Palo Alto Networks Certified Cybersecurity Entry-level Technician

Course Summary
The PCCET (Palo Alto Networks Certified Cybersecurity Entry-Level Technician) course is designed for students and early-career professionals who are new to cybersecurity. This course provides a foundational understanding of key cybersecurity concepts, modern threat landscapes, and how Palo Alto Networks technologies are used to defend digital environments.
By combining interactive lectures with hands-on exposure to security platforms, the course prepares participants to pass the PCCET exam and begin their journey in the world of cybersecurity with confidence.
Why Choose This Course
With cyber threats growing daily, cybersecurity is no longer a niche skill—it’s essential. This course is the perfect entry point for anyone who wants to:
Start a career in cybersecurity, IT, or network security
Build a strong foundation in cyber hygiene, threat detection, and network defense
Learn industry-relevant tools and practices used by cybersecurity professionals
Prepare for more advanced certifications such as PCNSA, CompTIA Security+, or CEH
At Linux Training Center, we offer:
Instructor-led, hands-on training with live demonstrations
A beginner-friendly approach with zero prior experience required
Mock tests, exam guidance, and certification preparation
Affordable fees and flexible schedules
Who Should Enroll
This course is ideal for:
College students and recent graduates in IT, computer science, or networking
Beginners exploring a career in cybersecurity
Entry-level IT professionals looking to switch to security roles
Anyone preparing for the PCCET certification
Educators and trainers introducing cybersecurity concepts in academia
What You Will Learn
By the end of the course, you’ll be able to:
Understand basic cybersecurity principles and terminology
Identify common types of cyber threats (malware, phishing, ransomware, etc.)
Describe the purpose and use of firewalls, VPNs, IDS/IPS, and endpoint protection
Navigate and understand network protocols, IP addressing, and ports
Explain the core components of Palo Alto Networks security platforms
Explore threat intelligence and how it’s used in real-time defense
Apply safe computing practices and understand access control models
Skills You Will Gain
Cybersecurity awareness and best practices
Fundamentals of network security and threat prevention
Introduction to Palo Alto’s security ecosystem (NGFW, Cortex, Prisma, etc.)
Security operations and incident response basics
Confidence to pursue higher-level cybersecurity training and roles
Career Benefits
After completing this course, you can:
Secure entry-level positions such as Security Analyst, SOC Trainee, or IT Support with Security Focus
Build a clear path toward Palo Alto Networks’ advanced certifications
Stand out in academic applications, internships, and job interviews
Be well-prepared to move into PCNSA, CompTIA Security+, or CEH certification tracks
Launch Your Cybersecurity Career Now
Whether you’re a student, a beginner, or a career switcher, this course provides the perfect starting point to understand and enter the cybersecurity field with recognized certification.
Enroll now and take your first step into cybersecurity.
Course Syllabus
Modules
Fundamentals of Cybersecurity
- Distinguish between Web 2.0 and 3.0 applications and services
- Describe port-scanning methodologies and their impact
Nonstandard ports
Identify applications by their port number
- Recognize applications used to circumvent port-based firewalls
- Differentiate between common cloud computing service models
SaaS
PaaS
IaaS
- Describe the business processes of supply-chain management
- Describe the vulnerabilities associated with data being stored in the SaaS environment
Describe roles within a SaaS environment
Describe security controls for SaaS applications
- Describe the impact of governance, regulation, and compliance
Differentiate between compliance and security
Identify major cybersecurity laws and their implications
- Describe the tactics of the MITRE ATT&CK framework
Identify a leading indicator of a compromise
Describe how to use CVE
Describe how to use CVS
- Identify the different attacker profiles and motivations
Describe the different value levels of the information that needs to be protected (political, financial, etc.)
- Describe the different phases and events of the cyberattack lifecycle
Describe the purpose of command and control (C2)
- Identify the characteristics, capabilities, and appropriate actions for different types of malware and ransomware
- Differentiate between vulnerabilities and exploits
Differentiate between various business email compromise attacks
Identify different methodologies for social engineering
Identify the chain of events that result from social engineering
- Identify what chain of events follows an attack
- Differentiate between the functional aspects of bots and botnets
Describe the type of IoT devices that are part of a botnet attack
- Differentiate the TCP/IP roles in DDoS attacks
Differentiate between DoS and DDoS
- Describe advanced persistent threats
- Describe risks with Wi-Fi networks
Differentiate between common types of Wi-Fi attacks
Describe how to monitor your Wi-Fi network
- Describe perimeter-based network security
Identify the types of devices used in perimeter defense
- Describe the Demilitarized Zone (DMZ)
- Describe the transition from a trusted network to an untrusted network
Differentiate between North-South and East-West zones
- Describe Zero Trust
Identify the benefits of the Zero Trust model
Identify the design principles for Zero Trust
Describe a microperimeter
Differentiate between Trust and Untrust zones
- Describe the integration of services for network, endpoint, and cloud
- Identify the capabilities of an effective Security Operating Platform
Describe the components of the Security Operating Platform
Network Security Components
- Differentiate between hubs, switches, and routers
Given a network diagram, Identify the icons for hubs, switches, and routers
- Describe the use of VLANs
- Differentiate between routed and routing protocols
- Differentiate between static and dynamic routing protocols
Differentiate between link state and distance vector
