Introduction to Network Security
In this collection, you will learn how to consistently secure users, applications, and data, no matter where they reside through natively integrated ML-powered Next-Generation Firewalls.
In this collection, you will learn how to consistently secure users, applications, and data, no matter where they reside through natively integrated ML-powered Next-Generation Firewalls.
Learn how to deploy, operate, and automate PAN-OS features to optimize Palo Alto Networks next-generation firewalls for your business needs.
Palo Alto Networks was the first next-generation firewall vendor to enable identity-based security with the introduction of natively integrated User-ID for user-based policies. Learn about Identity and how Identity works at Palo Alto Networks.
Palo Alto Networks Next-Generation Firewalls offer a prevention-focused architecture that is easy to deploy and operate, uses automation to reduce manual effort so that security teams can focus on what matters, and helps organizations easily adopt new innovations. The PAN-OS...
In the Cloud-Delivered Security Services collection, learn about current cybersecurity challenges and how Palo Alto Networks ML-powered, Next-Generation Firewall subscription services combats those challenges.
The Palo Alto Networks Software Firewall collection describes how to protect public and private clouds, virtualized data centers, branch locations, and containerized environments with virtual, container, and cloud next-generation firewalls.
The Panorama Collection is a self-paced, digital-learning training that describes Panoramas initial configuration, adding firewalls, management, template and device group use, configuration of administrator accounts, log collection, reporting, and troubleshooting communications and commit issues. The collection consists of seven courses...
Learn about the tools and resources that will help you optimize your security implementation and configuration in order to strengthen your security posture and gain insights into risks.
Palo Alto Networks Prisma SD-WAN is a cloud-delivered service that implements app-defined, autonomous SD-WAN to help you secure and connect your branch offices, data centers, and large campus sites without increasing cost and complexity. The AppFabric connects your sites securely...
Prisma Access Managed by Strata Cloud Manager allows you can quickly onboard branches and mobile users through task-driven workflows that allow you to set up and test your environment in minutes. Cloud management with Strata Cloud Manager simplifies the onboarding...
Learn how Autonomous Digital Experience Management provides organizations with visibility to improve operational efficiency and deliver optimal user experiences and application performance
In this collection, learn how to protect information, data, applications and infrastructure associated with cloud computing to effectively secure business-critical data in the cloud.
Learn how Cloud Code Security can enable and automate security to identify and resolve misconfigurations.
Learn how Cloud Security Posture Management in Prisma Cloud can reduce the complexity of securing multi-cloud environments through comprehensive visibility, automated monitoring, and streamlined remediation.
Learn how Cloud Workload Protection in Prisma Cloud delivers flexible protection to secure cloud VMs, containers, and serverless functions.
Learn how Cloud Network Security in Prisma Cloud reduces risks and blocks threats by managing lateral movement within the cloud and preventing critical data from leaving the cloud.
Learn how Cloud Infrastructure Entitlement Management in Prisma Cloud improves IAM governance through enforcing least-privileged access and providing visibility into inconsistent entitlements across cloud resources.
Learn how Prisma Cloud offers the broadest security and compliance coverage for applications, data, and the entire cloud native technology stack across multi- and hybrid cloud environments.
In this collection, learn how SecOps must leverage automation to reduce strain on analysts and execute the Security Operation Center's (SOC) mission to identify, investigate, and mitigate threats.
Learn about the architectural fundamentals, key concepts, operation, and investigative and triage techniques security analysts can perform using Cortex XDR. Additionally, learn the benefits Cortex XDR brings to security operations.
Learn how to deploy, monitor, maintain, and troubleshoot the industry's first security orchestration, automation, and response platform (SOAR) with native threat intelligence management.
Learn how to activate, configure, and forward logs to Cortex Data Lake. Additionally, learn about some connectivity aspects and troubleshooting techniques for Cortex Data Lake.
Learn the fundamentals of Cortex XSIAM from a post-sales technical perspective, with topics such as Ingestion, Endpoints, and Threat Intelligence Management.
Learn how AutoFocus gives you access to high-fidelity threat intelligence so you can get unique insights into real world attacks. Contextual threat intelligence is provided by Unit 42 threat researchers to speed investigation, prevention, and response.