Preloader Image
Palo Alto Networks Certified 
Network Security Engineer (PCNSE)
Validates the in-depth knowledge and skills required to design, deploy, operate, manage, and troubleshoot Palo Alto Networks Next-Generation Firewalls
 
Syllabus:
Core Concepts
Deploy and Configure Core Components
Deploy and Configure Features and Subscriptions
Deploy and Configure Firewalls Using Panorama
Manage and Operate

Domain 1: Security Principles
Key Topics Include:

  • Identity Assurance
  • Privacy Control Mechanisms
  • Safeguarding Data
  • Strategic Risk Management

Domain 2: Incident Response, Business Continuity and Disaster Recovery Concepts
Key Topics Include:

  • Recovery Strategies
  • Continuity Strategies
  • Incident Management

Domain 3: Access Control Concepts
Key Topics Include:

  • Security Control Protocols
  • Access Control Strategies
  • User Privilege Administration

Domain 4: Network Security
Key Topics Include:

  • Secure Infrastructure Strategies
  • Cloud Computing Infrastructure
  • Network Architecture
  • Ports and Services Management

Domain 5: Security Operations
Key Topics Include:

  • Data Governance
  • Change Management
  • Hashing & Encryption
  • Password Security Awareness

Domain 6: Course Conclusion & Final Assessment

  • The final assessment will help you to confirm your understanding and retention of
    concepts for this course.
  • This assessment contains 100 questions.
  • To pass the Final Assessment you need to reach 100% progress to competency.
    To do so, the student must correctly answer 70% of the questions in each domain.
1acd387e-3c9f-499d-9c47-a66f68c14f34

Purpose:
This curriculum outlines the structure of a 5-week training designed to prepare
participants for a career as a SOC Analyst. The program places a strong emphasis on
network security, and system administration, with a primary focus on the foundational
and advanced concepts essential for an SOC environment. Trainees will gain hands-on
experience in managing and securing enterprise environments, with particular
attention to the critical role of a SOC Analyst. Throughout the internship, participants
will engage in both theoretical and practical tasks, building their expertise in SOC
operations, networking, and system security. The program will culminate in a
comprehensive final project that integrates all aspects of SOC Analyst responsibilities.

1. Week 1-2: Module 00: SOC Essential Concepts

  • Introduction to Computer Network Fundamentals
    • TCP/IP vs OSI Model
      • Understanding the layers and their functions
      • Comparison and practical applications
    • LAN vs WAN vs MAN
      • Definitions and differences
      • Use cases and examples
    • Network Topologies
      • Common topologies (e.g., Star, Mesh, Ring, Bus)
      • Advantages and disadvantages of each topology
    • Basic Network Devices and their Functions
      • Routers, Switches, Firewalls, etc.
    • Introduction to Network Protocols
      • Key protocols (e.g., HTTP, HTTPS, FTP, SMTP)
      • Their roles in network communication
    • Security Fundamentals
      • POP3 vs IMAP
      • Hashing Techniques
      • Symmetric vs Asymmetric Encryption
      • Digital Signatures
      • Public Key Infrastructure (PKI)

2. Week 3: Active Directory & Group Policies

Downloading and Installing Virtual Machines:

  • Windows 10
  • Introduction to Active Directory:
    • Creating an Organizational Unit (OU)
    • Creating Group Policy Objects (GPOs)
    • User Account Management
    • Connecting Windows 10 to AD
    • Setting Up Group Policies:
      • Sample Policies (e.g., Deny Access to Control Panel)
    • Setting Up a File Server
    • Granting Permissions to Users

3. Week 4: Security Operations

  • SIEM and SOC
  • IDS vs IPS
  • NIDS vs HIDS
  • Traffic Analysis vs Logs
  • Logs Forwarding and configuration

4. Week 5: Wazuh Project

  • Install and implement Wazuh in order to discover its functionalities with logs
    forwarding, sysmon integration, FIM, prevention capabilities…

5. Conclusion

The Training will conclude with a comprehensive understanding of SOC operations,
network architecture, Active Directory management, and incident response. Trainees
will be evaluated based on their performance in both practical and theoretical aspects,
culminating in their preparedness for this course.