- Identify the borders of collision and broadcast domains
- Differentiate between different types of area networks
WAN
LAN
- Describe the advantages of SD-WAN
- Describe the purpose of the Domain Name System (DNS)
Describe how DNS record types are used
Identify a fully qualified domain name (FQDN)
Describe the DNS hierarchy
- Differentiate between categories of IoT devices
Identify the known security risks and solutions associated with IoT
- Identify IoT connectivity technologies
- Differentiate between IPv4 and IPv6 addresses
Describe binary-to-decimal conversion
Describe IPv4 CIDR notation
Describe IPv4 classful subnetting
Given a scenario, identify the proper subnet mask
Describe the purpose of subnetting
Describe the structure of IPv4 and IPv6
Describe the purpose of IPv4 and IPv6 addressing
- Describe the purpose of a default gateway
- Describe the role of NAT
- Describe OSI and TCP/IP models
Identify the order of the layers of both OSI and TCP/IP models
Compare the similarities of some OSI and TCP/IP layers
Identify the protocols and functions of each OSI layer
- Describe the data-encapsulation process
Describe the PDU format used at different layers
- Identify the characteristics of various types of network firewalls
Traditional firewalls
Next-generation firewalls
Differentiate between NGFWs and traditional firewalls
- Describe the application of NGFW deployment options (i.e., PA-, VM- and CN-Series)
- Differentiate between intrusion detection systems and intrusion prevention systems
Differentiate between knowledge-based and behavior-based systems
- Describe virtual private networks
Describe when to use VPNs
- Differentiate between the different tunneling protocols
- Describe the purpose of data loss prevention
Classify different types of data (e.g., sensitive, inappropriate)
- Differentiate the various types of security functions from those that are integrated into UTM devices
- Describe endpoint security standards
Describe the advantages of endpoint security
Describe host-based intrusion detection/prevention systems
Differentiate between signature-based and behavioral-based malware protection
Describe application block and allow listing
Describe the concepts of false-positive and false-negative alerts
Describe the purpose of anti-spyware software
- Identify differences in managing wireless devices compared to other endpoint devices
- Describe the purpose of identity and access management
Single- and multi-factor Authentication
Separation of duties and impact on privileges
RBAC, ABAC, DAC, and MAC
User profiles
- Describe the integration of NGFWs with the cloud, networks, and endpoints
- Describe App-ID, User-ID, and Content-ID
- Describe Palo Alto Networks firewall subscription services
WildFire
URL Filtering
Threat Prevention
DNS Security
IoT Security
SD-WAN
Advanced Threat Prevention
Advanced URL Filtering
GlobalProtect
Enterprise DLP
SaaS Security Inline
Virtual Systems
- Describe network security management
Identify the deployment modes of Panorama
Describe the three components of Best Practice Assessment (BPA)
Cloud Technologies
- Describe the NIST cloud service and deployment models
- Recognize and list cloud security challenges
Describe the vulnerabilities in a shared community environment
Describe cloud security responsibilities
Describe cloud multitenancy
Differentiate between security tools in various cloud environments
Describe identity and access management controls for cloud resources
Describe different types of cloud security alerts and notifications
- Identify the 4 Cs of cloud native security
- Describe the purpose of virtualization in cloud computing
Describe the types of hypervisors
Describe characteristics of various cloud providers
Describe economic benefits of cloud computing and virtualization
Describe the security implications of virtualization
- Explain the purpose of containers in application deployment
Differentiate containers versus virtual machines
Describe Container as a Service
Differentiate a hypervisor from a Docker Container
- Describe how serverless computing is used
- Describe DevOps
- Describe DevSecOps
- Illustrate the continuous integration/continuous delivery pipeline
- Explain governance and compliance related to deployment of SaaS applications
Describe security compliance to protect data
Describe privacy regulations globally
Describe security compliance between local policies and SaaS applications
- Describe the cost of maintaining a physical data center
- Differentiate between data-center security weaknesses of traditional solutions versus cloud environments
- Differentiate between east-west and north-south traffic patterns
- Describe the four phases of hybrid data-center security
- Describe how data centers can transform their operations incrementally
- Describe the cloud-native security platform
- Identify the four pillars of Prisma Cloud application security
- Describe the concept of SASE
- Describe the SASE layer
Describe sanctioned, tolerated, and unsanctioned SaaS applications
List how to control sanctioned SaaS usage
- Describe the network-as-a-service layer
- Describe how Prisma Access provides traffic protection
- Describe Prisma Cloud Security Posture Management (CSPM)
Elements of Security Operations
- Describe the main elements included in the development of SOC business objectives
- Describe the components of SOC business management and operations
- List the six essential elements of effective security operations
- Describe the four SecOps functions
Identify
Investigate
Mitigate
Improve
- Describe SIEM
- Describe the purpose of security orchestration, automation, and response (SOAR)
- Describe the analysis tools used to detect evidence of a security compromise
- Describe how to collect security data for analysis
- Describe the use of analysis tools within a security operations environment
- Describe the responsibilities of a security operations engineering team
- Describe the Cortex platform in a security operations environment and the purpose of Cortex XDR for various endpoints
- Describe how Cortex XSOAR improves security operations efficiency
- Describe how Cortex Data Lake improves security operations visibility
- Describe how XSIAM can be used to accelerate SOC threat response