Onemind Services Partner with Training World 360 for our training delivery and Lab delivery is Backed up our Partner Cloudmylab.

Implementing Cisco IOS Network Security**CCNA Security** (IINS v3.0)

Overview/Objective


Upon completing this course, you will be able to:

2
    3
  • Understand Cisco Identity Services Engine architecture and access control capabilities
  • 4
  • Understand 802.1X architecture, implementation and operation
  • 5
  • Understand commonly implemented Extensible Authentication Protocols (EAP)
  • 6
  • Implement Public-Key Infrastructure with ISE
  • 7
  • Understand the implement Internal and External authentication databases
  • 8
  • Implement MAC Authentication Bypass
  • 9
  • Implement identity based authorization policies
  • 10
  • Understand Cisco TrustSec features
  • 11
  • Implement Web Authentication and Guest Access
  • 12
  • Implement ISE Posture service
  • 13
  • Implement ISE Profiling
  • 14
  • Understand Bring Your Own Device (BYOD) with ISE
  • 15
  • Troubleshoot ISE
  • 16 Become even more productive with the Pro HTML Editor No ads and limitations Save your settings More features: Custom CSS Auxiliary editor Tag manager Tag and tag attribute filters Purchase The Pro HTML Editor License! Online HTML Editor The best real-time online HTML editor software kit with dynamic instant live visual preview and inline WYSIWYG editor using CKEditor and markup clean-up feature. Includes a HTML viewer, editor, compressor, beautifier and easy formatter. It's impossible to create invalid code with this tool. How To Use The HTML Editor? The operation of this HTML editor with built-in HTML Cleaner is very intuitive and it's working in your browser without installing any additional program. Compose your text using the WYSIWYG editor on the left and adjust formatting of the source code on the right. To convert Microsoft Word, PDF or any other rich-text documents to HTML, simply paste it in the visual editor. Perform bulk operations on the HTML code by clicking the Clean button after adjusting the settings. Before you start composing the content for a live website I advise you to experiment with the features populating the work area with a demo text clicking the Quick Tourmenu item. The visual editor works like a regular text composer program, just use the commands above the text area to adjust the content and in the meantime you'll notice the source editor changing with it. If you're familiar with HTML code composing then you can adjust the code on the right. What Can You Do With This Online WYSIWYG Editor The control panel above the HTML source editor lists the most important commands: – Revert the text back to the state before the cleaning or execution of any other major event. The visual editor has its own Undo button. – The fresh page command starts a new document. The same feature is listed below File / New document. – Deleting the new lines from the HTML code you can compress the source code. – Define replacement rules and execute them. Use the plus button to define new rules and the recycle bin to remove one. – Fill the page with meaningless writing to fill gaps or experiment with the layout. – Pick a color from the palette and use them with the easy Click and Copy feature. Save the active colors for later use or use the advanced color mixer by RGBColorCode.com – Activate automatic scroll. The two editors will scroll together when this option is enabled. – Adjust the font size according to your preferences. – Set up the cleaning options here. Your settings will not be lost when you leave the website. Click the header to select/disable all options. Clean – Execute all options that are checked in the settings (see gear icon above). Other important editing features You can try these HTML editor features to practice and to maximize your coding efficiency. Document converter – To convert any visual document like Excel, PDF, Word to HTML just paste the doc in the visual editor and the markup will show up instantly on the right. Online text editor – Compose documents, just like in a rich text editor. Use the control panel to include images, tables, headings, lists and other items to your paper. Copy - paste – The editor won't allow you to save the documents. For this you have to copy your generated code into a blank text file, change its extension to .html and open it in a web browser. Work with tables – Using the WYSIWYG editor panel you can create a table of any dimmension in only 2 clicks. There's a cleaning option to convert them to styled DIV tags. Undo – Both editors have this function which allows to revert back the document to a previous state, ie. before the cleaning has been performed. Interactive demo – Take a 4-step tour going through the features clicking the Quick Tour menu item. Learn how to use the redactor and experiment with the demo text. Never forget: Have a backup before using this tool to make sure you can always revert back to your original document. Always check your code before publishing on a live website. This editor never saves or sends out your document, all operations are performed on your local computer. Like most websites, this one uses cookies. Div Table Styling Make sure you apply the CSS code below when you publish tables converted to div elements. Try the interactive online table stylerwhich can generate grids from both div and table elements. These are both supported by this editor. Please note that the class names used by us are slightly different than the ones used by DivTable.com. .rTable { display: table; width: 100%;} .rTableRow { display: table-row; } .rTableHeading { background-color: #ddd; display: table-header-group; } .rTableCell, .rTableHead { display: table-cell; padding: 3px 10px; border: 1px solid #999999; } .rTableHeading { display: table-header-group; background-color: #ddd; font-weight: bold; } .rTableFoot { display: table-footer-group; font-weight: bold; background-color: #ddd; } .rTableBody { display: table-row-group; }




    Course outline


    Module 1: Threat Mitigation Through Identity Services



    • Lesson 1: Identity Services

    • Lesson 2: 802.1X and EAP

    • Lesson 3: Identity System Quick Start

    • Lesson 4: Module Summary


    Module 2: Cisco Identity Services Engine (ISE) Fundamentals



    • Lesson 1: Cisco ISE Overview

    • Lesson 2: Cisco ISE with PKI

    • Lesson 3: Cisco ISE Authentication

    • Lesson 4: Configuring Cisco ISE for External Authentication

    • Lesson 5: Module Summary


    Module 3: Advanced Access Control



    • Lesson 1: Certificate-based User Authentication

    • Lesson 2: Authorization

    • Lesson 3: Security Group Access (SGA) and MACsec Implementation

    • Lesson 4: Module Summary


    Module 4: Web Authentication and Guest Access



    • Lesson 1: Describe the Cisco Email Security Solutions

    • Lesson 2: Guest Access Services

    • Lesson 3: Summary


    Module 5: Endpoint Access Control Enhancements



    • Lesson 1: Posture

    • Lesson 2: Profiler

    • Lesson 3: BYOD

    • Lesson 4: Summary


    Module 6: Troubleshooting Network Access Control



    • Lesson 1: Troubleshooting Network Access Control

    • Lesson 2: Summary




    Audience and Prerequisites


    Audience





    • Channel Partners

    • Customers

    • Employees


    Prerequisites


    The knowledge and skills that a learner must have before attending this course are as follows:



    • Cisco Certified Network Associate (CCNA) certification

    • Cisco Certified Network Associate (CCNA) Security certification

    • Knowledge of Microsoft Windows operating system








    Delivery Method


    Web-Based ILT Duration 5 Days





    Implementing Cisco Edge Network Security Solutions**Part of the CCNP Security certification track** (SENSS v1.0)

    Overview/Objective


    After completing this course the student should be able to:



    • Describe and implement Cisco Web Security Appliance

    • Describe and implement Cloud Web Security

    • Describe and implement Cisco Email Security Appliance

    • Describe and implement Advanced Malware Protection

    • Describe and implement Cisco FirePOWER Next-Generation IPS

    • Describe and implement Cisco ASA FirePOWER Services Module




    Course outline


    Module 1: Cisco Web Security Appliance

    • Lesson 1: Describing the Cisco Web Security Appliance Solutions

      • Cisco Modular Network Architecture and Cisco WSA

      • Cisco WSA Overview

      • Cisco WSA Architecture

      • Cisco WSA Malware Detection and Protection

      • Cisco Web-Based Reputation Score

      • Cisco WSA Acceptable Use Policy Enforcement

      • Cisco WSA GUI Management

      • Cisco WSA Committing the Configuration Changes

      • Cisco WSA Policy Types Overview

      • Cisco WSA Access Policies

      • Cisco WSA Identity: To Whom Does This Policy Apply?

