Describe the cyber-attack lifecycle and recognize common forms of attack
Describe PAN-OS® threat prevention capabilities
Use firewall logs and reports to make better configuration decisions
Configure the firewall to detect, block, and record threats
