Palo Alto PCNSE Certification Training Institute | Emigo
ccna-banner-image

Palo Alto Networks Certified Network Security Engineer. Pcnse

Our PCNSE Certification Training, offered by EMIGO NETWORKS, is one of the premier courses for network security professionals.

Palo Alto Networks Certified Network Security Engineer. PCNSE Training and Certification

The PCNSE certification validates your expertise in designing, deploying, configuring, maintaining, and troubleshooting Palo Alto Networks-based network security implementations. It demonstrates your in-depth knowledge of the Palo Alto Networks product portfolio, enabling you to make full use of it in various implementations. Achieving this certification signifies your ability to correctly deploy firewalls while leveraging the entire platform.

Course Overview

The PCNSE Certification from Palo Alto Networks is designed to assess and validate the comprehensive knowledge and expertise needed to effectively design, implement, operate, manage, and troubleshoot Palo Alto Networks Next-Generation Firewalls. This certification demonstrates your proficiency in securing networks using advanced firewall technologies and is ideal for network security professionals aiming to enhance their skills and advance their careers in cybersecurity.

If you are aiming for a career in network security, Emigo Networks offers the ideal training for the Palo Alto Networks Certified Network Security Engineer (PCNSE) certification.

The PCNSE certification is highly regarded in the IT industry, validating your expertise in configuring, managing, and troubleshooting Palo Alto Networks Next-Generation Firewalls. As the demand for skilled network security professionals continues to grow, this certification equips you with the advanced knowledge and skills necessary to excel in the evolving field of network security.

Emigo Networks provides comprehensive training that will help you master the essential skills needed to become a certified expert in Palo Alto Networks security solutions.

What You'll Learn

  • Design, deploy, configure, and maintain Palo Alto Networks security solutions.
  • Implement advanced firewall policies, NAT, and VPNs for secure network operations.
  • Troubleshoot and optimize network security deployments to ensure high performance and reliability.
  • Apply best practices for threat prevention, traffic monitoring, and security management.
  • Leverage the full Palo Alto Networks product portfolio for enterprise-grade security solutions.