      • Cisco WSA Identity Example

      • Cisco WSA Policy Assignment Using Identity

      • Cisco WSA Identity and Authentication

      • Cisco WSA Policy Trace Tool

      • Challenge



    • Lesson 2: Integrating the Cisco Web Security Appliance

      • Explicit vs. Transparent Proxy Mode

      • Explicit Proxy Mode

      • PAC Files

      • PAC File Deployment Options

      • PAC File Hosting on Cisco WSA

      • Traffic Redirection In Transparent Mode

      • Connecting the Cisco WSA to a WCCP Router

      • Verifying WCCP

      • Challenge



    • Lesson 3: Configuring Cisco Web Security Appliance Identities and User Authentication Controls

      • Configure Identities to Group Client Transactions

      • Configure Policy Groups

      • The Need for User Authentication

      • Authentication Protocols and Schemes

      • Basic Authentication in Explicit Proxy and Transparent Proxy Mode

      • Configure Realms and Realm Sequences

      • Configure NTLM Realm for Active Directory

      • Join Cisco WSA to Active Directory

      • Configure Global Authentication Settings

      • Configure an Identity to Require Authentication (Basic or NTLMSSP)

      • Configure an Identity to Require Transparent User Identification

      • Configure LDAP Realm for LDAP Servers

      • Define How User Information Is Stored in LDAP

      • Bind Cisco WSA to the LDAP Directory

      • LDAP Group Authorization

      • Allowing Guest Access to Users Who Fail Authentication

      • Testing Authentication Settings

      • Authenticated Users in Reports

      • Challenge



    • Lesson 4: Configuring Cisco Web Security Appliance Acceptable Use Controls

      • Acceptable Use Controls

      • URL Categorizing Process

      • Application Visibility and Control Overview

      • Streaming Media Bandwidth Control Overview

      • Enable Acceptable Use Controls

      • Using the Policies Table

      • Configure URL Filtering

      • Enable Safe Search and Site Content Ratings

      • Configure Custom URL Categories

      • URL Category Reports

      • Configuring AVC

      • Configure Media Bandwidth Limits

      • AVC Reports

      • Challenge



    • Lesson 5: Configuring Cisco Web Security Appliance Anti-Malware Controls

      • Dynamic Vectoring and Streaming Engine Overview

      • Contrast Webroot with Sophos or McAfee Malware Scanning

      • Adaptive Scanning Overview

      • Web Reputation Filtering Overview

      • Enable Web Reputation Filtering, Adaptive Scanning and Malware Scanning

      • Configure Inbound Web Reputation Filtering and Malware Scanning

      • Configure Outbound Malware Scanning

      • Malware Reports

      • Challenge



    • Lesson 6: Configuring Cisco Web Security Appliance Decryption

      • HTTPS Proxy Operations Overview

      • Enable HTTPS Proxy

      • Invalid Destination Web Server Certificate Handling

      • Configure Decryption Policies

      • Challenge



    • Lesson 7: Configuring Cisco Web Security Appliance Data Security Controls

      • Cisco WSA Data Security Overview

      • Data Security Policies

      • Control Uploaded Content

      • External Data Loss Prevention

      • Add an ICAP Server

      • Challenge




    Module 2: Cisco Cloud Web Security



    • Lesson 1: Describing the Cisco Cloud Web Security Solutions

      • Cisco Modular Network Architecture and Cisco Cloud Web Security (CWS)

      • Cisco Cloud Web Security Overview

      • Cisco Cloud Web Security Traffic Flow Overview

      • Cisco Cloud Web Security URL Filtering, AVC, and Reporting Features Overview

      • Cisco Cloud Web Security Scanning Processes and Day Zero Outbreak Intelligence Overview

      • Cisco ScanCenter Overview

      • Challenge



    • Lesson 2: Configuring Cisco Cloud Web Security Connectors

      • Cisco Cloud Web Security Traffic Redirection Overview

      • Cisco Cloud Web Security Authentication Key

      • Authentication Key Generation from the Cisco ScanCenter

      • Verifying Traffic Redirection to CWS Using Special URL

      • Cisco ASA Cloud Web Security Overview

      • Cisco ASA Cloud Web Security Basic Configuration Using ASDM

      • Cisco ASA Cloud Web Security Basic Configuration Using the CLI

      • Cisco ASA Cloud Web Security Configuration with the Whitelist and Identity Options Using the CLI

      • Verifying Cisco ASA Cloud Web Security Operations Using the Cisco ASDM

      • Verifying Cisco ASA Cloud Web Security Operations Using the CLI

      • Cisco AnyConnect Web Security Module Overview

      • Cisco AnyConnect Web Security Module for Standalone Use Overview

      • Configure Cisco AnyConnect Web Security Module for Standalone Use

      • Configure Cisco ASA to Download the Web Security Module to the Client Machine

      • Verifying Cisco AnyConnect Web Security Module Operations

      • Cisco ISR G2 Cloud Web Security Overview

      • Cisco ISR G2 Cloud Web Security Configuration

      • Cisco ISR G2 Cloud Web Security Verification

      • Cisco WSA Cloud Web Security Overview

      • Challenge



    • Lesson 3: Describing the Web Filtering Policy in Cisco ScanCenter

      • ScanCenter Web Filtering Policy Overview

      • ScanCenter Web Filtering Policy Configuration HTTPS Inspection Configuration Overview

      • ScanCenter Web Filtering Verification

      • ScanCenter Web Filtering Reporting

      • Challenge




    Module 3: Cisco Email Security Appliance



    • Lesson 1: Describing the Cisco Email Security Solutions

      • Cisco Modular Network Architecture and Cisco ESA

      • Cisco Hybrid Email Security Solution Overview

      • SMTP Terminologies

      • SMTP Flow

      • SMTP Conversation

      • Cisco ESA Services Overview

      • Cisco ESA GUI Management

      • Cisco ESA Committing the Configuration Changes

      • Cisco ESA Licensing

      • Incoming Mail Processing Overview

      • Outgoing Mail Processing Overview

      • Cisco ESA LDAP Integration Overview

      • Cisco Registered Envelope Service (CRES) Overview

      • Challenge



    • Lesson 2: Describing the Cisco Email Security Appliance Basic Setup Components

      • Cisco ESA Listener Overview

      • Cisco ESA Listener Type: Private and Public

      • Cisco ESA One Interface/One Listener Deployment Example

      • Cisco ESA Two Interfaces/Two Listeners Deployment Example

      • Cisco ESA Listener Major Components: HAT and RAT

      • Cisco ESA One Listener Deployment Scenario

      • One Listener Deployment Scenario: Interfaces and Listener

      • One Listener Deployment Scenario: LDAP Accept Query

      • One Listener Deployment Scenario: HAT

      • One Listener Deployment Scenario: HAT > Sender Group

      • One Listener Deployment Scenario: HAT > Sender Group SBRS

      • One Listener Deployment Scenario: HAT > BLACKLIST Sender Group

      • One Listener Deployment Scenario: HAT > RELAYLIST Sender Group

      • One Listener Deployment Scenario: HAT > Add Sender Group

      • One Listener Deployment Scenario: HAT > Mail Flow Policy

      • One Listener Deployment Scenario: HAT > Mail Flow Policy > Anti-Spam and Anti-Virus

