IT Academy Impact

Free Self-Paced Courses (Palo Alto Networks)

Introduction to Cybersecurity

This course introduces the fundamentals of cybersecurity, including the concepts needed to recognize and potentially mitigate attacks against home networks and mission-critical infrastructure.

After you complete this training, you should be able to:

  • Describe the current cybersecurity landscape
  • Identify cybersecurity threats
  • Evaluate different malware types and cyberattack techniques
  • Describe the relationship between vulnerabilities and exploits
  • Identify how spamming and phishing attacks are performed
  • Describe Wi-Fi vulnerabilities, attacks, and advanced persistent threats
  • Explain perimeter-based Zero Trust security models
  • Identify capabilities of the Palo Alto Networks prevention-first architecture
Enroll now

Fundamentals of Cloud Security

This training introduces the viewer to the fundamentals of cloud security, including concepts they must understand to recognize threats and potentially defend data centers, public/private clouds, enterprise networks, and small office/home office (SOHO) networks from cloud-based attacks.

After you complete this training, you should be able to:

  • Describe cloud computing models, virtualization, hypervisors, public cloud service provider options, and private deployment options
  • Explain the development operations (DevOps) strategy that unites teams to discover and remediate issues, automate deployment, and reduce time to market
  • Describe the evolution of data centers through mixed traditional and cloud computing technologies
  • Detail how Secure Access Service Edge (SASE) solutions help organizations embrace the concepts of cloud and mobility
  • Describe how SaaS solutions provide data classification, sharing and permission visibility, and threat detection within the application
Enroll now

Fundamentals of Security Operations Center (SOC)

The Fundamentals of SOC (Security Operations Center) training is a high-level introduction to the general concepts of SOC and SecOps. It will introduce the Security Operations framework, people, processes, and technology aspects required to support the business, the visibility that is required to defend the business, and the interfaces needed with other organizations outside of the SOC.

The course consists of nine lessons and will take approximately 3 hrs to complete. This training is intended for learners who want to enter the field of cybersecurity - whether a student entering the workforce or an established professional transitioning from another field - and will help them demonstrate knowledge about SOC.

Enroll now

Fundamentals of Network Security

This training introduces someone with no prior knowledge to the fundamentals of network security including concepts they must understand to recognize and potentially defend home networks and mission-critical infrastructure.

After completing this training, you should be able to:

  • Describe basic operations of enterprise networks, common networking devices, routed and routing protocols, network types and topologies, and services such as DNS
  • Explain IP addressing, subnetting, and packet encapsulation based on the Open Systems Interconnection (OSI) model
  • Describe network security technologies such as packet filtering, stateful inspection, application firewalls, and IDS and IPS and web content filters
  • Explain how to explore endpoint and mobile device security using technology such as personal firewalls, host-based IPS, and management features
  • Describe how to properly secure enterprise networks through PAN-OS deployment templates and migration options and DNS, URL Filtering, Threat Prevention, and WildFire® subscription services
Enroll now