{"id":173258,"date":"2021-09-02T13:27:54","date_gmt":"2021-09-02T13:27:54","guid":{"rendered":"https:\/\/abadnet.com.sa\/online\/?p=173258"},"modified":"2021-09-02T13:27:54","modified_gmt":"2021-09-02T13:27:54","slug":"%d9%83%d9%8a%d9%81-%d8%aa%d8%aa%d8%ae%d8%b7%d9%89-%d8%a7%d9%85%d8%aa%d8%ad%d8%a7%d9%86-%d8%a8%d8%a7%d9%84%d9%88-%d8%a3%d9%84%d8%aa%d9%88%d8%9f-%d8%af%d9%84%d9%8a%d9%84-%d9%83%d8%a7%d9%85%d9%84-%d8%ae","status":"publish","type":"post","link":"https:\/\/abadnet.com.sa\/online\/%d9%83%d9%8a%d9%81-%d8%aa%d8%aa%d8%ae%d8%b7%d9%89-%d8%a7%d9%85%d8%aa%d8%ad%d8%a7%d9%86-%d8%a8%d8%a7%d9%84%d9%88-%d8%a3%d9%84%d8%aa%d9%88%d8%9f-%d8%af%d9%84%d9%8a%d9%84-%d9%83%d8%a7%d9%85%d9%84-%d8%ae\/","title":{"rendered":"\u0643\u064a\u0641 \u062a\u062a\u062e\u0637\u0649 \u0627\u0645\u062a\u062d\u0627\u0646 \u0628\u0627\u0644\u0648 \u0623\u0644\u062a\u0648\u061f (\u062f\u0644\u064a\u0644 \u0643\u0627\u0645\u0644 \u062e\u0637\u0648\u0629 \u0628\u062e\u0637\u0648\u0629)"},"content":{"rendered":"<h2>\u0623\u0647\u0645\u064a\u0629 \u0623\u0645\u062a\u062d\u0627\u0646 \u0628\u0627\u0644\u0648 \u0623\u0644\u062a\u0648.<\/h2>\n<p>\u064a\u0624\u0647\u0644\u0643 \u0627\u0645\u062a\u062d\u0627\u0646 \u0628\u0627\u0644\u0648 \u0623\u0644\u062a\u0648 \u0644\u0623\u0645\u0646 \u0627\u0644\u0634\u0628\u0643\u0627\u062a \u0627\u0644\u062d\u0635\u0648\u0644 \u0639\u0644\u0649 \u0634\u0647\u0627\u062f\u0629 \u0644\u0644\u0639\u0645\u0644 \u0643\u0645\u0633\u0624\u0648\u0644 \u0644\u0623\u0645\u0646 \u0627\u0644\u0634\u0628\u0643\u0627\u062a\u060c \u0643\u0645\u0627 \u0623\u0646\u0647\u0627 \u062a\u0641\u064a\u062f \u0627\u0644\u062d\u0627\u0635\u0644 \u0639\u0644\u064a\u0647\u0627 \u0641\u064a \u0645\u0639\u0631\u0641\u0629 \u0643\u064a\u0641\u064a\u0629 \u062a\u0646\u0641\u064a\u0630 \u0627\u0644\u0623\u0639\u0645\u0627\u0644 \u0639\u0644\u0649 \u0627\u0644\u0634\u0628\u0643\u0627\u062a \u0648\u0635\u064a\u0627\u0646\u062a\u0647\u0627 \u0648\u0623\u064a\u0636\u0627 \u0627\u0644\u0639\u0645\u0644 \u0639\u0644\u0649 \u0634\u0628\u0643\u0629 (Palo Alto Networks Next Generation Firewall PAN-OS 10.0)<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-174041 size-full\" src=\"https:\/\/abadnet.com.sa\/online\/wp-content\/uploads\/2021\/09\/dd.jpg\" alt=\"\" width=\"925\" height=\"495\" srcset=\"https:\/\/abadnet.com.sa\/online\/wp-content\/uploads\/2021\/09\/dd.jpg 925w, https:\/\/abadnet.com.sa\/online\/wp-content\/uploads\/2021\/09\/dd-300x161.jpg 300w, https:\/\/abadnet.com.sa\/online\/wp-content\/uploads\/2021\/09\/dd-768x411.jpg 768w, https:\/\/abadnet.com.sa\/online\/wp-content\/uploads\/2021\/09\/dd-400x214.jpg 400w, https:\/\/abadnet.com.sa\/online\/wp-content\/uploads\/2021\/09\/dd-600x321.jpg 600w\" sizes=\"(max-width: 925px) 100vw, 925px\" \/><\/p>\n<h2 style=\"text-align: center;\"><a href=\"https:\/\/abadnet.com.sa\/palo_alto_pcnsa\">\u0623\u0636\u063a\u0637 \u0647\u0646\u0627 \u0644\u0644\u0625\u0634\u062a\u0631\u0627\u0643 \u0641\u064a \u062f\u0648\u0631\u0629 \u0628\u0627\u0644\u0648 \u0623\u0644\u062a\u0648<\/a><\/h2>\n<h2><strong>\u0645\u0627 \u0647\u064a \u0627\u0644\u0645\u0647\u0627\u0631\u0627\u062a \u0627\u0644\u0645\u0637\u0644\u0648\u0628\u0629 \u0644\u062a\u062e\u0637\u064a \u0627\u0645\u062a\u062d\u0627\u0646 \u0628\u0627\u0644\u0648 \u0623\u0644\u062a\u0648\u061f<\/strong><\/h2>\n<ul>\n<li>\u0623\u0646 \u064a\u0643\u0648\u0646 \u0644\u062f\u064a\u0643 \u062e\u0628\u0631\u0629 \u0645\u0646 \u0633\u0646\u062a\u064a\u0646 \u0625\u0644\u0649 \u062b\u0644\u0627\u062b \u0633\u0646\u0648\u0627\u062a \u0641\u064a \u0645\u062c\u0627\u0644 \u0627\u0644\u0639\u0645\u0644 \u0628\u0635\u0646\u0627\u0639\u0629 \u0648\u0623\u0645\u0646 \u0627\u0644\u0634\u0628\u0643\u0627\u062a.<\/li>\n<li>\u0623\u0646 \u062a\u0643\u0648\u0646 \u0644\u062f\u064a\u0643 \u062e\u0628\u0631\u0629 \u0644\u0627 \u062a\u0642\u0644 \u0639\u0646 \u0633\u062a\u0629 \u0623\u0634\u0647\u0631 \u0645\u0646 \u0627\u0644\u0639\u0645\u0644 \u0639\u0644\u0649 \u0645\u0646\u062a\u062c\u0627\u062a \u0634\u0631\u0643\u0629 \u0628\u0627\u0644\u0648 \u0623\u0644\u062a\u0648 \u0644\u0644\u0634\u0628\u0643\u0627\u062a.<\/li>\n<li>\u062e\u0628\u0631\u0629 \u0644\u0627 \u062a\u0642\u0644 \u0623\u064a\u0636\u064b\u0627 \u0639\u0646 \u0633\u062a\u0629 \u0623\u0634\u0647\u0631 \u0641\u064a \u0646\u0634\u0631 \u0648\u062a\u0643\u0648\u064a\u0646 (Palo Alto Networks NGFW)<\/li>\n<li>\u0641\u0647\u0645 \u0623\u0633\u0627\u0633\u064a\u0627\u062a \u0627\u0644\u0623\u0645\u0627\u0646 \u0648\u0627\u0644\u0634\u0628\u0643\u0627\u062a \u0648\u0627\u0644\u062a\u064a \u064a\u062a\u0645 \u0627\u0633\u062a\u062e\u062f\u0627\u0645\u0647\u0627 \u0628\u0628\u0631\u0646\u0627\u0645\u062c PAN-OS.<\/li>\n<\/ul>\n<p>\u0648\u062a\u0648\u0641\u0631 \u0634\u0631\u0643\u0629 \u0628\u0627\u0644\u0648 \u0623\u0644\u062a\u0648 \u062b\u0644\u0627\u062b \u0623\u0646\u0648\u0627\u0639 \u0645\u0646 \u0627\u0644\u0634\u0647\u0627\u062f\u0627\u062a \u062e\u0627\u0635\u0629 \u0628\u062b\u0644\u0627\u062b \u062f\u0648\u0631\u0627\u062a \u0645\u062e\u062a\u0644\u0641\u0629. \u0648\u0644\u0644\u062d\u0635\u0648\u0644 \u0639\u0644\u0649 \u0623\u064a \u0634\u0647\u0627\u062f\u0629 \u0645\u0646\u0647\u0645 \u064a\u062c\u0628 \u0639\u0644\u064a\u0643 \u062a\u062e\u0637\u064a \u0627\u0644\u0627\u0645\u062a\u062d\u0627\u0646 \u0627\u0644\u062e\u0627\u0635 \u0628\u0647\u0645.