Class Central Tips
Palo Alto Networks Cybersecurity Essentials I
Course Description:
Essentials I provides the student with a partial understanding of the fundamental tenants of cybersecurity and covers the general security concepts involved in maintaining a secure network computing environment. Students will partially learn the nature and scope of today’s cybersecurity challenges, strategies for network defense, as well as detailed information about next-generation cybersecurity solutions. Students will also deploy a variety of security methodologies as well as technologies and concepts used for implementing a secure network environment.
Learning Objectives:
Upon completion of this course, students will be able to:
• Formulate an industry-standard design to protect infrastructure against cybersecurity threats.
• Apply advanced filtering methodologies such as user, application, and content ID to protect against all known and unknown attack vectors.
• Describe the basics of cryptography including synchronous/asynchronous encryption, PKI, and certificates.
Course Description:
Essentials I provides the student with a partial understanding of the fundamental tenants of cybersecurity and covers the general security concepts involved in maintaining a secure network computing environment. Students will partially learn the nature and scope of today’s cybersecurity challenges, strategies for network defense, as well as detailed information about next-generation cybersecurity solutions. Students will also deploy a variety of security methodologies as well as technologies and concepts used for implementing a secure network environment.
Learning Objectives:
Upon completion of this course, students will be able to:
• Formulate an industry-standard design to protect infrastructure against cybersecurity threats.
• Apply advanced filtering methodologies such as user, application, and content ID to protect against all known and unknown attack vectors.
• Describe the basics of cryptography including synchronous/asynchronous encryption, PKI, and certificates.