      • One Listener Deployment Scenario: HAT > Mail Flow Policies Summary

      • One Listener Deployment Scenario: RAT

      • One Listener Deployment Scenario: SMTP Routes

      • One Listener Deployment Scenario: Email Relaying on Internal Mail Server

      • Challenge



    • Lesson 3: Configuring Cisco Email Security Appliance Basic Incoming and Outgoing Mail Policies

      • Cisco ESA Incoming and Outgoing Mail Policies Overview

      • Cisco ESA Mail Policies Matching

      • Anti-Spam Overview

      • Anti-Spam Configuration

      • Spam Quarantine Configuration

      • Policy, Virus, Outbreak Quarantines Configuration

      • Anti-Virus Overview

      • Anti-Virus Configuration

      • Content Filters Overview

      • Content Filters Configuration

      • Outbreak Filters Overview

      • Outbreak Filters Configuration

      • Data Loss Prevention Overview

      • Data Loss Prevention Configuration

      • Reporting Overview

      • Message Tracking

      • Trace

      • Challenge




    Module 4: Advanced Malware Protection for Endpoints



    • Lesson 1: AMP for Endpoints Overview and Architecture

      • Modern Malware

      • Why Defenses Fail

      • Introduction to AMP for Endpoints

      • AMP for Endpoints Architecture

      • AMP Connector Architecture

      • Installation Components

      • How AMP Connector Components Interact

      • The Role of the AMP Cloud

      • Transaction Processing

      • Additional Transaction Processing

      • Real-time Data Mining

      • Private Cloud Architecture

      • Private Cloud Modes

      • Cloud Proxy Mode Communications

      • Air Gap Mode

      • Challenge



    • Lesson 2: Customizing Detection and AMP Policy

      • Detection, Application Control, DFC Options, and IOCs

      • Endpoint Policy

      • Policy Modes

      • Simple Custom Detections

      • Creating A Simple Custom Detection

      • Application Blocking

      • Advanced Custom Signatures

      • Whitelisting

      • Android Custom Detections

      • DFC IP Blacklists and Whitelists

      • DFC IP Blacklists

      • DFC IP Whitelists

      • Configuring Exclusions

      • Custom Exclusion Sets

      • Challenge



    • Lesson 3: IOCs and IOC Scanning

      • Indications of Compromise (IOCs)

      • IOC Scanning

      • Customizing IOCs

      • Challenge



    • Lesson 4: Deploying AMP Connectors

      • Groups

      • Creating Groups

      • Deploying Windows Connectors

      • Direct Download Deployment

      • Creating the Installer (Public Cloud)

      • Email Deployment

      • Microsoft Windows Installation and Interface

      • Connectivity Considerations

      • Command-Line Installation

      • Challenge



    • Lesson 5: AMP Analysis Tools

      • Event View Filters

      • Events List

      • Event Detail: File Detection

      • Event Detail: Connector Info

      • Event Detail: Comments

      • File Analysis

      • The File Analysis Page

      • File Analysis Results

      • File Repository

      • Trajectory

      • File Trajectory Page

      • Device Trajectory

      • Device Trajectory Filters and Search

      • Prevalence

      • Vulnerable Software

      • Reporting

      • Creating a Report

      • Challenge




    Module 5: Cisco FirePOWER Next-Generation IPS



    • Lesson 1: Describing the Cisco FireSIGHT System

      • Cisco FireSIGHT System Overview

      • Cisco FirePOWER NGIPS and NGFW

      • Cisco FireSIGHT System Detection and Architecture

      • Cisco FireSIGHT System Components

      • Cisco FireSIGHT System Device Configuration

      • Traffic Flows

      • Challenge



    • Lesson 2: Configuring and Managing Cisco FirePOWER Devices

      • Introduction to Device Management

      • Interfaces Tab

      • Virtual Device Configuration

      • Static Route Configuration

      • Object Management

      • Challenge



    • Lesson 3: Implementing an Access Control Policy

      • Access Control Policy Overview

      • Access Control Policy Configuration

      • Default Action

      • Targets Tab

      • Security Intelligence

      • HTTP Responses

      • Advanced Tab

      • Access Control Policy Rules

      • Rule Constraints Overview

      • Save and Apply the Access Control Policy

      • Challenge



    • Lesson 4: Understanding Discovery Technology

      • Introduction to Host Discovery

      • Network Discovery Policy

      • Discovery Overview

      • Challenge



    • Lesson 5: Configuring File-Type and Network Malware Detection

      • Introduction to Network-Based Malware Detection

      • Network-Based Malware Detection Overview

      • File Dispositions

      • Important Network-Based Malware Detection Concepts

      • Retrospective Event Overview

      • Cisco FireSIGHT File-Type Detection Architecture

      • Cisco FireSIGHT Malware Detection Architecture

      • File Disposition Caching

      • File Lists

      • File Policy

      • Challenge



    • Lesson 6: Managing SSL Traffic with Cisco FireSIGHT

      • SSL Traffic Management Overview

      • SSL Inspection Architecture

      • Cisco FireSIGHT SSL Inspection

      • SSL Policy

      • Challenge



    • Lesson 7: Describing IPS Policy and Configuration Concepts

      • Introduction to IPS Policy

      • Policy Layering Model

      • Rule Management

      • Cisco FireSIGHT Rule Recommendations

      • IPS Policy Layering

      • Challenge



    • Lesson 8: Describing the Network Analysis Policy

      • Network Analysis Policy Introduction

      • Network Analysis Policy Customization

      • Preprocessors

      • Network Analysis Policy Configuration

      • Network Analysis Policy Creation

      • Preprocessor Configuration

      • Challenge



    • Lesson 9: Creating Reports

      • Reporting System Overview

      • Report Templates

      • Report Sections

      • Advanced Settings

      • Challenge



    • Lesson 10: Describing Correlation Rules and Policies

      • Correlation Policies Overview

      • Correlation Policy Responses

      • Remediations Configuration

      • Remediation Module Configuration

      • Correlation Policy Rules

      • Correlation Policies Overview

      • Correlation Events

      • Whitelists Overview

      • Whitelist Events and Violations

      • Traffic Profiles Overview

      • Traffic Profiles in Correlation Policies

      • Challenge



    • Lesson 11: Understanding Basic Rule Syntax and Usage

      • Basic Snort Rule Structure

      • Snort Rule Headers

      • Snort Rule Bodies

      • Challenge




    Module 6: Cisco ASA FirePOWER Services Module



    • Lesson 1: Installing Cisco ASA 5500-X Series FirePOWER Services (SFR) Module

      • Cisco ASA FirePOWER Services (SFR) Module Overview

      • Cisco FireSIGHT Management Center Overview

      • Cisco ASA FirePOWER Services Software Module Management Interface

      • Cisco ASA FirePOWER Services Module Package Installation

      • Cisco ASA FirePOWER Services Module Verification

      • Redirect Traffic to Cisco ASA FirePOWER Services Module

      • Challenge







    Audience and Prerequisites


    Audience



    • Channel Partners

    • Customers

    • Employees


    Prerequisites


    The knowledge and skills that a learner must have before attending this course are as follows:



    • Cisco Certified Network Associate (CCNA) certification

    • Cisco Certified Network Associate (CCNA) Security certification

    • Knowledge of Microsoft Windows operating system




    Delivery Method


    Web-Based ILT Duration 5 Days





    Implementing Cisco Secure Mobility Solutions**Part of the CCNP Security certification track** (SIMOS v1.0)

    Overview/Objective


    After completing this course the student should be able to:



    • Describe and implement Cisco Web Security Appliance

    • Describe and implement Cloud Web Security

    • Describe and implement Cisco Email Security Appliance

    • Describe and implement Advanced Malware Protection

    • Describe and implement Cisco FirePOWER Next-Generation IPS

    • Describe and implement Cisco ASA FirePOWER Services Module




    Course outline


    Module 1: Cisco Web Security Appliance

    • Lesson 1: Describing the Cisco Web Security Appliance Solutions

      • Cisco Modular Network Architecture and Cisco WSA

      • Cisco WSA Overview

      • Cisco WSA Architecture

      • Cisco WSA Malware Detection and Protection

      • Cisco Web-Based Reputation Score

      • Cisco WSA Acceptable Use Policy Enforcement

      • Cisco WSA GUI Management

      • Cisco WSA Committing the Configuration Changes

      • Cisco WSA Policy Types Overview

      • Cisco WSA Access Policies

      • Cisco WSA Identity: To Whom Does This Policy Apply?

