Topic 1: Describe the business processes of supply-chain management/ Distinguish between Web 2.0 and 3.0 applications and services
Topic 2: Describe the tactics of the MITRE ATT&CK framework/ Recognize applications used to circumvent port-based firewalls
Topic 3: Identify the different attacker profiles and motivations/ Differentiate between the functional aspects of bots and botnets
Topic 4: Describe the transition from a trusted network to an untrusted network/ Identify the capabilities of an effective Security Operating Platform
Topic 5: Differentiate between hubs, switches, and routers/ Identify the known security risks and solutions associated with IoT
Topic 6: Describe the application of NGFW deployment options (i.e., PA-,VM- and CN-Series)/ Describe the integration of NGFWs with the cloud, networks, and endpoints
Topic 7: Illustrate the continuous integration/continuous delivery pipeline/ Describe how data centers can transform their operations incrementally
Topic 8: Describe the main elements included in the development of SOC business objectives/ Describe the vulnerabilities associated with data being stored in the SaaS environment
Topic 9: Describe the purpose of security orchestration, automation, and response (SOAR)/ Describe how to collect security data for analysis
Topic 10: Describe the use of analysis tools within a security operations environment/ Describe how Cortex Data Lake improves security operations visibility
Topic 11: Identify the four pillars of Prisma Cloud application security/ Describe the components of SOC business management and operations
Topic 12: Describe the cost of maintaining a physical data center/ Differentiate between east-west and north-south traffic patterns
Topic 13: Describe how serverless computing is used/ Explain governance and compliance related to deployment of SaaS applications
Topic 14: Describe the purpose of virtualization in cloud computing/ Explain the purpose of containers in application deployment
Topic 15:
Topic 16: Describe Palo Alto Networks firewall subscription services/ Describe the three components of Best Practice Assessment (BPA)
Submit Cancel