This course introduces the fundamental principles of cybersecurity required to protect modern enterprise networks and critical infrastructure. Students will explore the evolving nature of cyber threats, the "Cyber-Attack Lifecycle," and the defensive strategies used to mitigate them. The curriculum balances theoretical knowledge of networking and security models with practical introductions to Palo Alto Networks’ Next-Generation Firewalls (NGFW) and cloud security platforms.
The Modern Threat Landscape: Identify attacker profiles, motivations, and common attack vectors, including malware, phishing, and Advanced Persistent Threats (APTs).
Networking Fundamentals: Master the basics of the OSI and TCP/IP models, IP addressing, routing, and the role of various network devices.
Zero Trust Architecture: Understand the shift from perimeter-based security to a "never trust, always verify" model.
Next-Generation Security: Learn the core functions of App-ID, User-ID, and Content-ID in identifying and controlling network traffic.
Cloud & Endpoint Security: Explore the security challenges of SaaS applications and the importance of securing remote workforces and mobile devices.
Security Operations (SecOps): Introduction to the role of automation (SOAR), monitoring (SIEM), and incident response in a modern Security Operations Center.
Students and individuals looking to start a career in cybersecurity.
IT professionals transitioning into security-focused roles.
Non-technical business leaders who need a foundational understanding of cyber risk and defense.
Cyber Landscape: Modern computing trends and the impact of digital transformation.
Cyber-Threats: Deep dive into the Cyber-Attack Lifecycle and modern exploit techniques.
Cybersecurity Models: Comparing Perimeter Defense vs. Zero Trust.
Network Security Technologies: Firewalls, VPNs, and Intrusion Prevention Systems (IPS).
Cloud Security Fundamentals: Securing public, private, and hybrid cloud environments.
Endpoint & SASE: Protecting the network edge and remote users.
This course serves as the primary preparation for the Palo Alto Networks Certified Cybersecurity Entry-level Technician (PCCET) certification, which validates foundational knowledge across the entire Palo Alto Networks portfolio.
- -
This course provides a deep dive into the technical "plumbing" of secure networks. It moves beyond high-level threats to focus on how data moves across a network and how to build a defensive architecture to protect that data. Students will gain a functional understanding of network protocols, packet lifecycle, and the implementation of Zero Trust principles using Next-Generation Firewalls (NGFW) and SASE (Secure Access Service Edge).
Networking Foundations: Mastery of the OSI and TCP/IP models, including a deep dive into physical, logical (IP), and virtual addressing (Subnetting).
Packet Lifecycle: Trace the path of a packet as it traverses the network and understand how encapsulation and decapsulation work at each layer.
Defense-in-Depth Technologies: Comparative analysis of packet filtering, stateful inspection, and application-aware firewalls.
The "Core Three" Technologies: Introduction to Palo Alto Networks’ signature capabilities: App-ID™, User-ID™, and Content-ID™.
Network Segmentation: How to design and configure Security Zones (Inside, Outside, DMZ) to enforce "Least Privilege" access.
Securing the Perimeter & Edge: Understanding the role of VPNs (IPSec/SSL), IPS/IDS, and the transition to cloud-delivered security via Prisma SASE.
Aspiring Network Engineers: Those looking to build a technical career in network infrastructure.
Security Admins: Professionals responsible for the day-to-day configuration of firewalls and security policies.
IT Generalists: Help desk or systems administrators who need to troubleshoot connectivity and security issues.
The Connected Globe: Evolution of network connectivity and the Internet of Things (IoT).
Addressing & Routing: Detailed look at IPv4/IPv6, subnetting, and how routers make forwarding decisions.
The OSI Model & Encapsulation: Understanding layers 1 through 7 and how data is packaged for transport.
Network Security Principles: Moving from legacy "Port/Protocol" security to Identity-based security.
Introduction to Strata (NGFW): The architecture of the Next-Generation Firewall and initial configuration steps.
Cryptography & PKI: The role of SSL/TLS certificates in securing network traffic and inspecting encrypted data.
Cloud & SASE Fundamentals: Introduction to Prisma Access and securing the mobile workforce.