      • Cisco WSA Identity Example

      • Cisco WSA Policy Assignment Using Identity

      • Cisco WSA Identity and Authentication

      • Cisco WSA Policy Trace Tool

      • Challenge



    • Lesson 2: Integrating the Cisco Web Security Appliance

      • Explicit vs. Transparent Proxy Mode

      • Explicit Proxy Mode

      • PAC Files

      • PAC File Deployment Options

      • PAC File Hosting on Cisco WSA

      • Traffic Redirection In Transparent Mode

      • Connecting the Cisco WSA to a WCCP Router

      • Verifying WCCP

      • Challenge



    • Lesson 3: Configuring Cisco Web Security Appliance Identities and User Authentication Controls

      • Configure Identities to Group Client Transactions

      • Configure Policy Groups

      • The Need for User Authentication

      • Authentication Protocols and Schemes

      • Basic Authentication in Explicit Proxy and Transparent Proxy Mode

      • Configure Realms and Realm Sequences

      • Configure NTLM Realm for Active Directory

      • Join Cisco WSA to Active Directory

      • Configure Global Authentication Settings

      • Configure an Identity to Require Authentication (Basic or NTLMSSP)

      • Configure an Identity to Require Transparent User Identification

      • Configure LDAP Realm for LDAP Servers

      • Define How User Information Is Stored in LDAP

      • Bind Cisco WSA to the LDAP Directory

      • LDAP Group Authorization

      • Allowing Guest Access to Users Who Fail Authentication

      • Testing Authentication Settings

      • Authenticated Users in Reports

      • Challenge



    • Lesson 4: Configuring Cisco Web Security Appliance Acceptable Use Controls

      • Acceptable Use Controls

      • URL Categorizing Process

      • Application Visibility and Control Overview

      • Streaming Media Bandwidth Control Overview

      • Enable Acceptable Use Controls

      • Using the Policies Table

      • Configure URL Filtering

      • Enable Safe Search and Site Content Ratings

      • Configure Custom URL Categories

      • URL Category Reports

      • Configuring AVC

      • Configure Media Bandwidth Limits

      • AVC Reports

      • Challenge



    • Lesson 5: Configuring Cisco Web Security Appliance Anti-Malware Controls

      • Dynamic Vectoring and Streaming Engine Overview

      • Contrast Webroot with Sophos or McAfee Malware Scanning

      • Adaptive Scanning Overview

      • Web Reputation Filtering Overview

      • Enable Web Reputation Filtering, Adaptive Scanning and Malware Scanning

      • Configure Inbound Web Reputation Filtering and Malware Scanning

      • Configure Outbound Malware Scanning

      • Malware Reports

      • Challenge



    • Lesson 6: Configuring Cisco Web Security Appliance Decryption

      • HTTPS Proxy Operations Overview

      • Enable HTTPS Proxy

      • Invalid Destination Web Server Certificate Handling

      • Configure Decryption Policies

      • Challenge



    • Lesson 7: Configuring Cisco Web Security Appliance Data Security Controls

      • Cisco WSA Data Security Overview

      • Data Security Policies

      • Control Uploaded Content

      • External Data Loss Prevention

      • Add an ICAP Server

      • Challenge




    Module 2: Cisco Cloud Web Security



    • Lesson 1: Describing the Cisco Cloud Web Security Solutions

      • Cisco Modular Network Architecture and Cisco Cloud Web Security (CWS)

      • Cisco Cloud Web Security Overview

      • Cisco Cloud Web Security Traffic Flow Overview

      • Cisco Cloud Web Security URL Filtering, AVC, and Reporting Features Overview

      • Cisco Cloud Web Security Scanning Processes and Day Zero Outbreak Intelligence Overview

      • Cisco ScanCenter Overview

      • Challenge



    • Lesson 2: Configuring Cisco Cloud Web Security Connectors

      • Cisco Cloud Web Security Traffic Redirection Overview

      • Cisco Cloud Web Security Authentication Key

      • Authentication Key Generation from the Cisco ScanCenter

      • Verifying Traffic Redirection to CWS Using Special URL

      • Cisco ASA Cloud Web Security Overview

      • Cisco ASA Cloud Web Security Basic Configuration Using ASDM

      • Cisco ASA Cloud Web Security Basic Configuration Using the CLI

      • Cisco ASA Cloud Web Security Configuration with the Whitelist and Identity Options Using the CLI

      • Verifying Cisco ASA Cloud Web Security Operations Using the Cisco ASDM

      • Verifying Cisco ASA Cloud Web Security Operations Using the CLI

      • Cisco AnyConnect Web Security Module Overview

      • Cisco AnyConnect Web Security Module for Standalone Use Overview

      • Configure Cisco AnyConnect Web Security Module for Standalone Use

      • Configure Cisco ASA to Download the Web Security Module to the Client Machine

      • Verifying Cisco AnyConnect Web Security Module Operations

      • Cisco ISR G2 Cloud Web Security Overview

      • Cisco ISR G2 Cloud Web Security Configuration

      • Cisco ISR G2 Cloud Web Security Verification

      • Cisco WSA Cloud Web Security Overview

      • Challenge



    • Lesson 3: Describing the Web Filtering Policy in Cisco ScanCenter

      • ScanCenter Web Filtering Policy Overview

      • ScanCenter Web Filtering Policy Configuration HTTPS Inspection Configuration Overview

      • ScanCenter Web Filtering Verification

      • ScanCenter Web Filtering Reporting

      • Challenge




    Module 3: Cisco Email Security Appliance



    • Lesson 1: Describing the Cisco Email Security Solutions

      • Cisco Modular Network Architecture and Cisco ESA

      • Cisco Hybrid Email Security Solution Overview

      • SMTP Terminologies

      • SMTP Flow

      • SMTP Conversation

      • Cisco ESA Services Overview

      • Cisco ESA GUI Management

      • Cisco ESA Committing the Configuration Changes

      • Cisco ESA Licensing

      • Incoming Mail Processing Overview

      • Outgoing Mail Processing Overview

      • Cisco ESA LDAP Integration Overview

      • Cisco Registered Envelope Service (CRES) Overview

      • Challenge



    • Lesson 2: Describing the Cisco Email Security Appliance Basic Setup Components

      • Cisco ESA Listener Overview

      • Cisco ESA Listener Type: Private and Public

      • Cisco ESA One Interface/One Listener Deployment Example

      • Cisco ESA Two Interfaces/Two Listeners Deployment Example

      • Cisco ESA Listener Major Components: HAT and RAT

      • Cisco ESA One Listener Deployment Scenario

      • One Listener Deployment Scenario: Interfaces and Listener

      • One Listener Deployment Scenario: LDAP Accept Query

      • One Listener Deployment Scenario: HAT

      • One Listener Deployment Scenario: HAT > Sender Group

      • One Listener Deployment Scenario: HAT > Sender Group SBRS

      • One Listener Deployment Scenario: HAT > BLACKLIST Sender Group

      • One Listener Deployment Scenario: HAT > RELAYLIST Sender Group

      • One Listener Deployment Scenario: HAT > Add Sender Group

      • One Listener Deployment Scenario: HAT > Mail Flow Policy

      • One Listener Deployment Scenario: HAT > Mail Flow Policy > Anti-Spam and Anti-Virus

