FOUNDATIONS OF PALO ALTO NETWORKS TRAPS -ENDPOINT PROTECTION - PAN-EDU-180

Catalog Home TCP/IP, Cisco & Networking Technologies Palo Alto

Compromise isn’t inevitable, or, at least, it shouldn’t be. Traditional endpoint protection simply cannot keep up with the rapidly evolving threat landscape, leaving organizations vulnerable to advanced attacks. A new approach is needed, one that can rebuild confidence in endpoint security. This new approach needs to prevent advanced attacks originating from executables, data files or network-based exploits – known and unknown – before any malicious activity could successfully run. Palo Alto Networks call this “advanced endpoint protection.” By focusing on the attacker’s core techniques and putting up barriers to mitigate them, the attacker’s path for exploitation becomes known, even when the attack isn’t.

Traps™ focuses on the core techniques leveraged by exploits in advanced cyberattacks and renders these techniques ineffective by breaking the exploit sequence and blocking the technique the moment it is attempted.

This course requires students be familiar with typical Windows endpoint product installation and troubleshooting. Basic Windows-based server technology implementation and integration is a plus.

0 Days

Security Engineers & Network Engineers

This course is intended to provide a top-level overview of Palo Alto Networks Traps Endpoint protection product.

Upon completion of the class the student will be able to understand these principles:

  • Explain the core technologies of Traps and how it differs from traditional signature recognition technologies.
  • Understand the advantages of these technologies over existing solutions.
  • Understand Trap's product architecture and deployment requirements.
  • Installation requirements for Traps installations.
  • Deploy Exploit Prevention Module defenses to endpoints with Policies.
  • Deploy Malware Protection defenses to endpoints.
  • Provide Application Execution Control in conjunction with WildFire.
  • Understand deployment strategies and tactics for Workstations, VDI and Server endpoints.
  • Gather and analyze Security Event reports and forensics.




< >

Recently Viewed Courses:

Copyright © 2019 ProTech. All Rights Reserved.

Sign In Create Account

Navigation

Social Media