Syllabus Summary

Core Concepts

1.1 Identify how Palo Alto Networks products work together to improve PAN-OS services 

1.1.1 Security components 

1.1.2 Firewall components 

1.1.3 Panorama components 

1.1.4 PAN-OS subscriptions and the features they enable 

1.1.5 Plug-in components 

1.1.6 Heatmap and BPA reports 

1.1.7 Artificial intelligence operations (AIOps)/Telemetry 

1.1.8 IPv6 1.1.9 Internet of things (IoT) 

1.2 Determine and assess appropriate interface or zone types for various environments 

1.2.1 Layer 2 interfaces 

1.2.2 Layer 3 interfaces 

1.2.3 Virtual wire (vwire) interfaces 

1.2.4 Tap interfaces 

1.2.5 Subinterfaces 

1.2.6 Tunnel interfaces 

1.2.7 Aggregate interfaces 

1.2.8 Loopback interfaces 

1.2.9 Decrypt mirror interfaces 

1.2.10 VLAN interfaces 

1.3 Identify decryption deployment strategies 

1.3.1 Risks and implications of enabling decryption 

1.3.2 Use cases 1.3.3 Decryption types 

1.3.4 Decryption profiles and certificates 

1.3.5 Create decryption policy in the firewall 

1.3.6 Configure SSH Proxy 

1.4 Enforce User-ID 

1.4.1 Methods of building user-to-IP mappings 

1.4.2 Determine if User-ID agent or agentless should be used 

1.4.3 Compare and contrast User-ID agents 

1.4.4 Methods of User-ID redistribution 

1.4.5 Methods of group mapping 

1.4.6 Server profile & authentication profile 

1.5 Determine how and when to use the Authentication policy 

1.5.1 Purpose of, and use case for, the Authentication policy 

1.5.2 Dependencies 

1.5.3 Captive portal versus GlobalProtect (GP) client 

1.6 Differentiate between the fundamental functions that reside on the management plane and data plane 

1.7 Define multiple virtual systems (multi-vsys) environment 

1.7.1 User-ID hub 

1.7.2 Inter-vsys routing 

1.7.3 Service routes 

1.7.4 Administration 

Deploy and Configure Core Components

2.1 Configure management profiles 

2.1.1 Interface management profile 

2.1.2 SSL/TLS service profile

2.2 Deploy and configure Security profiles 

2.2.1 Custom configuration of different Security profiles and Security profile groups 

2.2.2 Relationship between URL filtering and credential theft prevention 

2.2.3 Use of username and domain name in HTTP header insertion 

2.2.4 DNS Security 

2.2.5 How to tune or add exceptions to a Security profile

2.2.6 Compare and contrast threat prevention and advanced threat prevention 

2.2.7 Compare and contrast URL Filtering and Advanced URL Filtering 

2.3 Configure zone protection, packet buffer protection, and DoS protection 

2.3.1 Customized values versus default settings 

2.3.2 Classified versus aggregate profile types 

2.3.3 Layer 3 and Layer 4 header inspection 

2.4 Design the deployment configuration of a Palo Alto Networks firewall 

2.4.1 Advanced high availability (HA) deployments 

2.4.2 HA pair 

2.4.3 Zero Touch Provisioning (ZTP) 

2.4.4 Bootstrapping 

2.5 Configure authorization, authentication, and device access 

2.5.1 Role-based access control for authorization 

2.5.2 Different methods used to authenticate 

2.5.3 The authentication sequence 

2.5.4 The device access method 

2.6 Configure and manage certificates 

2.6.1 Usage 

2.6.2 Profiles 

2.6.3 Chains 

2.7 Configure routing 

2.7.1 Dynamic routing 

2.7.2 Redistribution profiles 

2.7.3 Static routes 

2.7.4 Path monitoring 

2.7.5 Policy-based forwarding 

2.7.6 Virtual router versus logical router 

2.8 Configure NAT 

2.8.1 NAT policy rules 

2.8.2 Security rules 

2.8.3 Source NAT 

2.8.4 No NAT 

2.8.5 Use session browser to find NAT rule name 

2.8.6 U-Turn NAT 

2.8.7 Check HIT counts

2.9 Configure site-to-site tunnels 

2.9.1 IPSec components 

2.9.2 Static peers and dynamic peers for IPSec 

2.9.3 IPSec tunnel monitor profiles 

2.9.4 IPSec tunnel testing 

2.9.5 Generic Routing Encapsulation (GRE) 

2.9.6 One-to-one and one-to-many tunnels 

2.9.7 Determine when to use proxy IDs 

2.10 Configure service routes 

2.10.1 Default 

2.10.2 Custom 

2.10.3 Destination 

2.10.4 Custom routes for different vsys versus destination routes 

2.10.5 How to verify service routes 

2.11 Configure application-based QoS 

2.11.1 Enablement requirements 

2.11.2 QoS policy rule 

2.11.3 Add DSCP/TOS component 

2.11.4 QoS profile 

2.11.5 Determine how to control bandwidth use on a per-application basis 

2.11.6 Use QoS to monitor bandwidth utilization 

Deploy and Configure Features and Subscriptions

3.1 Configure App-ID 

3.1.1 Create security rules with App-ID 

3.1.2 Convert port and protocol rules to App-ID rules 

3.1.3 Identify the impact of application override to the overall functionality of the firewall 

3.1.4 Create custom apps and threats 

3.1.5 Review App-ID dependencies 

3.2 Configure GlobalProtect 

3.2.1 GlobalProtect licensing 

3.2.2 Configure gateway and portal 

3.2.3 GlobalProtect agent 

3.2.4 Differentiate between login methods 

3.2.5 Configure Clientless VPN 

3.2.6 Host information profile (HIP) 

3.2.7 Configure multiple gateway agent profiles 

3.2.8 Split tunneling

3.3 Configure decryption 

3.3.1 Inbound decryption 

3.3.2 SSL forward proxy 

3.3.3 SSL decryption exclusions 

3.3.4 SSH proxy 

3.4 Configure User-ID 

3.4.1 User-ID agent and agentless 

3.4.2 User-ID group mapping 

3.4.3 Shared User-ID mapping across virtual systems 

3.4.4 Data redistribution 

3.4.5 User-ID methods 

3.4.6 Benefits of using dynamic user groups in policy rules 

3.4.7 Requirements to support dynamic user groups 

3.4.8 How GlobalProtect internal and external gateways can be used 

3.5 Configure WildFire 

3.5.1 Submission profile 

3.5.2 Action profile 

3.5.3 Submissions and verdicts 

3.5.4 Signature actions 

3.5.5 File types and file sizes 

3.5.6 Update schedule 

3.5.7 Forwarding of decrypted traffic 

3.6 Configure Web Proxy 

3.6.1 Transparent proxy 

3.6.2 Explicit proxy 

Deploy and Configure Firewalls Using Panorama

4.1 Configure templates and template stacks 

4.1.1 Components configured in a template 

4.1.2 How the order of templates in a stack affects the configuration push to a firewall 

4.1.3 Overriding a template value in a stack 

4.1.4 Configure variables in templates 

4.1.5 Relationship between Panorama and devices as pertaining to dynamic updates versions, policy implementation, and/or HA peers 