      • One Listener Deployment Scenario: HAT > Mail Flow Policies Summary

      • One Listener Deployment Scenario: RAT

      • One Listener Deployment Scenario: SMTP Routes

      • One Listener Deployment Scenario: Email Relaying on Internal Mail Server

      • Challenge



    • Lesson 3: Configuring Cisco Email Security Appliance Basic Incoming and Outgoing Mail Policies

      • Cisco ESA Incoming and Outgoing Mail Policies Overview

      • Cisco ESA Mail Policies Matching

      • Anti-Spam Overview

      • Anti-Spam Configuration

      • Spam Quarantine Configuration

      • Policy, Virus, Outbreak Quarantines Configuration

      • Anti-Virus Overview

      • Anti-Virus Configuration

      • Content Filters Overview

      • Content Filters Configuration

      • Outbreak Filters Overview

      • Outbreak Filters Configuration

      • Data Loss Prevention Overview

      • Data Loss Prevention Configuration

      • Reporting Overview

      • Message Tracking

      • Trace

      • Challenge




    Module 4: Advanced Malware Protection for Endpoints



    • Lesson 1: AMP for Endpoints Overview and Architecture

      • Modern Malware

      • Why Defenses Fail

      • Introduction to AMP for Endpoints

      • AMP for Endpoints Architecture

      • AMP Connector Architecture

      • Installation Components

      • How AMP Connector Components Interact

      • The Role of the AMP Cloud

      • Transaction Processing

      • Additional Transaction Processing

      • Real-time Data Mining

      • Private Cloud Architecture

      • Private Cloud Modes

      • Cloud Proxy Mode Communications

      • Air Gap Mode

      • Challenge



    • Lesson 2: Customizing Detection and AMP Policy

      • Detection, Application Control, DFC Options, and IOCs

      • Endpoint Policy

      • Policy Modes

      • Simple Custom Detections

      • Creating A Simple Custom Detection

      • Application Blocking

      • Advanced Custom Signatures

      • Whitelisting

      • Android Custom Detections

      • DFC IP Blacklists and Whitelists

      • DFC IP Blacklists

      • DFC IP Whitelists

      • Configuring Exclusions

      • Custom Exclusion Sets

      • Challenge



    • Lesson 3: IOCs and IOC Scanning

      • Indications of Compromise (IOCs)

      • IOC Scanning

      • Customizing IOCs

      • Challenge



    • Lesson 4: Deploying AMP Connectors

      • Groups

      • Creating Groups

      • Deploying Windows Connectors

      • Direct Download Deployment

      • Creating the Installer (Public Cloud)

      • Email Deployment

      • Microsoft Windows Installation and Interface

      • Connectivity Considerations

      • Command-Line Installation

      • Challenge



    • Lesson 5: AMP Analysis Tools

      • Event View Filters

      • Events List

      • Event Detail: File Detection

      • Event Detail: Connector Info

      • Event Detail: Comments

      • File Analysis

      • The File Analysis Page

      • File Analysis Results

      • File Repository

      • Trajectory

      • File Trajectory Page

      • Device Trajectory

      • Device Trajectory Filters and Search

      • Prevalence

      • Vulnerable Software

      • Reporting

      • Creating a Report

      • Challenge




    Module 5: Cisco FirePOWER Next-Generation IPS



    • Lesson 1: Describing the Cisco FireSIGHT System

      • Cisco FireSIGHT System Overview

      • Cisco FirePOWER NGIPS and NGFW

      • Cisco FireSIGHT System Detection and Architecture

      • Cisco FireSIGHT System Components

      • Cisco FireSIGHT System Device Configuration

      • Traffic Flows

      • Challenge



    • Lesson 2: Configuring and Managing Cisco FirePOWER Devices

      • Introduction to Device Management

      • Interfaces Tab

      • Virtual Device Configuration

      • Static Route Configuration

      • Object Management

      • Challenge



    • Lesson 3: Implementing an Access Control Policy

      • Access Control Policy Overview

      • Access Control Policy Configuration

      • Default Action

      • Targets Tab

      • Security Intelligence

      • HTTP Responses

      • Advanced Tab

      • Access Control Policy Rules

      • Rule Constraints Overview

      • Save and Apply the Access Control Policy

      • Challenge



    • Lesson 4: Understanding Discovery Technology

      • Introduction to Host Discovery

      • Network Discovery Policy

      • Discovery Overview

      • Challenge



    • Lesson 5: Configuring File-Type and Network Malware Detection

      • Introduction to Network-Based Malware Detection

      • Network-Based Malware Detection Overview

      • File Dispositions

      • Important Network-Based Malware Detection Concepts

      • Retrospective Event Overview

      • Cisco FireSIGHT File-Type Detection Architecture

      • Cisco FireSIGHT Malware Detection Architecture

      • File Disposition Caching

      • File Lists

      • File Policy

      • Challenge



    • Lesson 6: Managing SSL Traffic with Cisco FireSIGHT

      • SSL Traffic Management Overview

      • SSL Inspection Architecture

      • Cisco FireSIGHT SSL Inspection

      • SSL Policy

      • Challenge



    • Lesson 7: Describing IPS Policy and Configuration Concepts

      • Introduction to IPS Policy

      • Policy Layering Model

      • Rule Management

      • Cisco FireSIGHT Rule Recommendations

      • IPS Policy Layering

      • Challenge



    • Lesson 8: Describing the Network Analysis Policy

      • Network Analysis Policy Introduction

      • Network Analysis Policy Customization

      • Preprocessors

      • Network Analysis Policy Configuration

      • Network Analysis Policy Creation

      • Preprocessor Configuration

      • Challenge



    • Lesson 9: Creating Reports

      • Reporting System Overview

      • Report Templates

      • Report Sections

      • Advanced Settings

      • Challenge



    • Lesson 10: Describing Correlation Rules and Policies

      • Correlation Policies Overview

      • Correlation Policy Responses

      • Remediations Configuration

      • Remediation Module Configuration

      • Correlation Policy Rules

      • Correlation Policies Overview

      • Correlation Events

      • Whitelists Overview

      • Whitelist Events and Violations

      • Traffic Profiles Overview

      • Traffic Profiles in Correlation Policies

      • Challenge



    • Lesson 11: Understanding Basic Rule Syntax and Usage

      • Basic Snort Rule Structure

      • Snort Rule Headers

      • Snort Rule Bodies

      • Challenge




    Module 6: Cisco ASA FirePOWER Services Module



    • Lesson 1: Installing Cisco ASA 5500-X Series FirePOWER Services (SFR) Module

      • Cisco ASA FirePOWER Services (SFR) Module Overview

      • Cisco FireSIGHT Management Center Overview

      • Cisco ASA FirePOWER Services Software Module Management Interface

      • Cisco ASA FirePOWER Services Module Package Installation

      • Cisco ASA FirePOWER Services Module Verification

      • Redirect Traffic to Cisco ASA FirePOWER Services Module

      • Challenge







    Audience and Prerequisites


    Audience



    • Channel Partners

    • Customers

    • Employees


    Prerequisites


    The knowledge and skills that a learner must have before attending this course are as follows:



