1. Home
  2. Palo Alto Networks
  3. Cybersecurity-Practitioner Exam Syllabus

Palo Alto Networks Cybersecurity-Practitioner Exam Syllabus

Start Free Cybersecurity-Practitioner Exam Practice After Reviewing the Topics

Before starting your Cybersecurity-Practitioner exam preparation, it is recommended to review the complete Palo Alto Networks Cybersecurity Practitioner exam syllabus and carefully go through the exam objectives listed below. Once you understand the exam structure and objectives, you should practice using our free Cybersecurity-Practitioner questions. We also provide premium Cybersecurity-Practitioner practice test, fully updated according to the latest exam objectives, to help you accurately assess your preparedness for the actual exam.

Palo Alto Networks Cybersecurity-Practitioner Exam Objectives

Section Weight Objectives
Cybersecurity 19% 1.1 Identify the components of the authentication, authorization, and accounting (AAA) framework
1.2 Categorize techniques used by malicious actors as defined by the MITRE ATT&CK framework 
1.3 Explain the concept of Zero Trust and define its key principles
  • 1.3.1 Continuous monitoring and validation 
  • 1.3.2 Least privilege access enforcement 
  • 1.3.3 Breach assumption 
1.4 Identify and describe the characteristics of an advanced persistent threat (APT) 
1.5 Explain the function of common security technologies
  • 1.5.1 Identity Providers (IdP), identity and access management (IAM), and multi-factor authentication (MFA)
  • 1.5.2 Mobile device management (MDM) and mobile application management (MAM)
  • 1.5.3 Secure email gateways and integrated cloud email security
Network Security 19% 2.1 Describe key characteristics of Zero Trust Network Access (ZTNA)
2.2 Explain the function of stateless firewalls and next-generation firewalls (NGFWs)
2.3 Explain the purpose of microsegmentation
2.4 Explain the purpose and function of common network security technologies
  • 2.4.1 Intrusion prevention system (IPS)
  • 2.4.2 URL filtering
  • 2.4.3 DNS Security
  • 2.4.4 VPN
  • 2.4.5 SSL/TLS Decryption (outbound / forward proxy)
2.5 Explain the limitations of signature-based network protection
2.6 Identify and describe the deployment options for NGFWs for networks operation on both bare metal and virtualized architectures
2.7 Identify and describe cybersecurity concerns unique to Operation Technology (OT) and internet of things (IoT) devices
2.8 Identify and describe Palo Alto Networks Cloud-Delivered Security Services (CDSS)
2.9 Explain the security function of Precision AI
Secure Access 14% 3.1 Define and explain Secure Access Service Edge (SASE) and differentiate from Secure Service Edge (SSE)
3.2 Identify challenges related to confidentiality, integrity, and availability of information and applications
  • 3.2.1 Data and information
  • 3.2.2 Private applications
  • 3.2.3 Software-as-a-Service (SaaS) applications
  • 3.2.4 Artificial Intelligence (AI) applications, tools, and platforms
3.3 Explain the security function of common technologies 
  • 3.3.1 Secure Web Gateway
  • 3.3.2 Enterprise Browser
  • 3.3.3 Remote Browser Isolation
  • 3.3.4 Data loss prevention (DLP)
  • 3.3.5 Cloud Access Security Broker (CASB)
3.4 Describe the purpose of Software-Defined Wide Area Networking (SD-WAN) solutions
3.5 Describe Prisma SASE solutions
  • 3.5.1 Prisma Access
  • 3.5.2 Prisma SD-WAN
  • 3.5.3 Prisma Access Browser
  • 3.5.4 Enterprise DLP
  • 3.5.5 AI Access
  • 3.5.6 Prisma AIRS
     
Cloud Security 20% 4.1 Identify and describe major cloud architectures and topologies
4.2 Identify and describe major challenges related to cloud security
4.2.1 Application Security
  • 4.2.2 Cloud Posture Security
  • 4.2.3 Cloud Runtime Security
4.3 Identify and describe technologies used to secure cloud environments (e.g. CSPM, CWPP)
4.4 Identify and describe the functions of a Cloud Native Application Protection Platform (CNAPP) 
4.5 Explain the features and functionality of Cortex Cloud 
Endpoint Security 15% 5.1 Identify and explain Indicators of Compromise (IOCs)
5.2 Explain the limitations of signature-based anti-malware software 
5.3 Explain the concept of User and Entity Behavior Analytics (UEBA) 
5.4 Explain endpoint detection and response (EDR) and extended detection and response (XDR) 
5.5 Explain Behavioral Threat Prevention
5.6 Identify and describe cybersecurity threats mitigated by the following endpoint security technologies
  • 5.6.1 Host-based Firewall and Host-based Intrusion Preventions Systems (HIPS)
  • 5.6.2 Device Control and USB Control
  • 5.6.3 Application Control
  • 5.6.4 Disk Encryption
  • 5.6.5 Patch Management
5.7 Explain the features and functionality of Cortex XDR
Security Operations 13% 6.1 Identify and describe key characteristics of threat hunting 
6.2 Explain the process and outcomes of incident response
6.3 Explain the functions of a security information and event management (SIEM) platform
6.4 Explain the functions of security orchestration, automation, and response (SOAR) 
6.5 Explain the function of an Attack Surface Management (ASM) platform 
  • 6.6 Explain the features and functionality of Cortex solutions
  • 6.6.1 XSOAR
  • 6.6.2 Xpanse
  • 6.6.3 XSIAM
Official Information https://www.paloaltonetworks.com/services/education/panw-cybersecurity-practitioner