Palo Alto Networks Cybersecurity Gateway II (Coursera)

Palo Alto Networks Cybersecurity Gateway II (Coursera)
Gateway II provides the student with a full understanding of the fundamental tenants of networking and covers the general concepts involved in maintaining a secure network computing environment. Upon successful completion of this course, students will be able to fully examine, describe general networking fundamentals and implement basic networking configuration techniques.

Upon completion of this course, students will be able to:

• Examine cybersecurity landscape environments, attack threat vectors, exposure, vulnerabilities, and risk factors.

• Accurately explain common use of cloud, virtualization, storage, backup, and recovery procedures.

• Apply the knowledge and skills necessary to plan, design, implement, troubleshoot, and maintain network infrastructure environments.


Syllabus


WEEK 1

GATEWAY II: MODULE 1 - COURSE INFORMATION

** Gateway II builds on top of the networking fundamentals content that was discovered in Gateway I.** Begin your Gateway II experience here. Carefully evaluate the Course Information and Resources content area and identify the tools and processes you will use in this course.

Gateway II: Module 2 - Cybersecurity Landscape and Threats

The term Cybersecurity Landscape is complex and difficult to define as it is ever changing. In this module security professionals will focus on identifying best practices for assessing and mitigating network vulnerabilities and their associated threats.


WEEK 2

Gateway II: Module 3 - Cloud, Virtualization and Storage Security

Terms like 'redundancy', 'scalability', 'availability' and 'trust' are commonly used when describing either Cloud, Virtualization or Storage environments. Module 3 helps students apply those terms in specific relationships with cloud components, cloud connectivity, virtual services and storage management.


WEEK 3

Gateway II: Module 4 - Networking Concepts and Principles

Networking and Security best practices often go hand in hand. You always begin by inventorying your resources and assets and identifying their vulnerabilities. Then you can apply appropriate measures to limit the threats that could exploit those vulnerabilities. In this module students will analyze different network appliances and define the troubleshooting measures that can be used to identify and remedy risks and vulnerabilities.