and differences between IKEv2 and IKEv1
17m 3s
12. IKEv2 Auth phase, IPsec associations, differences between Ikev1 and Ikev2
20m 34s
Global Protect
Lectures | Duration |
---|---|
1. Global Protect Setup example | 14m 9s |
2. Getting a free publicly trusted ssl certificate to test Global Protect | 11m 3s |
3. Setting up global protect for on-demand mode, discover agent settings | 12m 6s |
4. Dual Factor Authentication Using Open Source Solution PrivacyIdea - demo | 16m 53s |
5. Joining a windows PC to AWS windows domain - vpn tunnel to AWS | 9m 49s |
6. Installing CA services on windows, certificate enrollment policy service, OCSP | 11m 17s |
7. Global Protect Authentication using Dual Factor Token and Computer Certificate | 6m 33s |
8. Global Protect Always On User-Logon and Pre-Logon configuration | 7m 29s |
9. Global Protect Pre-Logon with User Logon (on demand) configuration example | 7m 52s |
10. Global Protect HIP Check | 10m 59s |
1. Global Protect Setup example
14m 9s
2. Getting a free publicly trusted ssl certificate to test Global Protect
11m 3s
3. Setting up global protect for on-demand mode, discover agent settings
12m 6s
4. Dual Factor Authentication Using Open Source Solution PrivacyIdea - demo
16m 53s
5. Joining a windows PC to AWS windows domain - vpn tunnel to AWS
9m 49s
6. Installing CA services on windows, certificate enrollment policy service, OCSP
11m 17s
7. Global Protect Authentication using Dual Factor Token and Computer Certificate
6m 33s
8. Global Protect Always On User-Logon and Pre-Logon configuration
7m 29s
9. Global Protect Pre-Logon with User Logon (on demand) configuration example
7m 52s
10. Global Protect HIP Check
10m 59s
Azure Palo Alto VM Deployment
Lectures | Duration |
---|---|
1. Azure Networking Concepts | 11m 14s |
2. Setup Palo Alto VM In Azure | 12m 8s |
3. Protecting Virtual Machines in Azure behind Palo Alto firewall | 23m |
1. Azure Networking Concepts
11m 14s
2. Setup Palo Alto VM In Azure
12m 8s
3. Protecting Virtual Machines in Azure behind Palo Alto firewall
23m
Panorama
Lectures | Duration |
---|---|
1. Panorama concepts, hardware, template and template stack | 18m 56s |
2. Panorama Device Group Concepts Part 1 | 12m 6s |
3. Panorama Device Group and Object Iheritance | 12m 46s |
1. Panorama concepts, hardware, template and template stack
18m 56s
2. Panorama Device Group Concepts Part 1
12m 6s
3. Panorama Device Group and Object Iheritance
12m 46s
QoS
Lectures | Duration |
---|---|
1. QoS Introduction | 13m 7s |
2. QoS Download Upload Bandwidth Restriction | 11m 35s |
3. QoS Classification and Marking | 12m 27s |
4. QoS Classification and Markings Example | 12m 32s |
5. IPSec QoS lab setup overview | 4m 24s |
6. Bandwidth Throttling IPSEc tunnels demo | 7m 34s |
7. IPSec Tunnel QoS traffic classification | 7m 10s |
8. IPSec Tunnel QoS controlling traffic bidirectionaly | 9m 22s |
9. IPSec QoS Copy ToS Header Explanation and demo | 12m 42s |
1. QoS Introduction
13m 7s
2. QoS Download Upload Bandwidth Restriction
11m 35s
3. QoS Classification and Marking
12m 27s
4. QoS Classification and Markings Example
12m 32s
5. IPSec QoS lab setup overview
4m 24s
6. Bandwidth Throttling IPSEc tunnels demo
7m 34s
7. IPSec Tunnel QoS traffic classification
7m 10s
8. IPSec Tunnel QoS controlling traffic bidirectionaly
9m 22s
9. IPSec QoS Copy ToS Header Explanation and demo
12m 42s
Optional - Installing PaloAlto 8.1 In AWS
Lectures | Duration |
---|---|
1. Palo Alto 8.1 Section Intro | 7m 8s |
2. Provisioning PaloAlto Firewall 8.1 in AWS - Part 1 | 15m 35s |
3. Provisioning PaloAlto Firewall 8.1 in AWS - Part 2 | 23m |
1. Palo Alto 8.1 Section Intro
7m 8s
2. Provisioning PaloAlto Firewall 8.1 in AWS - Part 1
15m 35s
3. Provisioning PaloAlto Firewall 8.1 in AWS - Part 2
23m