Learn from Experts. Train Like a Pro.
Our trainers bring over two decades of real-world experience from leading global
corporations across a wide range of industries. You'll train in hands-on labs designed to
mirror real corporate environments, where you’ll tackle practical challenges and scenarios
professionals face every day.
Our methodically designed training materials are enriched with real-life case studies to make
sure your learning is not only deep but immediately applicable.
Who Should Enroll in Palo Alto Networks Firewall Training at Labrys Solution?
Whether you want to advance your cybersecurity career or upskill your team, our Palo
Alto Networks Next-Generation Firewall training is designed for:
IT and Network Security Professionals
Enhance your expertise in network protection, threat prevention, and advanced firewall management. Ideal for those working in cybersecurity or IT roles aiming to deepen their knowledge of Palo Alto Networks solutions.
System Administrators
Build the skills required to configure, manage, and optimize enterprise firewalls. Perfect for admins responsible for securing and maintaining IT infrastructure.
Aspiring Cybersecurity Experts
Students, entry-level professionals, and career changers can gain industry-recognized certification to boost their profile and enter the growing field of cybersecurity with confidence.
Managed Service Providers (MSPs)
Empower your team to deliver top-tier firewall management and security services by mastering Palo Alto Networks technologies used across client environments.
Organizations Using or Adopting Palo Alto Networks
Equip your IT teams with specialized training to fully leverage Palo Alto Networks products, ensuring secure deployment, seamless integration, and long-term ROI.
Compliance & Risk Management Teams
Understand how to align firewall configurations and security protocols with industry compliance standards and regulatory requirements.
Veterans and Career Transitioners
Whether you're exploring a new career path or building on prior technical experience, this training helps veterans transition into high-demand cybersecurity roles.
Placement Services
We provide comprehensive placement support to all candidates who successfully complete
the training and earn their certification.
Protect the Future of the Digital World—Become a Palo Alto Networks Certified Next-
Generation Firewall Engineer
Master the skills that matter in today's cybersecurity landscape. Gain the expertise to
configure, manage, and secure next-generation firewalls and take the lead in defending
networks against evolving threats.
Palo Alto Networks Certified Next-Generation Firewall Engineer
Advance your cybersecurity expertise with this in-depth certification path, designed to equip
you with the skills to deploy, configure, and manage Palo Alto Networks Next-Generation
Firewalls. Learn core concepts in network security, device configuration, system integration,
and automation to effectively protect modern digital infrastructures.
Pan-os
- Course Curriculum
- These courses offer valuable understandings into firewall deployment and the key technologies that are made into PANOS natively.
- Connecting to a Firewall – 20 m
- Connecting to Firewall – Assessment
- Managing Firewall Configurations 15 m
- Managing Firewall Configurations – Assessment
- Local Firewall Admin Accounts 15 m
- Local Firewall Admin Accounts – Assessment
- Non-Local Firewall Admin Accounts – 15 m
- Non-Local Firewall Admin Accounts – Assessment
- Security Zones and Network Interfaces – 30 m
- Security Zones and Network Interfaces – Assessment
- Security Policy Rules – 20 m
- Security Policy Rules – Assessment
- Threat and Traffic Logs – 15 m
- Threat and Traffic Logs – Assessment
- Log Forwarding – 10 m
- Log Forwarding – Assessment
- Purpose and Value of Decryption – 35 m
- Purpose and Value of Decryption – Assessment
- Decrypting Traffic and Network Design – 20 m
- Decrypting Traffic and Network Design – Assessment
- Decryption Configuration – 20 m
- Decryption Configuration – Assessment
- Certificates and Best Practices –15 m
- Certificates and Best Practices – Assessment
- Strata Logging Service Features – 45 m
- Strata Logging Service Features – Assessment
- Site-to-Site VPNs – 20 m
- Site-to-Site VPNs – Assessments
- Firewall High Availability – 30 m
- Firewall High Availability – Assessment
- Quantum Ready Virtual Private Networks – 40 m
- Quantum Ready Virtual Private Networks: Assessment
- Global Protect Configuration – 30 m
- Global Protect Configuration – Assessment
- Global Protect App Settings and Monitoring – 40 m
- GlobalProtect App Settings and Monitoring – Assessment
Identity
These courses offer valued insights into User-ID and Cloud Identity Engine. They show how
to link user identities to network activities and assist the application of security policies based
on customer roles across both on-premises and cloud environments.
- Identifying Users Using User-ID – 15 m
- Identifying Users Using User-ID – Assessment
- User-ID Components and Operation – 15 m
- User-ID Components and Operation – Assessment
- Implementing User-ID in Security Policy – 30 m
- Implementing User-ID in Security Policy – Assessment
- User-ID Data Redistribution and Dynamic User Groups – 15 m
- User-ID Data Redistribution and Dynamic User Groups – Assessment
- Configure Multi-Factor Authentication – 15 m
- Configure Multi-Factor Authentication – Assessment
- Credential Phishing and User-ID – 10 m
- Credential Phishing and User-ID – Assessment
- Configure Phishing Protection – 10 m
- Configure Phishing Protection – Assessment
- Identity Concepts – 30 m
- Identity Concepts – Assessment
- Cloud Identity Engine Setup and Connection – 45 m
- Cloud Identity Engine Setup and Connection – Assessment
- User Authentication Configuration – 40 m
- User Authentication Configuration – Assessment
- Advanced Identity Concepts – 45 m
- Advanced Identity Concepts – Assessment
- Identity Data Redist
ribution – 25 m
- Identity Data Redistribution – Assessment
- User Context – 25 m
- User Context – Assessment
- System for Cross-Domain Identity Management – 15 m
- System for Cross-Domain Identity Management – Assessment
Software Firewalls
These courses offer valuable insights into the VM-Series virtual next-generation firewall features that protect applications and data deployed across a wide range of public cloud and virtualized environments.
- Overview of Containerized Technology and Kubernetes – 45 m
- Overview of Containerized Technology and Kubernetes – Assessment
- CN-Series Firewalls Overview – 30 m
- CN-Series Firewalls Overview – Assessment
- CN-Series Architecture – 30 m
- CN-Series Architecture – Assessment
- CN-Series Firewall Deployment – 40 m
- CN-Series Firewall Deployment – Assessment
- Cloud Network Security – 20 m
- Cloud Network Security – Assessment
- VM-Series Requirements and Licensing – 30 m
- VM-Series Requirements and Licensing – Assessment
- Traffic Flow Designs and Features for VM-Series – 30 m
- Traffic Flow Designs and Features for VM-Series – Assessment
- VM-Series Firewall on AWS – 40 m
- VM-Series Firewall on AWS – Assessment
- VM-Series Deployment on AWS and Network Integration – 25 m
- VM-Series Deployment on AWS and Network Integration – Assessment
- AWS Gateway Load Balancer Integration – 25 m
- AWS Gateway Load Balancer Integration – Assessment
- VM-Series Firewall on Azure – 20 m