<\/p>\n<p>\u0648\u0647\u0630\u0647 \u0627\u0644\u0634\u0647\u0627\u062f\u0627\u062a \u0647\u064a:<\/p>\n<ul>\n<li>\n<h3><strong>\u0634\u0647\u0627\u062f\u0629 <\/strong><strong>(PCCSA-Palo Alto Networks Certified Cybersecurity Associate)<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p>\u0648\u0647\u0630\u0647 \u0627\u0644\u0634\u0647\u0627\u062f\u0629 \u062a\u0639\u062a\u0628\u0631 \u0645\u0642\u062f\u0645\u0629 \u0641\u064a \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \u0648\u062a\u0648\u0641\u0631 \u0644\u0643 \u0627\u0644\u0645\u0639\u0631\u0641\u0629 \u0627\u0644\u0645\u0637\u0644\u0648\u0628\u0629 \u0644\u062a\u0634\u063a\u064a\u0644 \u0648\u0638\u0627\u0626\u0641 \u0623\u0645\u0627\u0646 \u0627\u0644\u0634\u0628\u0643\u0627\u062a \u0644\u0644\u0645\u0628\u062a\u062f\u0626\u064a\u0646 \u0648\u0645\u0639\u0631\u0641\u0629 \u0627\u0644\u062a\u0647\u062f\u064a\u062f\u0627\u062a \u0627\u0644\u062d\u0627\u0644\u064a\u0629 \u0648\u0643\u064a\u0641\u064a\u0629 \u0627\u0644\u062a\u0639\u0627\u0645\u0644 \u0645\u0639\u0647\u0627\u060c \u0648\u0623\u064a\u0636\u0627 \u062a\u0633\u0627\u0639\u062f\u0643 \u0641\u064a \u062a\u062d\u062f\u064a\u062f \u0646\u0642\u0627\u0637 \u0627\u0644\u0634\u0639\u0641 \u0628\u0623\u0645\u0646 \u0627\u0644\u0634\u0628\u0643\u0627\u062a \u0644\u0645\u0646\u0639 \u0627\u0644\u0647\u062c\u0645\u0627\u062a \u0627\u0644\u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a\u0629.<\/p>\n<p>\u0648\u0644\u0627\u062c\u062a\u064a\u0627\u0632 \u0627\u0645\u062a\u062d\u0627\u0646 \u0628\u0627\u0644\u0648 \u0623\u0644\u062a\u0648\u00a0 \u064a\u062c\u0628 \u0639\u0644\u064a\u0643 \u062f\u0631\u0627\u0633\u0629 \u0627\u0644\u0645\u0648\u0627\u0636\u064a\u0639 \u0627\u0644\u062e\u0627\u0635\u0629 \u0628\u062f\u0648\u0631\u0629 <strong>(Introduction To Cybersecurity-Edu-010)<\/strong><\/p>\n<p>\u0648\u0647\u0630\u0647 \u0627\u0644\u0645\u0648\u0627\u0636\u064a\u0639 \u0647\u064a:-<\/p>\n<ul>\n<li>Intro to cybersec\u0627urity<\/li>\n<li>Attack types &amp; techniques<\/li>\n<li>Network security models<\/li>\n<li>Cloud and data center security<\/li>\n<li>Network security technologies end point security<\/li>\n<li>Security operation platform<\/li>\n<li>Network security management with panorama and end point protection with traps<\/li>\n<li>Mobile security and virtual private<\/li>\n<li>Network management with global protect<\/li>\n<li>Cloud security with evident and aperture<\/li>\n<\/ul>\n<p>\u0648\u0644\u0630\u0627 \u064a\u062c\u0628 \u0639\u0644\u0649 \u0627\u0644\u0637\u0627\u0644\u0628 \u0623\u0646 \u062a\u0643\u0648\u0646 \u0644\u062f\u064a\u0647 \u0645\u0639\u0631\u0641\u0629 \u0628\u0623\u0633\u0627\u0633\u064a\u0627\u062a \u0623\u062c\u0647\u0632\u0629 \u0627\u0644\u062d\u0627\u0633\u0628 \u0648\u0627\u0644\u0623\u062c\u0647\u0632\u0629 \u0627\u0644\u0645\u062d\u0645\u0648\u0644\u0629 \u0648\u0645\u0641\u0627\u0647\u064a\u0645 \u0627\u0644\u0625\u0646\u062a\u0631\u0646\u062a \u0648\u0627\u0644\u0634\u0628\u0643\u0627\u062a \u0644\u062a\u062e\u0637\u0649 \u0627\u0645\u062a\u062d\u0627\u0646 \u0628\u0627\u0644\u0648 \u0623\u0644\u062a\u0648.