Describe the cyber-attack lifecycle and recognize common forms of attack

Describe PAN-OS® threat prevention capabilities

Use firewall logs and reports to make better configuration decisions

Configure the firewall to detect, block, and record threats