This course is specifically designed to prepare students for the Network Security Professional level of the Palo Alto Networks certification framework. It provides the technical baseline required before moving into specialist courses like NGFW Engineer or SASE Engineer.
- -
The Palo Alto Networks Cloud Security Fundamentals course shifts the focus from traditional hardware-based security to the virtualized, elastic world of cloud computing. It’s designed to explain how security must change when the "perimeter" is no longer a physical office but a collection of distributed services.
For 2026, this course is heavily centered on the Prisma ecosystem and the Shared Responsibility Model.
This course introduces the essential concepts of cloud computing and the unique security challenges presented by public, private, and hybrid cloud environments. Students will learn how to secure "the cloud itself" (infrastructure) as well as "what is in the cloud" (data and applications). The curriculum focuses on the convergence of networking and security through SASE (Secure Access Service Edge) and the automation of security in the CI/CD pipeline.
Cloud Computing Models: A deep dive into NIST service models (SaaS, PaaS, IaaS) and deployment models (Public, Private, Hybrid, Multi-cloud).
The Shared Responsibility Model: Understanding exactly what the Cloud Service Provider (e.g., AWS, Azure, GCP) is responsible for versus what the customer must secure.
Cloud Native Security: Introduction to Containers (Docker), Orchestration (Kubernetes), and Serverless computing, along with the specific risks associated with each.
The Prisma Suite: * Prisma Cloud: Learn about Cloud Native Security Platforms (CNSP) and how to maintain visibility, compliance, and governance.
Prisma Access: Understanding how SASE provides consistent security for remote users without backhauling traffic to a data center.
Virtualization Security: Exploring the role of hypervisors, virtual switches, and East-West traffic protection (traffic between servers within the cloud).
DevSecOps & Automation: How to "shift left" by integrating security earlier in the software development lifecycle.
Cloud Architects & Admins: Professionals responsible for migrating or managing assets in cloud environments.
DevOps Engineers: Individuals looking to integrate automated security checks into their deployment pipelines.
Cybersecurity Beginners: Those wanting to understand how modern "borderless" networks are defended.
Cloud Foundations: History of cloud computing, virtualization basics, and the evolution of the data center.
Cloud Security Challenges: Addressing the "visibility gap," misconfigurations, and the risks of shadow IT.
Securing Public Clouds: Implementation of security controls within AWS, Microsoft Azure, and Google Cloud Platform.
SASE & Prisma Access: Transitioning from legacy VPNs to a cloud-delivered security architecture.
Containers and Kubernetes: Practical introduction to Docker basics and securing containerized applications.
SaaS Security: Using Prisma SaaS (CASB) to protect data within applications like Office 365, Salesforce, and Slack.
This course is a core pillar for the PCCET (Certified Cybersecurity Entry-level Technician) and serves as the mandatory bridge for anyone pursuing the Prisma Cloud Professional or SASE Professional certifications.
Pro Tip: If you're building a training program, this is best taken after "Network Security Fundamentals," as cloud security heavily relies on understanding the networking concepts (like IP addressing and routing) covered in that course.
- -
This course provides a comprehensive introduction to the modern Security Operations Center (SOC). It focuses on the people, processes, and technologies required to maintain a proactive defense. Students will learn how to move beyond manual alert monitoring to an automated, intelligence-driven approach using Palo Alto Networks’ Cortex platform. The curriculum emphasizes the "Continuous Improvement" loop—collecting high-fidelity data to identify and stop threats before they cause damage.
The Modern SOC Framework: Understand the roles and responsibilities within a SOC, from Tier 1 Analysts to Threat Hunters and SOC Managers.
The Incident Response Lifecycle: Master the NIST-aligned phases of IR: Preparation, Detection & Analysis, Containment, Eradication, and Recovery.
Cortex XDR (Extended Detection & Response): Learn how "log stitching" and causality chains allow analysts to see the full story of an attack across network, endpoint, and cloud data.
SOAR & Automation: Introduction to Cortex XSOAR—how to use automated "playbooks" to handle repetitive tasks (like phishing enrichment) so analysts can focus on complex threats.