    • Cisco Certified Network Associate (CCNA) certification

    • Cisco Certified Network Associate (CCNA) Security certification

    • Knowledge of Microsoft Windows operating system




    Delivery Method


    Web-Based ILT Duration 5 Days





    Implementing Cisco Secure Access Solutions**Part of the CCNP Security certification track** (SISAS v1.0)

    Overview/Objective


    Upon completing this course, you will be able to:

    2
      3
    • Understand Cisco Identity Services Engine architecture and access control capabilities
    • 4
    • Understand 802.1X architecture, implementation and operation
    • 5
    • Understand commonly implemented Extensible Authentication Protocols (EAP)
    • 6
    • Implement Public-Key Infrastructure with ISE
    • 7
    • Understand the implement Internal and External authentication databases
    • 8
    • Implement MAC Authentication Bypass
    • 9
    • Implement identity based authorization policies
    • 10
    • Understand Cisco TrustSec features
    • 11
    • Implement Web Authentication and Guest Access
    • 12
    • Implement ISE Posture service
    • 13
    • Implement ISE Profiling
    • 14
    • Understand Bring Your Own Device (BYOD) with ISE
    • 15
    • Troubleshoot ISE
    • 16 Become even more productive with the Pro HTML Editor No ads and limitations Save your settings More features: Custom CSS Auxiliary editor Tag manager Tag and tag attribute filters Purchase The Pro HTML Editor License! Online HTML Editor The best real-time online HTML editor software kit with dynamic instant live visual preview and inline WYSIWYG editor using CKEditor and markup clean-up feature. Includes a HTML viewer, editor, compressor, beautifier and easy formatter. It's impossible to create invalid code with this tool. How To Use The HTML Editor? The operation of this HTML editor with built-in HTML Cleaner is very intuitive and it's working in your browser without installing any additional program. Compose your text using the WYSIWYG editor on the left and adjust formatting of the source code on the right. To convert Microsoft Word, PDF or any other rich-text documents to HTML, simply paste it in the visual editor. Perform bulk operations on the HTML code by clicking the Clean button after adjusting the settings. Before you start composing the content for a live website I advise you to experiment with the features populating the work area with a demo text clicking the Quick Tourmenu item. The visual editor works like a regular text composer program, just use the commands above the text area to adjust the content and in the meantime you'll notice the source editor changing with it. If you're familiar with HTML code composing then you can adjust the code on the right. What Can You Do With This Online WYSIWYG Editor The control panel above the HTML source editor lists the most important commands: – Revert the text back to the state before the cleaning or execution of any other major event. The visual editor has its own Undo button. – The fresh page command starts a new document. The same feature is listed below File / New document. – Deleting the new lines from the HTML code you can compress the source code. – Define replacement rules and execute them. Use the plus button to define new rules and the recycle bin to remove one. – Fill the page with meaningless writing to fill gaps or experiment with the layout. – Pick a color from the palette and use them with the easy Click and Copy feature. Save the active colors for later use or use the advanced color mixer by RGBColorCode.com – Activate automatic scroll. The two editors will scroll together when this option is enabled. – Adjust the font size according to your preferences. – Set up the cleaning options here. Your settings will not be lost when you leave the website. Click the header to select/disable all options. Clean – Execute all options that are checked in the settings (see gear icon above). Other important editing features You can try these HTML editor features to practice and to maximize your coding efficiency. Document converter – To convert any visual document like Excel, PDF, Word to HTML just paste the doc in the visual editor and the markup will show up instantly on the right. Online text editor – Compose documents, just like in a rich text editor. Use the control panel to include images, tables, headings, lists and other items to your paper. Copy - paste – The editor won't allow you to save the documents. For this you have to copy your generated code into a blank text file, change its extension to .html and open it in a web browser. Work with tables – Using the WYSIWYG editor panel you can create a table of any dimmension in only 2 clicks. There's a cleaning option to convert them to styled DIV tags. Undo – Both editors have this function which allows to revert back the document to a previous state, ie. before the cleaning has been performed. Interactive demo – Take a 4-step tour going through the features clicking the Quick Tour menu item. Learn how to use the redactor and experiment with the demo text. Never forget: Have a backup before using this tool to make sure you can always revert back to your original document. Always check your code before publishing on a live website. This editor never saves or sends out your document, all operations are performed on your local computer. Like most websites, this one uses cookies. Div Table Styling Make sure you apply the CSS code below when you publish tables converted to div elements. Try the interactive online table stylerwhich can generate grids from both div and table elements. These are both supported by this editor. Please note that the class names used by us are slightly different than the ones used by DivTable.com. .rTable { display: table; width: 100%;} .rTableRow { display: table-row; } .rTableHeading { background-color: #ddd; display: table-header-group; } .rTableCell, .rTableHead { display: table-cell; padding: 3px 10px; border: 1px solid #999999; } .rTableHeading { display: table-header-group; background-color: #ddd; font-weight: bold; } .rTableFoot { display: table-footer-group; font-weight: bold; background-color: #ddd; } .rTableBody { display: table-row-group; }




      Course outline


      Module 1: Threat Mitigation Through Identity Services



      • Lesson 1: Identity Services

      • Lesson 2: 802.1X and EAP

      • Lesson 3: Identity System Quick Start

      • Lesson 4: Module Summary


      Module 2: Cisco Identity Services Engine (ISE) Fundamentals



      • Lesson 1: Cisco ISE Overview

      • Lesson 2: Cisco ISE with PKI

      • Lesson 3: Cisco ISE Authentication

      • Lesson 4: Configuring Cisco ISE for External Authentication

      • Lesson 5: Module Summary


      Module 3: Advanced Access Control



      • Lesson 1: Certificate-based User Authentication

      • Lesson 2: Authorization

      • Lesson 3: Security Group Access (SGA) and MACsec Implementation

      • Lesson 4: Module Summary


      Module 4: Web Authentication and Guest Access



      • Lesson 1: Describe the Cisco Email Security Solutions

      • Lesson 2: Guest Access Services

      • Lesson 3: Summary


      Module 5: Endpoint Access Control Enhancements



      • Lesson 1: Posture

      • Lesson 2: Profiler

      • Lesson 3: BYOD

      • Lesson 4: Summary


      Module 6: Troubleshooting Network Access Control



      • Lesson 1: Troubleshooting Network Access Control

      • Lesson 2: Summary




      Audience and Prerequisites


      Audience





      • Channel Partners

      • Customers

      • Employees


      Prerequisites


      The knowledge and skills that a learner must have before attending this course are as follows:



      • Cisco Certified Network Associate (CCNA) certification

      • Cisco Certified Network Associate (CCNA) Security certification

      • Knowledge of Microsoft Windows operating system








      Delivery Method


      Web-Based ILT Duration 5 Days





      Implementing Cisco Threat Control Solutions**Part of the CCNP Security certification track** (SITCS v1.5)

      Overview/Objective


      After completing this course the student should be able to:



      • Describe and implement Cisco Web Security Appliance

      • Describe and implement Cloud Web Security

      • Describe and implement Cisco Email Security Appliance

      • Describe and implement Advanced Malware Protection

      • Describe and implement Cisco FirePOWER Next-Generation IPS

      • Describe and implement Cisco ASA FirePOWER Services Module




      Course outline


      Module 1: Cisco Web Security Appliance

      • Lesson 1: Describing the Cisco Web Security Appliance Solutions

        • Cisco Modular Network Architecture and Cisco WSA

        • Cisco WSA Overview

        • Cisco WSA Architecture

        • Cisco WSA Malware Detection and Protection

        • Cisco Web-Based Reputation Score

        • Cisco WSA Acceptable Use Policy Enforcement

        • Cisco WSA GUI Management

        • Cisco WSA Committing the Configuration Changes

        • Cisco WSA Policy Types Overview

        • Cisco WSA Access Policies

        • Cisco WSA Identity: To Whom Does This Policy Apply?