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-174057 size-full\" src=\"https:\/\/abadnet.com.sa\/online\/wp-content\/uploads\/2021\/09\/ccefa6eb53cb0174120a894e5baf97c9.jpg\" alt=\"\" width=\"1600\" height=\"1200\" srcset=\"https:\/\/abadnet.com.sa\/online\/wp-content\/uploads\/2021\/09\/ccefa6eb53cb0174120a894e5baf97c9.jpg 1600w, https:\/\/abadnet.com.sa\/online\/wp-content\/uploads\/2021\/09\/ccefa6eb53cb0174120a894e5baf97c9-300x225.jpg 300w, https:\/\/abadnet.com.sa\/online\/wp-content\/uploads\/2021\/09\/ccefa6eb53cb0174120a894e5baf97c9-1024x768.jpg 1024w, https:\/\/abadnet.com.sa\/online\/wp-content\/uploads\/2021\/09\/ccefa6eb53cb0174120a894e5baf97c9-768x576.jpg 768w, https:\/\/abadnet.com.sa\/online\/wp-content\/uploads\/2021\/09\/ccefa6eb53cb0174120a894e5baf97c9-1536x1152.jpg 1536w, https:\/\/abadnet.com.sa\/online\/wp-content\/uploads\/2021\/09\/ccefa6eb53cb0174120a894e5baf97c9-400x300.jpg 400w, https:\/\/abadnet.com.sa\/online\/wp-content\/uploads\/2021\/09\/ccefa6eb53cb0174120a894e5baf97c9-600x450.jpg 600w\" sizes=\"(max-width: 1600px) 100vw, 1600px\" \/><\/p>\n<ul>\n<li>\n<h3><strong>\u0634\u0647\u0627\u062f\u0629 <\/strong><strong>(PCNSA-Palo Alto Networks Certified Network Security Administration)\u00a0<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p>\u062a\u0645\u0643\u0646 \u0647\u0630\u0647 \u0627\u0644\u0634\u0647\u0627\u062f\u0629 \u0627\u0644\u062d\u0627\u0635\u0644\u064a\u0646 \u0639\u0644\u064a\u0647\u0627 \u0645\u0646 \u062a\u0634\u063a\u064a\u0644 \u062c\u062f\u0631\u0627\u0646 \u0627\u0644\u062d\u0645\u0627\u064a\u0629 \u0645\u0646 \u0627\u0644\u062c\u064a\u0644 \u0627\u0644\u062c\u062f\u064a\u062f \u0644\u0634\u0628\u0643\u0627\u062a \u0628\u0627\u0644\u0648 \u0623\u0644\u062a\u0648 \u0644\u062d\u0645\u0627\u064a\u0629 \u0627\u0644\u0634\u0628\u0643\u0627\u062a \u0645\u0646 \u0623\u062d\u062f\u062b \u0627\u0644\u0647\u062c\u0645\u0627\u062a \u0627\u0644\u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a\u0629.<\/p>\n<p>\u0648\u0644\u0625\u062c\u062a\u064a\u0627\u0632 \u0647\u0630\u0647 \u0627\u0644\u062f\u0648\u0631\u0629 \u064a\u062c\u0628 \u0639\u0644\u0649 \u0627\u0644\u0637\u0627\u0644\u0628 \u062f\u0631\u0627\u0633\u0629 \u0627\u0644\u0645\u0648\u0627\u0636\u064a\u0639 \u0627\u0644\u062e\u0627\u0635\u0629 \u0628\u062f\u0648\u0631\u0629 <strong>(Firewall 10.1:Configuration and management \u2013Edu-210)<\/strong><\/p>\n<p>\u0648\u0647\u0630\u0647 \u0627\u0644\u0645\u0648\u0627\u0636\u064a\u0639 \u0647\u064a:-<\/p>\n<ul>\n<li>Palo alto networks portfolio and architecture<\/li>\n<li>Configuring initial firewall settings<\/li>\n<li>Managing firewall configurations<\/li>\n<li>Managing firewall administrator accounts<\/li>\n<li>Connecting the firewall to production networks with security zones<\/li>\n<li>Creating and managing security policy rules<\/li>\n<li>Creating and managing NAT policy rules<\/li>\n<li>Controlling application usage with App-ID<\/li>\n<li>Blocking known threats using security profiles<\/li>\n<li>Blocking inappropriate web traffic with URL filtering<\/li>\n<li>Blocking