Precision AI & Machine Learning: Explore how AI is used to identify behavioral anomalies and "low-and-slow" attacks that traditional signature-based tools miss.
Threat Intelligence: Learn how to use Unit 42 intelligence and AutoFocus to gain context on who is attacking you and what their motives are.
Aspiring SOC Analysts: Individuals looking to land their first job in a security operations center.
Incident Responders: Professionals who want to learn how to use automation to speed up threat containment.
IT Managers: Leaders who need to understand how to structure a modern, AI-enabled security team.
SecOps Landscape: Evolution of the SOC and the move from "Legacy SIEM" to "Autonomous SOC."
SOC Infrastructure: Tools of the trade—SIEM, EDR, XDR, and SOAR explained.
Introduction to Cortex XDR: Deploying agents and visualizing the "Causality Card" during an investigation.
Automation with XSOAR: How playbooks work and the role of the "War Room" in collaborative incident response.
Threat Hunting & Analytics: Proactively searching for hidden indicators of compromise (IOCs) within the network.
Data Lake & XSIAM: How to centralize massive amounts of data for AI-driven analysis and long-term compliance.
This course is the final recommended module for the PCCET (Certified Cybersecurity Entry-level Technician) and is the direct prerequisite for the Security Operations Generalist and Cortex XDR/XSOAR Professional certifications.
- -
Dates/times for this 3-part course:
Feb. 24, 6:00 pm-9:00 pm
Feb. 26, 6:00 pm-9:00 pm
Feb. 28, 9:00 am-1:00 pm
Become the Scrum Master who can run the team and operate inside a scaled enterprise.
Master Large-Scale Coordination
Practical AI Integration
High-Impact Facilitation Skills
Mission-Focused Leadership
Continuous Flow & DevOps Mindset
Time: 8am-2pm Pacific Time
Description:
This course provides a comprehensive introduction to project management using the latest best practices from PMI’s PMBOK® Guide. Students will learn the full project life cycle, from initiation to closing, along with key concepts like scheduling, budgeting, stakeholder communication, risk management, and procurement. The course includes hands-on activities, project templates, and soft skills training to simulate real-world project scenarios.
Career Pathways:
Project Coordinator
Junior Project Manager
Business Analyst
IT Operations Assistant
Ideal For:
Aspiring project managers, team leads, IT professionals transitioning to project roles, and individuals looking to strengthen leadership and organizational skills.
- -
The Cisco Certified Network Associate (CCNA) course is the industry-standard foundation for a career in networking. This program provides comprehensive, hands-on training covering the fundamental knowledge required to install, operate, configure, and verify basic IPv4 and IPv6 networks. It is the essential first step for anyone looking to specialize in network engineering or cybersecurity.
What You Will Master
This course is designed to transition foundational IT knowledge into job-ready networking skills. Key areas of focus include:
Network Fundamentals: Understanding the components, architecture, and deployment of enterprise networks.
IP Connectivity (Routing): Configuring and verifying basic routing with single-area OSPFv2, managing VLANs, and implementing static routing.
Network Access (Switching): Configuring and verifying initial switch configuration, implementing VLANs, and using essential protocols like STP (Spanning Tree Protocol).
IP Services: Implementing and verifying critical network services like DHCP, DNS, and NAT (Network Address Translation).
Security Fundamentals: Implementing basic security concepts, including access control lists (ACLs), port security, and wireless security protocols (WPA2/WPA3).
Automation and Programmability: Introduction to network automation concepts, REST APIs, and configuration management tools.
This program is ideal for:
Veterans and Military Spouses seeking high-demand career transition skills.
Aspiring Network Engineers and Network Administrators.
Cybersecurity Analysts who need a strong understanding of network defense infrastructure.
Earning the CCNA certification validates your ability to manage and troubleshoot modern networks. This certification is globally recognized and highly valued, directly opening doors to roles such as: Network Technician, Junior Network Administrator, and Help Desk Specialist.
- -
No results match your search. Try removing a few filters.