Description
Price: 15.00 USD | Size: 7.80 GB | Duration : 9.50 Hours | 75 Video Lessons
BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | 



4.9
PCCET Certification Training
So much technical knowledge goes into keeping devices and networks safe and secure that mastering it can take a lifetime. But you have to start somewhere. And it was with that in mind that Palo Alto created the PCCET certification.
The PCCET is comprehensive and thorough, but it’s also intended for people new to studying cybersecurity. No matter the reason why, if you need to understand how devices, networks, and clouds are kept digitally secure, preparing for the PCCET is a great first step.
For anyone who manages their cybersecurity best practices training, this Palo Alto training can be used for PCCET exam prep, onboarding new security technicians, individual or team training plans, or as a Palo Alto reference resource.
PCCET: What You Need to Know
This PCCET training has videos that cover topics such as:
- Recognizing the fundamentals of cybersecurity
- Understanding what makes interconnected networks possible, like hubs, and switches, and protocols
- Navigating various cloud technologies and their implementations
- Describing essential elements of effective cybersecurity operations
Who Should Take PCCET Training?
This PCCET training is considered associate-level Palo Alto training, which means it was designed for security technicians. This cybersecurity best practices skills course is valuable for new IT professionals with at least a year of experience with cybersecurity tools and experienced security technicians looking to validate their Palo Alto skills.
New or aspiring security technicians. If you’re trying to start a career as a cybersecurity technician, you ought to be planning on certifications and training. If you think you’ll work with Palo Alto devices and technology in your career, the PCCET is the right place to start. This PCCET training is how you learn every bullet item on the exam and practice the cybersecurity skills you need for your job.
Experienced security technicians. If you’ve been working as a security technician for a few years already, most of the PCCET is going to be easy. It’s a thorough certification, but it’s all rudimentary. But if you want to advance your career and haven’t gotten any certifications yet, the PCCET cert is where you should start. It provides a rock-solid foundation to build a career from and will train you in studying for and passing industry certifications.
Network Security Fundamentals
1. Intro to Network Security Fundamentals
1 min
2. Types of Firewalls
9 mins
3. IDS and IPS
5 mins
4. VPNs
8 mins
5. Data Loss Prevention
5 mins
6. Unified Threat Management
5 mins
7. Endpoint Security
6 mins
8. Identity, Access, and Configuration Mgmt
10 mins
Network Model Fundamentals
1. Intro to Network Models
1 min
2. OSI Reference Model
10 mins
3. The TCP/IP Stack
16 mins
4. Application Layer Services
7 mins
5. Transport Layer Protocols
6 mins
6. Network (L3) Layer Protocols
3 mins
7. Layer 2 Data Link
4 mins
8. Physical Layer (L1)
7 mins
9. Encapsulation and Decapsulation
4 mins
IP Addressing
1. Intro to IP Addressing
1 min
2. IPv4 and IPv6 Overview
7 mins
3. Binary, Decimal, and Hex
7 mins
4. IPv4
9 mins
5. IPv6
6 mins
6. DHCP
7 mins
7. ARP
5 mins
8. Subnetting Overview
9 mins
9. Subnetting Example
5 mins
Palo Alto Networking Fundamentals
1. Intro to Palo Alto Networking Fundamentals
1 min
2. Network Devices
9 mins
3. Routed vs Routing Protocols
13 mins
4. Routing Protocol Example
9 mins
5. Network Types and Topologies
12 mins
6. Domain Name System
7 mins
7. Internet of Things IoT
6 mins
Palo Alto Next-gen Firewall Features
1. Intro to Next-gen Firewall Features
1 min
2. Next-gen Firewall Overview
11 mins
3. SSL Decryption
7 mins
4. User Awareness
9 mins
5. Application Awareness
9 mins
6. URL Filtering
6 mins
7. Threat Prevention
7 mins
8. WildFire
5 mins
The Cyberattack Lifecycle
1. Intro to the Cyberattack Lifecycle
1 min
2. Cyberattack Examples
5 mins
3. Attacker Profile and Motivations
3 mins
4. Overview of the Cyberattack Lifecycle
14 mins
5. Advanced Persistent Threats
3 mins
6. Preventing a Successful Attack
16 mins
7. Preventing Port Scanning
6 mins
Vulnerabilities, Exploits, and Risk
1. Intro to Vulnerabilities, Exploits, and Risk
1 min
2. Overview of Vulnerabilities, Exploits, and Risk
11 mins
3. Social Engineering
7 mins
4. Circumventing Port-Based Firewalls
12 mins
5. Types of Malware
7 mins
6. Spamming and Phishing
5 mins
7. DoS, DDoS, and Botnets
9 mins
8. Wi-Fi Attacks
9 mins
Cloud Computing and Security
1. Intro to Cloud Computing and Security
1 min
2. Cloud Computing and Security Overview
9 mins
3. SaaS Application Risks
17 mins
4. Cybersecurity Laws and Regulations
5 mins
5. User Identification
10 mins
6. App Identification
10 mins
Strategies for Securing Networks
1. Intro to Strategies for Securing Networks
1 min
2. Overview of Strategies for Securing Networks
14 mins
3. Perimeter-based Network Security
8 mins
4. Zero Trust and Least Privilege
13 mins
5. Secure Platform Features
10 mins
6. Palo Alto Networks Offerings
15 mins
Palo Alto SecOps and DevSecOps
Discover more from Expert Training
Subscribe to get the latest posts sent to your email.
Reviews
There are no reviews yet.