Cybersecurity Academy Curriculum-2023 Overview
Cybersecurity Academy Curriculum-2023 Overview
Curriculum
The Palo Alto Networks Cybersecurity Academy program offers comprehensive courses and
technology to address the educational needs of academic learning institutions globally, including
universities, colleges, and high schools.
Academy curriculum is aligned with the U.S. National Initiative for Cybersecurity Education
(NICE) framework and cybersecurity work roles.
The academic curriculum delivered by our Academy partner institutions helps provide the
knowledge and expertise that prepare their students to be successful as they pursue higher
education and/or cyber careers. Our trusted certifications validate their knowledge of Palo Alto
Networks technology, as well as their ability to prevent cyberattacks and safely enable
applications.
NIST/NICE Alignment and Work Roles • Apply two-factor authentication on the Next-Generation firewall
(NGFW).
• Technical Support Specialist (OM-STS-001)
• Configure the NGFW to allow only trusted applications.
• Work roles: Technical Support Associate; Help Desk Associate
Module 1: Cybersecurity Landscape
Course Objectives Module 2: Cybersecurity Threats
• Discover modern computing trends and application threat vectors. Module 3: Cybersecurity Attack Types
• Configure a network interface and test for connectivity. Module 4: Cybersecurity Design Models
• Identify cloud computing and software-as-a-service (SaaS) application Module 5: Security Operating Platform
challenges. Scope
• Review cybersecurity industry regulations and standards. • Level: Introductory
• Explore recent cyberattacks and their impact on business. • Duration: 2 credits - 30 contact hours
• Review attacker profiles, motivations, and the Cyberattack Lifecycle. • Format: Instructor-Led or Self-Paced
• Recognize high-profile cybersecurity attacks and Advanced Persistent
Threats. Prerequisites
No specific course prerequisites, but students should have basic internet
and application software skills.
• Review and analyze Identity and Access Management (IAM) - cloud • Discover the Three Pillars of Security Automation: People, Processes, and
security services. Technology.
• Discover container compliance status through scans for Amazon Web • Examine how security orchestration, automation, and response (SOAR)
Services (AWS®) cloud accounts. methods use automation to improve end-to-end business operations
• Describe container monitoring and runtime behavior. cyber posture.
• Describe container model machine learning, patterns, learning states, • Identify and review Security Orchestration and Response Use Cases.
and drips.
• Explain the benefits of Security Operations Configuration and
• Analyze container model details processes, networking, and trust Implementation.
audit details.
• Explore Phishing Playbooks that execute repeatable tasks to identify false
• List the steps required to develop a new container runtime rule.
positives.
• Investigate an incident through compliance, image, snap- shots, and
• Investigate Endpoint Malware Infection and Failed User Login Playbooks.
audit details.
• Evaluate challenges associated with cloud-based identity and • Examine SSL Certificate, Vulnerability, and Endpoint Diagnostics
privileged access management. Playbooks.
• Investigate how Cortex XSOAR automates security response actions.
Module 1: Cloud Security Overview
• Review how Cortex XSOAR automates responses to ransomware and
Module 2: Monitoring Vulnerabilities
phishing attacks.
Module 3: Monitoring Behavior
• Identify how to streamline the aggregation and sharing of threat
Module 4: Maintaining Compliance intelligence.
Module 5: Incident Management
• Examine the top ransomware variant threats across the cybersecurity
Scope landscape.
• Level: Intermediate • For each stage of the Cyber Attack Life Cycle describe how threat
• Duration: 2 credits - 30 contact hours intelligence and adversarial playbooks are utilized to deploy automated
• Format: Instructor-Led or Self-Paced controls and mitigate attacks.