| Topic | Details |
| Topic 1 | - Connectivity and Security: This part measures the skills of network engineers and security analysts in maintaining and configuring network security across on-premises, cloud, and hybrid environments. It covers network segmentation, security and network policies, monitoring, logging, and certificate management. It also includes maintaining connectivity and security for remote users through remote access solutions, network segmentation, security policy tuning, monitoring, logging, and certificate usage to ensure secure and reliable remote connections.
|
| Topic 2 | - GFW and SASE Solution Maintenance and Configuration: This domain evaluates the skills of network security administrators in maintaining and configuring Palo Alto Networks hardware firewalls, VM-Series, CN-Series, and Cloud NGFWs. It includes managing security policies, profiles, updates, and upgrades. It also covers adding, configuring, and maintaining Prisma SD-WAN including initial setup, pathing, monitoring, and logging. Maintaining and configuring Prisma Access with security policies, profiles, updates, upgrades, and monitoring is also assessed.
|
| Topic 3 | - Infrastructure Management and CDSS: This section tests the abilities of security operations specialists and infrastructure managers in maintaining and configuring Cloud-Delivered Security Services (CDSS) including security policies, profiles, and updates. It includes managing IoT security with device IDs and monitoring, as well as Enterprise Data Loss Prevention and SaaS Security focusing on data encryption, access control, and logging. It also covers maintenance and configuration of Strata Cloud Manager and Panorama for network security environments including supported products, device addition, reporting, and configuration management.
|
| Topic 4 | - Network Security Fundamentals: This section of the exam measures skills of network security engineers and covers key concepts such as application layer inspection for Strata and SASE products, differentiating between slow and fast path packet inspection, and the use of decryption methods including SSL Forward Proxy, SSL Inbound Inspection, SSH Proxy, and scenarios where no decryption is applied. It also includes applying network hardening techniques like Content-ID, Zero Trust principles, User-ID (including Cloud Identity Engine), Device-ID, and network zoning to enhance security on Strata and SASE platforms.
|