FOUNDATIONS OF PALO ALTO NETWORKS TRAPS -ENDPOINT PROTECTION - PAN-EDU-180 - NA

PT22342
Training Summary
Compromise isn�t inevitable, or, at least, it shouldn�t be. Traditional endpoint protection simply cannot keep up with the rapidly evolving threat landscape, leaving organizations vulnerable to advanced attacks. A new approach is needed, one that can rebuild confidence in endpoint security.� This new approach needs to prevent advanced attacks originating from executables, data files or network-based exploits � known and unknown � before any malicious activity could successfully run. Palo Alto Networks call this �advanced endpoint protection.� By focusing on the attacker�s core techniques and putting up barriers to mitigate them, the attacker�s path for exploitation becomes known, even when the attack isn�t. Traps� focuses on the core techniques leveraged by exploits in advanced cyberattacks and renders these techniques ineffective by breaking the exploit sequence and blocking the technique the moment it is attempted.
Prerequisites
This course requires students be familiar with typical Windows endpoint product installation and troubleshooting. Basic Windows-based server technology implementation and integration is a plus.
Duration
4 Hours
Audience
Security Engineers & Network Engineers
Course Topics
This course is intended to provide a top-level overview of Palo Alto Networks Traps Endpoint protection product. Upon completion of the class the student will be able to understand these principles: Explain the core technologies of Traps and how it differs from traditional signature recognition technologies. Understand the advantages of these technologies over existing solutions. Understand Trap's product architecture and deployment requirements. Installation requirements for Traps installations. Deploy Exploit Prevention Module defenses to endpoints with Policies. Deploy Malware Protection defenses to endpoints. Provide Application Execution Control in conjunction with WildFire. Understand deployment strategies and tactics for Workstations, VDI and Server endpoints. Gather and analyze Security Event reports and forensics.

Related Scheduled Courses