unknown threats with wildfire<\/li>\n<li>Controlling access to network resources with user-ID<\/li>\n<li>Using decryption to block threats in encrypted traffic<\/li>\n<li>Locating valuable information using logs and reports<\/li>\n<\/ul>\n<p>\u0648\u064a\u062c\u0628 \u0639\u0644\u0649 \u0627\u0644\u0637\u0627\u0644\u0628 \u0642\u0628\u0644 \u062f\u0631\u0627\u0633\u0629 \u0647\u0630\u0647 \u0627\u0644\u062f\u0648\u0631\u0629 \u0623\u0646 \u064a\u0643\u0648\u0646 \u0644\u062f\u064a\u0647 \u062f\u0631\u0627\u064a\u0629 \u0628\u0623\u0633\u0627\u0633\u064a\u0627\u062a \u0627\u0644\u0634\u0628\u0643\u0627\u062a \u0648\u0645\u0641\u0627\u0647\u064a\u0645 \u0627\u0644\u0640IP Address \u00a0\u0648\u0645\u0641\u0627\u0647\u064a\u0645 \u0627\u0644\u0623\u0645\u0627\u0646 \u0627\u0644\u0623\u0633\u0627\u0633\u064a\u0629\u060c \u0648\u062e\u0628\u0631\u0629 \u0641\u064a \u062a\u0642\u0646\u064a\u0627\u062a \u0627\u0644\u0623\u0645\u0627\u0646 \u0627\u0644\u0645\u062e\u062a\u0644\u0641\u0629 \u0645\u062b\u0644 (IPS &amp; Proxy).<\/p>\n<ul>\n<li>\n<h3><strong>\u0634\u0647\u0627\u062f\u0629 <\/strong><strong>(PCNSE-Palo Alto Networks Certified Network Security Engineer)<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p>\u0648\u0644\u0644\u062d\u0635\u0648\u0644 \u0639\u0644\u0649 \u0627\u0644\u0634\u0647\u0627\u062f\u0629 \u0627\u0644\u062e\u0627\u0635\u0629 \u0628\u0647\u0630\u0647 \u0627\u0644\u062f\u0648\u0631\u0629 \u0648\u062a\u062e\u0637\u064a \u0627\u0644\u0627\u0645\u062a\u062d\u0627\u0646 \u0627\u0644\u062e\u0627\u0635 \u0628\u0647\u0627 \u064a\u062c\u0628 \u062f\u0631\u0627\u0633\u0629 4 \u062f\u0648\u0631\u0627\u062a \u0645\u0631\u062a\u0628\u0637\u0629 \u0628\u0647\u0627 \u0648\u0647\u064a:-<\/p>\n<ul>\n<li>\n<h3><strong>(Firewall 10.1:Configuration and management \u2013Edu-210)<\/strong><\/h3>\n<\/li>\n<li>\n<h3><strong>(Panorama 10.1:Managing firewalls at scale \u2013Edu-220)<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p>\u0648\u0645\u0648\u0627\u0636\u064a\u0639 \u0627\u0644\u062f\u0631\u0627\u0633\u0629 \u0627\u0644\u062e\u0627\u0635\u0629 \u0628\u0647\u0630\u0647 \u0627\u0644\u062f\u0648\u0631\u0629 \u0647\u064a:-<\/p>\n<ul>\n<li>Initial configuration<\/li>\n<li>Adding firewalls<\/li>\n<li>Templates<\/li>\n<li>Device groups<\/li>\n<li>Log collection and forwarding<\/li>\n<li>Using panorama logs<\/li>\n<li>Panorama administrative accounts<\/li>\n<li>Reporting<\/li>\n<li>Troubleshooting<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>\n<h3><strong>(Firewall 10.1:Troubleshooting \u2013Edu-330)<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p>\u0648\u0645\u0648\u0627\u0636\u064a\u0639 \u0627\u0644\u062f\u0631\u0627\u0633\u0629 \u0627\u0644\u062e\u0627\u0635\u0629 \u0628\u0647\u0627 \u0647\u064a:-<\/p>\n<ul>\n<li>Tools and resources<\/li>\n<li>Flow logic<\/li>\n<li>Packet captures<\/li>\n<li>Packet diagnostics logs<\/li>\n<li>Host