        • Cisco WSA Identity Example

        • Cisco WSA Policy Assignment Using Identity

        • Cisco WSA Identity and Authentication

        • Cisco WSA Policy Trace Tool

        • Challenge



      • Lesson 2: Integrating the Cisco Web Security Appliance

        • Explicit vs. Transparent Proxy Mode

        • Explicit Proxy Mode

        • PAC Files

        • PAC File Deployment Options

        • PAC File Hosting on Cisco WSA

        • Traffic Redirection In Transparent Mode

        • Connecting the Cisco WSA to a WCCP Router

        • Verifying WCCP

        • Challenge



      • Lesson 3: Configuring Cisco Web Security Appliance Identities and User Authentication Controls

        • Configure Identities to Group Client Transactions

        • Configure Policy Groups

        • The Need for User Authentication

        • Authentication Protocols and Schemes

        • Basic Authentication in Explicit Proxy and Transparent Proxy Mode

        • Configure Realms and Realm Sequences

        • Configure NTLM Realm for Active Directory

        • Join Cisco WSA to Active Directory

        • Configure Global Authentication Settings

        • Configure an Identity to Require Authentication (Basic or NTLMSSP)

        • Configure an Identity to Require Transparent User Identification

        • Configure LDAP Realm for LDAP Servers

        • Define How User Information Is Stored in LDAP

        • Bind Cisco WSA to the LDAP Directory

        • LDAP Group Authorization

        • Allowing Guest Access to Users Who Fail Authentication

        • Testing Authentication Settings

        • Authenticated Users in Reports

        • Challenge



      • Lesson 4: Configuring Cisco Web Security Appliance Acceptable Use Controls

        • Acceptable Use Controls

        • URL Categorizing Process

        • Application Visibility and Control Overview

        • Streaming Media Bandwidth Control Overview

        • Enable Acceptable Use Controls

        • Using the Policies Table

        • Configure URL Filtering

        • Enable Safe Search and Site Content Ratings

        • Configure Custom URL Categories

        • URL Category Reports

        • Configuring AVC

        • Configure Media Bandwidth Limits

        • AVC Reports

        • Challenge



      • Lesson 5: Configuring Cisco Web Security Appliance Anti-Malware Controls

        • Dynamic Vectoring and Streaming Engine Overview

        • Contrast Webroot with Sophos or McAfee Malware Scanning

        • Adaptive Scanning Overview

        • Web Reputation Filtering Overview

        • Enable Web Reputation Filtering, Adaptive Scanning and Malware Scanning

        • Configure Inbound Web Reputation Filtering and Malware Scanning

        • Configure Outbound Malware Scanning

        • Malware Reports

        • Challenge



      • Lesson 6: Configuring Cisco Web Security Appliance Decryption

        • HTTPS Proxy Operations Overview

        • Enable HTTPS Proxy

        • Invalid Destination Web Server Certificate Handling

        • Configure Decryption Policies

        • Challenge



      • Lesson 7: Configuring Cisco Web Security Appliance Data Security Controls

        • Cisco WSA Data Security Overview

        • Data Security Policies

        • Control Uploaded Content

        • External Data Loss Prevention

        • Add an ICAP Server

        • Challenge




      Module 2: Cisco Cloud Web Security



      • Lesson 1: Describing the Cisco Cloud Web Security Solutions

        • Cisco Modular Network Architecture and Cisco Cloud Web Security (CWS)

        • Cisco Cloud Web Security Overview

        • Cisco Cloud Web Security Traffic Flow Overview

        • Cisco Cloud Web Security URL Filtering, AVC, and Reporting Features Overview

        • Cisco Cloud Web Security Scanning Processes and Day Zero Outbreak Intelligence Overview

        • Cisco ScanCenter Overview

        • Challenge



      • Lesson 2: Configuring Cisco Cloud Web Security Connectors

        • Cisco Cloud Web Security Traffic Redirection Overview

        • Cisco Cloud Web Security Authentication Key

        • Authentication Key Generation from the Cisco ScanCenter

        • Verifying Traffic Redirection to CWS Using Special URL

        • Cisco ASA Cloud Web Security Overview

        • Cisco ASA Cloud Web Security Basic Configuration Using ASDM

        • Cisco ASA Cloud Web Security Basic Configuration Using the CLI

        • Cisco ASA Cloud Web Security Configuration with the Whitelist and Identity Options Using the CLI

        • Verifying Cisco ASA Cloud Web Security Operations Using the Cisco ASDM

        • Verifying Cisco ASA Cloud Web Security Operations Using the CLI

        • Cisco AnyConnect Web Security Module Overview

        • Cisco AnyConnect Web Security Module for Standalone Use Overview

        • Configure Cisco AnyConnect Web Security Module for Standalone Use

        • Configure Cisco ASA to Download the Web Security Module to the Client Machine

        • Verifying Cisco AnyConnect Web Security Module Operations

        • Cisco ISR G2 Cloud Web Security Overview

        • Cisco ISR G2 Cloud Web Security Configuration

        • Cisco ISR G2 Cloud Web Security Verification

        • Cisco WSA Cloud Web Security Overview

        • Challenge



      • Lesson 3: Describing the Web Filtering Policy in Cisco ScanCenter

        • ScanCenter Web Filtering Policy Overview

        • ScanCenter Web Filtering Policy Configuration HTTPS Inspection Configuration Overview

        • ScanCenter Web Filtering Verification

        • ScanCenter Web Filtering Reporting

        • Challenge




      Module 3: Cisco Email Security Appliance



      • Lesson 1: Describing the Cisco Email Security Solutions

        • Cisco Modular Network Architecture and Cisco ESA

        • Cisco Hybrid Email Security Solution Overview

        • SMTP Terminologies

        • SMTP Flow

        • SMTP Conversation

        • Cisco ESA Services Overview

        • Cisco ESA GUI Management

        • Cisco ESA Committing the Configuration Changes

        • Cisco ESA Licensing

        • Incoming Mail Processing Overview

        • Outgoing Mail Processing Overview

        • Cisco ESA LDAP Integration Overview

        • Cisco Registered Envelope Service (CRES) Overview

        • Challenge



      • Lesson 2: Describing the Cisco Email Security Appliance Basic Setup Components

        • Cisco ESA Listener Overview

        • Cisco ESA Listener Type: Private and Public

        • Cisco ESA One Interface/One Listener Deployment Example

        • Cisco ESA Two Interfaces/Two Listeners Deployment Example

        • Cisco ESA Listener Major Components: HAT and RAT

        • Cisco ESA One Listener Deployment Scenario

        • One Listener Deployment Scenario: Interfaces and Listener

        • One Listener Deployment Scenario: LDAP Accept Query

        • One Listener Deployment Scenario: HAT

        • One Listener Deployment Scenario: HAT > Sender Group

        • One Listener Deployment Scenario: HAT > Sender Group SBRS

        • One Listener Deployment Scenario: HAT > BLACKLIST Sender Group

        • One Listener Deployment Scenario: HAT > RELAYLIST Sender Group

        • One Listener Deployment Scenario: HAT > Add Sender Group

        • One Listener Deployment Scenario: HAT > Mail Flow Policy

        • One Listener Deployment Scenario: HAT > Mail Flow Policy > Anti-Spam and Anti-Virus

