Palo Alto Networks VM-Series Advanced Threat Detection

In this Project, you will:

Review Google Cloud Packet Mirroring setup for VM-Series

Monitor the malicious activities at the VM-Series

Perform SQL Injection attacks at the juice-shop website

Exploit a Jenkins instance from a Linux instance

1 hour 30 minutes
Beginner
No download needed
Shareable certificate
English
Desktop only

This lab illustrates a VM-Series in IDS (Intrusion Detection System) mode using the Google Cloud Packet Mirroring solution.

Skills you will develop

  • Network Analysis

  • Network Security

  • System Security

How Projects work

Learn a new tool or skill in an interactive, hands-on environment

You'll gain access to software and tools in a cloud workspace - no download required

Offered by

Placeholder

Google Cloud

Frequently Asked Questions

In Projects, you'll complete an activity or scenario by following a set of instructions in an interactive hands-on environment. Projects are completed in a real cloud environment and within real instances of various products as opposed to a simulation or demo environment.

By purchasing a Project, you'll get everything you need to complete the Project including temporary access to any product required to complete the Project.

Even though Projects are technically available on mobile devices, we highly recommend that you complete Projects on a laptop or desktop only.

Yes, you can download and keep any of your created files from the Project. To do so, please make sure you save any files and work to your device before exiting the product environment.

Projects are not eligible for refunds. See our full refund policy.

Financial aid is not available for Projects.

In rare instances, Projects may be taken down for maintenance or other reasons. If you are experiencing any issues, please contact us.

Auditing is not available for Projects.

At the top of the page, you can view the experience level recommended for this Project.

Yes, everything you need to complete your Project will be available in your browser.