inbound traffic<\/li>\n<li>Transit traffic<\/li>\n<li>System services<\/li>\n<li>Certificate management and SSL decryption<\/li>\n<li>User-ID<\/li>\n<li>Global protect<\/li>\n<li>Support escalation and RMAs<\/li>\n<li>Next steps<\/li>\n<\/ul>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-174058 size-full\" src=\"https:\/\/abadnet.com.sa\/online\/wp-content\/uploads\/2021\/09\/dana-illustrations-test.jpg\" alt=\"\" width=\"1600\" height=\"1200\" srcset=\"https:\/\/abadnet.com.sa\/online\/wp-content\/uploads\/2021\/09\/dana-illustrations-test.jpg 1600w, https:\/\/abadnet.com.sa\/online\/wp-content\/uploads\/2021\/09\/dana-illustrations-test-300x225.jpg 300w, https:\/\/abadnet.com.sa\/online\/wp-content\/uploads\/2021\/09\/dana-illustrations-test-1024x768.jpg 1024w, https:\/\/abadnet.com.sa\/online\/wp-content\/uploads\/2021\/09\/dana-illustrations-test-768x576.jpg 768w, https:\/\/abadnet.com.sa\/online\/wp-content\/uploads\/2021\/09\/dana-illustrations-test-1536x1152.jpg 1536w, https:\/\/abadnet.com.sa\/online\/wp-content\/uploads\/2021\/09\/dana-illustrations-test-400x300.jpg 400w, https:\/\/abadnet.com.sa\/online\/wp-content\/uploads\/2021\/09\/dana-illustrations-test-600x450.jpg 600w\" sizes=\"(max-width: 1600px) 100vw, 1600px\" \/><\/p>\n<ul>\n<li>\n<h3><strong>(Firewall 10.1: Improving security posture and hardening PAN-OS firewalss-Edu-214)<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p>\u0648\u0645\u0648\u0627\u0636\u064a\u0639 \u0627\u0644\u062f\u0631\u0627\u0633\u0629 \u0627\u0644\u062e\u0627\u0635\u0629 \u0628\u0647\u0630\u0647 \u0627\u0644\u062f\u0648\u0631\u0629 \u0647\u064a:-<\/p>\n<ul>\n<li>Introduction<\/li>\n<li>Security profile revision<\/li>\n<li>Daily operations and maintenance<\/li>\n<li>Establish initial baseline visibility<\/li>\n<li>Analyze and update security rules that pass traffic<\/li>\n<li>Inbound security rules best practices and analysis<\/li>\n<li>Outbound security rules best practices and analysis<\/li>\n<li>Internal security rules best practices and analysis<\/li>\n<li>Administratively hardening PAN-OS<\/li>\n<li>Reducing policy set and simplification<\/li>\n<\/ul>\n<p>\u0648\u064a\u062c\u0628 \u0639\u0644\u0649 \u0645\u0646 \u0633\u064a\u0642\u0648\u0645 \u0628\u062f\u0631\u0627\u0633\u0629 \u0647\u0630\u0647 \u0627\u0644\u062f\u0648\u0631\u0627\u062a \u0627\u0644\u0623\u0631\u0628\u0639 \u0623\u0646 \u064a\u0643\u0648\u0646 \u0639\u0644\u0649 \u062f\u0631\u0627\u064a\u0629 \u0628\u0627\u0644\u0639\u062f\u064a\u062f \u0645\u0646 \u0627\u0644\u0645\u0647\u0627\u0631\u0627\u062a \u0648\u0645\u0646\u0647\u0627:-<\/p>\n<ul>\n<li>\u062e\u0628\u0631\u0629 \u0633\u062a\u0629 \u0623\u0634\u0647\u0631 \u0641\u064a \u0627\u0644\u0639\u0645\u0644 \u0639\u0644\u0649 \u062c\u062f\u0631\u0627\u0646 \u0627\u0644\u062d\u0645\u0627\u064a\u0629 \u0627\u0644\u062e\u0627\u0635\u0629 \u0628 Palo Alto Networks.