        • One Listener Deployment Scenario: HAT > Mail Flow Policies Summary

        • One Listener Deployment Scenario: RAT

        • One Listener Deployment Scenario: SMTP Routes

        • One Listener Deployment Scenario: Email Relaying on Internal Mail Server

        • Challenge



      • Lesson 3: Configuring Cisco Email Security Appliance Basic Incoming and Outgoing Mail Policies

        • Cisco ESA Incoming and Outgoing Mail Policies Overview

        • Cisco ESA Mail Policies Matching

        • Anti-Spam Overview

        • Anti-Spam Configuration

        • Spam Quarantine Configuration

        • Policy, Virus, Outbreak Quarantines Configuration

        • Anti-Virus Overview

        • Anti-Virus Configuration

        • Content Filters Overview

        • Content Filters Configuration

        • Outbreak Filters Overview

        • Outbreak Filters Configuration

        • Data Loss Prevention Overview

        • Data Loss Prevention Configuration

        • Reporting Overview

        • Message Tracking

        • Trace

        • Challenge




      Module 4: Advanced Malware Protection for Endpoints



      • Lesson 1: AMP for Endpoints Overview and Architecture

        • Modern Malware

        • Why Defenses Fail

        • Introduction to AMP for Endpoints

        • AMP for Endpoints Architecture

        • AMP Connector Architecture

        • Installation Components

        • How AMP Connector Components Interact

        • The Role of the AMP Cloud

        • Transaction Processing

        • Additional Transaction Processing

        • Real-time Data Mining

        • Private Cloud Architecture

        • Private Cloud Modes

        • Cloud Proxy Mode Communications

        • Air Gap Mode

        • Challenge



      • Lesson 2: Customizing Detection and AMP Policy

        • Detection, Application Control, DFC Options, and IOCs

        • Endpoint Policy

        • Policy Modes

        • Simple Custom Detections

        • Creating A Simple Custom Detection

        • Application Blocking

        • Advanced Custom Signatures

        • Whitelisting

        • Android Custom Detections

        • DFC IP Blacklists and Whitelists

        • DFC IP Blacklists

        • DFC IP Whitelists

        • Configuring Exclusions

        • Custom Exclusion Sets

        • Challenge



      • Lesson 3: IOCs and IOC Scanning

        • Indications of Compromise (IOCs)

        • IOC Scanning

        • Customizing IOCs

        • Challenge



      • Lesson 4: Deploying AMP Connectors

        • Groups

        • Creating Groups

        • Deploying Windows Connectors

        • Direct Download Deployment

        • Creating the Installer (Public Cloud)

        • Email Deployment

        • Microsoft Windows Installation and Interface

        • Connectivity Considerations

        • Command-Line Installation

        • Challenge



      • Lesson 5: AMP Analysis Tools

        • Event View Filters

        • Events List

        • Event Detail: File Detection

        • Event Detail: Connector Info

        • Event Detail: Comments

        • File Analysis

        • The File Analysis Page

        • File Analysis Results

        • File Repository

        • Trajectory

        • File Trajectory Page

        • Device Trajectory

        • Device Trajectory Filters and Search

        • Prevalence

        • Vulnerable Software

        • Reporting

        • Creating a Report

        • Challenge




      Module 5: Cisco FirePOWER Next-Generation IPS



      • Lesson 1: Describing the Cisco FireSIGHT System

        • Cisco FireSIGHT System Overview

        • Cisco FirePOWER NGIPS and NGFW

        • Cisco FireSIGHT System Detection and Architecture

        • Cisco FireSIGHT System Components

        • Cisco FireSIGHT System Device Configuration

        • Traffic Flows

        • Challenge



      • Lesson 2: Configuring and Managing Cisco FirePOWER Devices

        • Introduction to Device Management

        • Interfaces Tab

        • Virtual Device Configuration

        • Static Route Configuration

        • Object Management

        • Challenge



      • Lesson 3: Implementing an Access Control Policy

        • Access Control Policy Overview

        • Access Control Policy Configuration

        • Default Action

        • Targets Tab

        • Security Intelligence

        • HTTP Responses

        • Advanced Tab

        • Access Control Policy Rules

        • Rule Constraints Overview

        • Save and Apply the Access Control Policy

        • Challenge



      • Lesson 4: Understanding Discovery Technology

        • Introduction to Host Discovery

        • Network Discovery Policy

        • Discovery Overview

        • Challenge



      • Lesson 5: Configuring File-Type and Network Malware Detection

        • Introduction to Network-Based Malware Detection

        • Network-Based Malware Detection Overview

        • File Dispositions

        • Important Network-Based Malware Detection Concepts

        • Retrospective Event Overview

        • Cisco FireSIGHT File-Type Detection Architecture

        • Cisco FireSIGHT Malware Detection Architecture

        • File Disposition Caching

        • File Lists

        • File Policy

        • Challenge



      • Lesson 6: Managing SSL Traffic with Cisco FireSIGHT

        • SSL Traffic Management Overview

        • SSL Inspection Architecture

        • Cisco FireSIGHT SSL Inspection

        • SSL Policy

        • Challenge



      • Lesson 7: Describing IPS Policy and Configuration Concepts

        • Introduction to IPS Policy

        • Policy Layering Model

        • Rule Management

        • Cisco FireSIGHT Rule Recommendations

        • IPS Policy Layering

        • Challenge



      • Lesson 8: Describing the Network Analysis Policy

        • Network Analysis Policy Introduction

        • Network Analysis Policy Customization

        • Preprocessors

        • Network Analysis Policy Configuration

        • Network Analysis Policy Creation

        • Preprocessor Configuration

        • Challenge



      • Lesson 9: Creating Reports

        • Reporting System Overview

        • Report Templates

        • Report Sections

        • Advanced Settings

        • Challenge



      • Lesson 10: Describing Correlation Rules and Policies

        • Correlation Policies Overview

        • Correlation Policy Responses

        • Remediations Configuration

        • Remediation Module Configuration

        • Correlation Policy Rules

        • Correlation Policies Overview

        • Correlation Events

        • Whitelists Overview

        • Whitelist Events and Violations

        • Traffic Profiles Overview

        • Traffic Profiles in Correlation Policies

        • Challenge



      • Lesson 11: Understanding Basic Rule Syntax and Usage

        • Basic Snort Rule Structure

        • Snort Rule Headers

        • Snort Rule Bodies

        • Challenge




      Module 6: Cisco ASA FirePOWER Services Module



      • Lesson 1: Installing Cisco ASA 5500-X Series FirePOWER Services (SFR) Module

        • Cisco ASA FirePOWER Services (SFR) Module Overview

        • Cisco FireSIGHT Management Center Overview

        • Cisco ASA FirePOWER Services Software Module Management Interface

        • Cisco ASA FirePOWER Services Module Package Installation

        • Cisco ASA FirePOWER Services Module Verification

        • Redirect Traffic to Cisco ASA FirePOWER Services Module

        • Challenge







      Audience and Prerequisites


      Audience



      • Channel Partners

      • Customers

      • Employees


      Prerequisites


      The knowledge and skills that a learner must have before attending this course are as follows:



      • Cisco Certified Network Associate (CCNA) certification

      • Cisco Certified Network Associate (CCNA) Security certification

      • Knowledge of Microsoft Windows operating system




      Delivery Method


      Web-Based ILT Duration 5 Days





      GET IN TOUCH WITH US

      © 2016 -2020 One Mind Services.

      CONTACT

      Phone: 1-408-540-6771

      Email: info@onemindservices.com

      HQ

      6200 Stoneridge Mall Rd

      Suiite#300

      Pleasanton CA 94588