4.2 Configure device groups 

4.2.1 Device group hierarchies 

4.2.2 Identify what device groups contain 

4.2.3 Differentiate between different use cases for pre-rules, local rules, the default rules, and post-rules 

4.2.4 Identify the impact of configuring a primary device 

4.2.5 Assign firewalls to device groups

4.3 Manage firewall configurations within Panorama 

4.3.1 Licensing 

4.3.2 Commit recovery feature 

4.3.3 Automatic commit recovery 

4.3.4 Commit types and schedules 

4.3.5 Config backups 

4.3.6 Commit type options 

4.3.7 Manage dynamic updates for Panorama and Panorama-managed devices 

4.3.8 Software and dynamic updates 

4.3.9 Import firewall configuration into Panorama 

4.3.10 Configure log collectors 

4.3.11 Check firewall health and status from Panorama 

4.3.12 Configure role-based access on Panorama 

Manage and Operate

5.1 Manage and configure Log Forwarding 

5.1.1 Identify log types and criticalities 

5.1.2 Manage external services 

5.1.3 Create and manage tags 

5.1.4 Identify system and traffic issues using the web interface and CLI tools 

5.1.5 Configure Log Forwarding profile and device log settings 

5.1.6 Log monitoring 

5.1.7 Customize logging and reporting settings 

5.2 Plan and execute the process to upgrade a Palo Alto Networks system 

5.2.1 Single firewall 

5.2.2 HA pairs 

5.2.3 Panorama push 

5.2.4 Dynamic updates 

5.3 Manage HA functions 

5.3.1 Link monitoring 

5.3.2 Path monitoring 

5.3.3 HA links 

5.3.4 Failover 

5.3.5 Active/active and active/passive 

5.3.6 HA interfaces 

5.3.7 Clustering 

5.3.8 Election setting 

Troubleshooting

6.1 Troubleshoot site-to-site tunnels 

6.1.1 IPSec 

6.1.2 GRE 

6.1.3 One-to-one and one-to-many tunnels 

6.1.4 Route-based versus policy-based remote hosts 

6.1.5 Tunnel monitoring 

6.2 Troubleshoot interfaces 

6.2.1 Transceivers 

6.2.2 Settings 

6.2.3 Aggregate interfaces, LACP 

6.2.4 Counters 

6.2.5 Tagging 

6.3 Troubleshoot decryption 

6.3.1 Inbound decryption 

6.3.2 SSL forward proxy 

6.3.3 SSH proxy 

6.3.4 Identify what cannot be decrypted and configure exclusions and bypasses 

6.3.5 Certificates 

6.4 Troubleshoot routing 

6.4.1 Dynamic routing 

6.4.2 Redistribution profiles 

6.4.3 Static routes 

6.4.4 Route monitoring 

6.4.5 Policy-based forwarding 

6.4.6 Multicast routing 

6.4.7 Service routes 

6.5 General Troubleshooting 

6.5.1 Logs 

6.5.2 Packet capture (pcap) 

6.5.3 Reports 

6.6 Troubleshoot resource protections 

6.6.1 Zone protection profiles 

6.6.2 DoS protections 

6.6.3 Packet buffer protections 

6.7 Troubleshoot GlobalProtect 

6.7.1 Portal and Gateway 

6.7.2 Access to resources 

6.7.3 GlobalProtect client 

6.8 Troubleshoot policies 

6.8.1 NAT 

6.8.2 Security 

6.8.3 Decryption 

6.8.4 Authentication 

6.9 Troubleshoot HA functions 

6.9.1 Monitor 

6.9.2 Failover triggers


Pre-requisites

  • Palo Alto Networks Certified Cybersecurity Apprentice
  • Palo Alto Networks Certified Cybersecurity Practitioner
  • Palo Alto Networks Certified Network Security Generalist

Required Exams

  • Exam: PCNSE
  • Cost: $175 USD
  • Duration: 90 Minutes

Who should attend

  • Designed for professionals in network security engineering, systems engineering, systems integration, and support engineering roles.
  • Ideal for those who deploy and configure Palo Alto Networks Next-Generation Firewalls.
  • Targeted at individuals responsible for the installation, configuration, and management of network security systems.
  • Suitable for engineers aiming to demonstrate expertise in securing and optimizing network infrastructures with Palo Alto Networks solutions.

Related Courses

experts-banner-background

EMIGO Expert Training Team

new-batch-mage

New Batches Commence On

Testimonials

enquiry-section1-bg
enquiry-form-model1

Learn like a Leader
Not a follower

Scan or Click on the QR Code to submit your enquiry

Enquiry
enquiry-section1-qrcode
footer-enquiry footer-enquiry