{"id":9547,"date":"2015-06-29T06:00:55","date_gmt":"2015-06-29T13:00:55","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=9547"},"modified":"2015-06-26T09:33:32","modified_gmt":"2015-06-26T16:33:32","slug":"palo-alto-networks-academy-a-degree-with-class","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/06\/palo-alto-networks-academy-a-degree-with-class\/","title":{"rendered":"Palo Alto Networks Academy: A Degree with Class"},"content":{"rendered":"<p><strong><em>Have you benefited from the Palo Alto Networks Academy?<\/em><\/strong><\/p>\n<p>If so, you\u2019re not alone. Palo Alto Networks currently has over 60 colleges, universities, and technical institutions worldwide that are delivering curricula to thousands of students based on Palo Alto Networks technologies and innovations.<\/p>\n<p>The Palo Alto Networks Academy is designed to equip students with the required knowledge of next-generation cybersecurity to successfully navigate today\u2019s rapidly changing cyber threat landscape.<!--more--><\/p>\n<p>We can help you identify and develop the skills needed to enable tomorrow\u2019s security professionals to sufficiently protect their networks and data. We work with educators, employers, and technology experts to create courses that prepare students for the future.<\/p>\n<p>Palo Alto Networks Academy works with colleges and instructors to prepare students for exciting careers in cloud, network and infrastructure security, one of the fastest-growing segments in technology.<\/p>\n<p><strong><em>Did you know that cybersecurity is fifth on the list of top issues for Homeland Security?<\/em><\/strong><\/p>\n<p>In fact, the Department of Homeland Security states, \u201c<em>Cyber security has emerged as an issue of vital national security. Governments, businesses, and individuals are under attack from other governments, cyber criminals, and \u2018hacktivists.\u2019 \u00a0These attacks steal hundreds of billions of dollars in personal and business data and compromise sensitive government operations.<\/em>\u201d<\/p>\n<p>Hardly a day goes by when we don\u2019t hear of another high-profile breach. One thing these breaches all have in common is a stateful inspection firewall. Palo Alto Networks-based curricula demonstrate a more modern, next-generation approach to securing your network. Our technology is based on application traffic signatures (App-ID) and not antiquated stateful inspection techniques, which are leaving organizations vulnerable.<\/p>\n<p><strong><em>Would your campus like to offer the Palo Alto Networks security curriculum?\u00a0 <\/em><\/strong><\/p>\n<p>If yes, then you might want to consider forwarding the brochure below to your faculty to consider becoming our Academy partner.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/content\/dam\/paloaltonetworks-com\/en_US\/assets\/pdf\/datasheets\/education\/Authorized%20Academy%20Center.pdf\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignleft wp-image-9548 size-medium lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/academy_1-230x282.png\" alt=\"academy_1\" width=\"230\" height=\"282\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/academy_1-230x282.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/academy_1-244x300.png 244w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/academy_1-32x40.png 32w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/academy_1.png 366w\" sizes=\"auto, (max-width: 230px) 100vw, 230px\" \/><\/a>Our courseware includes the essentials to configuring, installing and managing our firewalls.<\/p>\n<p><em><strong>Course Descriptions:<\/strong><\/em><\/p>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/content\/dam\/paloaltonetworks-com\/en_US\/assets\/pdf\/datasheets\/education\/201-firewall-installation-1.pdf\" target=\"_blank\">Essentials 1 (201)<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/content\/dam\/paloaltonetworks-com\/en_US\/assets\/pdf\/datasheets\/education\/205-firewall-installation-2.pdf\" target=\"_blank\">Essentials 2 (205)<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/content\/dam\/paloaltonetworks-com\/en_US\/assets\/pdf\/datasheets\/education\/221-panorama-essentials.pdf\" target=\"_blank\">Panorama Essentials (221)<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/content\/dam\/paloaltonetworks-com\/en_US\/assets\/pdf\/datasheets\/education\/231-advanced-threat-management.pdf\" target=\"_blank\">Adv. Threat Management (231)<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/content\/dam\/paloaltonetworks-com\/en_US\/assets\/pdf\/datasheets\/education\/311-advanced-firewall-troubleshooting.pdf\" target=\"_blank\">Adv. Troubleshooting (311)<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>We also\u00a0have a textbook called the Cybersecurity Survival Guide, which covers the cybersecurity landscape and threats, best practices, and solutions from Palo Alto Networks.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/academy_2.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:67.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-9549 size-large lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/academy_2-500x337.png\" alt=\"academy_2\" width=\"500\" height=\"337\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/academy_2-500x337.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/academy_2-230x155.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/academy_2-445x300.png 445w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/academy_2-59x40.png 59w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/06\/academy_2.png 1074w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Additional benefits from Palo Alto Networks include free Virtual Machines (VMs) with licenses, standard subscriptions for classroom use, and expert advice from our educators on building labs and custom courses.<\/p>\n<p>Visit the Palo Alto Networks Academy website for more information:<br \/>\n<a href=\"http:\/\/www.paloaltonetworks.com\/academy\" target=\"_blank\">http:\/\/www.paloaltonetworks.com\/academy<\/a><\/p>\n<p>Please let us know if you have any comments or questions.<\/p>\n<p>You can contact me anytime via Twitter at\u00a0<a href=\"https:\/\/twitter.com\/CicconeScott\" rel=\"nofollow,noopener\"  target=\"_blank\">@CicconeScott<\/a>, or you can email Shoba Trivadi directly at <a href=\"mailto:strivadi@paloaltonetworks.com\" target=\"_blank\">strivadi@paloaltonetworks.com<\/a>.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Have you benefited from the Palo Alto Networks Academy? If so, you\u2019re not alone. Palo Alto Networks currently has over 60 colleges, universities, and technical institutions worldwide that are delivering curricula to &hellip;<\/p>\n","protected":false},"author":121,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155],"tags":[1264,1263],"coauthors":[1118],"class_list":["post-9547","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","tag-cybersecurity-survival-guide","tag-palo-alto-networks-academy"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9547","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/121"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=9547"}],"version-history":[{"count":5,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9547\/revisions"}],"predecessor-version":[{"id":9554,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9547\/revisions\/9554"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=9547"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=9547"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=9547"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=9547"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}