<\/li>\n<li>\u0645\u0639\u0631\u0641\u0629 \u0628\u0639\u0646\u0627\u0648\u064a\u0646 \u0627\u0644 IP \u0648\u0645\u0641\u0627\u0647\u064a\u0645 \u0623\u0645\u0627\u0646 \u0627\u0644\u0634\u0628\u0643\u0627\u062a.<\/li>\n<li>\u0625\u0645\u0643\u0627\u0646\u064a\u0629 \u062a\u062d\u062f\u064a\u062f \u0627\u0644\u0623\u062e\u0637\u0627\u0621 \u0648\u0625\u0635\u0644\u0627\u062d\u0647\u0627.<\/li>\n<\/ul>\n<p>\u0647\u0630\u0627 \u0643\u0644 \u0645\u0627 \u062a\u062d\u062a\u0627\u062c \u0625\u0644\u064a\u0647 \u0645\u0646 \u0623\u062c\u0644 \u062a\u062e\u0637\u064a \u0627\u0644\u0627\u062e\u062a\u0628\u0627\u0631\u0627\u062a \u0627\u0644\u062e\u0627\u0635\u0629 \u0628\u0634\u0647\u0627\u062f\u0629 \u0628\u0627\u0644\u0648 \u0623\u0644\u062a\u0648.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u0623\u0647\u0645\u064a\u0629 \u0623\u0645\u062a\u062d\u0627\u0646 \u0628\u0627\u0644\u0648 \u0623\u0644\u062a\u0648. \u064a\u0624\u0647\u0644\u0643 \u0627\u0645\u062a\u062d\u0627\u0646 \u0628\u0627\u0644\u0648 \u0623\u0644\u062a\u0648 \u0644\u0623\u0645\u0646 \u0627\u0644\u0634\u0628\u0643\u0627\u062a \u0627\u0644\u062d\u0635\u0648\u0644 \u0639\u0644\u0649 \u0634\u0647\u0627\u062f\u0629 \u0644\u0644\u0639\u0645\u0644 \u0643\u0645\u0633\u0624\u0648\u0644 \u0644\u0623\u0645\u0646 \u0627\u0644\u0634\u0628\u0643\u0627\u062a\u060c \u0643\u0645\u0627 \u0623\u0646\u0647\u0627 \u062a\u0641\u064a\u062f [&hellip;]<\/p>\n","protected":false},"author":3647,"featured_media":174055,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[62],"tags":[161,162,160,163,157,156,164,159,158],"class_list":["post-173258","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-62","tag-palo-alto-networks","tag-palo-alto-networks-certified-network-security-engineer","tag-pcnse","tag-163","tag-157","tag-156","tag-164","tag-159","tag-158"],"_links":{"self":[{"href":"https:\/\/abadnet.com.sa\/online\/wp-json\/wp\/v2\/posts\/173258","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abadnet.com.sa\/online\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abadnet.com.sa\/online\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abadnet.com.sa\/online\/wp-json\/wp\/v2\/users\/3647"}],"replies":[{"embeddable":true,"href":"https:\/\/abadnet.com.sa\/online\/wp-json\/wp\/v2\/comments?post=173258"}],"version-history":[{"count":0,"href":"https:\/\/abadnet.com.sa\/online\/wp-json\/wp\/v2\/posts\/173258\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/abadnet.com.sa\/online\/wp-json\/wp\/v2\/media\/174055"}],"wp:attachment":[{"href":"https:\/\/abadnet.com.sa\/online\/wp-json\/wp\/v2\/media?parent=173258"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abadnet.com.sa\/online\/wp-json\/wp\/v2\/categories?post=173258"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abadnet.com.sa\/online\/wp-json\/wp\/v2\/tags?post=173258"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}