Professional Documents
Culture Documents
Curriculum
The Palo Alto Networks Cybersecurity Academy program offers comprehensive courses
and technology to address the educational needs of academic learning institutions globally,
including universities, colleges, and high schools.
Academy curriculum is aligned with the U.S. National Initiative for Cybersecurity Education
(NICE) framework and cybersecurity work roles.
The academic curriculum delivered by our Academy partner institutions helps provide the
knowledge and expertise that prepare their students to be successful as they pursue higher
education and/or cyber careers. Our trusted certifications validate their knowledge of Palo
Alto Networks technology, as well as their ability to prevent cyberattacks and safely enable
applications.
Fundamentals Courses • Describe how bots and botnets are used to attack enterprise
networks.
Cybersecurity Foundation • Explore Zero Trust design principles, architecture,
capabilities, and implementation.
Students will learn fundamental principles associated with
the current cybersecurity landscape, and concepts required • Review perimeter network security strategies, policies,
to recognize and potentially mitigate attacks against models, and trust boundaries.
enterprise networks and mission-critical infrastructure. • Setup and configure inside, outside, and DMZ security
Students will also learn how to set up and configure interfaces, zones on a NGFW.
security zones, authentication, and policies on a Next-
• Create and test an authentication policy on a Next-
Generation firewall. Ideal for entry-level candidates in the
Generation firewall.
cybersecurity workforce, and anyone who participates in
internet activities. • Review capabilities of the Security Operating Platform and
components.
NIST/NICE Alignment and Work Roles • Explore how to secure the enterprise with NGFW and
• Technical Support Specialist (OM-STS-001) Cortex® XDR endpoint protection.
• Work roles: Technical Support Associate; Help Desk Associate • Discover how to secure the cloud with Prisma® Access,
SaaS, and Cloud.
Course Objectives • Apply two-factor authentication on the Next-Generation
• Discover modern computing trends and application threat firewall (NGFW).
vectors. • Configure the NGFW to allow only trusted applications.
• Configure a network interface and test for connectivity.
• Identify cloud computing and software-as-a-service
(SaaS) application challenges.
• Duration: 2 credits - 30 contact hours • Describe the benefits of the Next-Generation firewall single-
pass architecture.
• Format: Instructor-Led or Self-Paced
• Identify the NGFW App-ID™, User-ID™, Content-ID™ and
Prerequisites deployment options.
No specific course prerequisites, but students should have • Explore the five steps required to implement an NGFW Zero
basic internet and application software skills. Trust environment.
• Configure the NGFW to monitor, forward, and backup
Network Security Fundamentals system logs (Syslog).
Students will gain an understanding of the fundamental Module 1: The Connected Globe
tenets of network security, and review the general concepts
Module 2: IP Addressing
involved in maintaining a secure network computing
environment. Upon successful completion of this course, Module 3: Packet Encapsulation
students will be able to describe general network security Module 4: Network and Endpoint Security
concepts and implement basic network security Module 5: Network Security Principles
configuration techniques. Ideal for entry-level candidates in
the cybersecurity work- force, and anyone who participates Scope
in internet activities.
• Level: Introductory
NIST/NICE Alignment and Work Roles • Duration: 3 credits - 45 contact hours
• Technical Support Specialist (OM-STS-001) • Format: Instructor-Led or Self-Paced
• Network Operations Specialist (OM-NET-001)
Prerequisites
• Work roles: Technical Support Associate; Help Desk Associate;
Successful completion of the Cybersecurity Foundation course
Network Operations Specialist
or comparable experience. Students are expected to have
Course Objectives basic internet and application software skills.
• Evaluate challenges associated with cloud-based identity • Identify and summarize the key elements of Development, Security,
and privileged access management. and Operations (DevSecOps).
• Discover the Three Pillars of Security Automation: People, Processes,
and Technology.
Module 1: Cloud Security Overview
• Examine how security orchestration, automation, and response (SOAR)
Module 2: Monitoring Vulnerabilities methods use automation to improve end-to-end business operations
Module 3: Monitoring Behavior cyber posture.
Module 4: Maintaining Compliance • Identify and review Security Orchestration and Response Use Cases.
Module 5: Incident Management • Explain the benefits of Security Operations Configuration and
Implementation.
Scope
• Explore Phishing Playbooks that execute repeatable tasks to identify
• Level: Intermediate false positives.
• Duration: 2 credits - 30 contact hours • Investigate Endpoint Malware Infection and Failed User Login
• Format: Instructor-Led or Self-Paced Playbooks.
• Examine SSL Certificate, Vulnerability, and Endpoint Diagnostics
Prerequisites Playbooks.
Successful completion of the Cloud Security Fundamentals
• Investigate how Cortex XSOAR automates security response actions.
course or comparable experience. Students are expected to
have basic internet and application software skills. • Review how Cortex XSOAR automates responses to ransomware and
phishing attacks.
• Identify how to streamline the aggregation and sharing of threat
intelligence.
• Examine the top ransomware variant threats across the cybersecurity
landscape.
• For each stage of the Cyber Attack Life Cycle describe how threat
intelligence and adversarial playbooks are utilized to deploy automated
controls and mitigate attacks.