Implementing Cisco Threat Control Solutions (SITCS)

Our classes are always live and instructor led from our Exton, PA or EPIC Partner locations. Springhouse AnywhereLive options require Internet Access. Select classes are Guaranteed to Run (GTR). View our complete schedule policies.

 

 

 

 

Overview

​This course provides network professionals with the knowledge to implement Cisco FirePOWER NGIPS (Next Generation Intrusion Prevention System) and Cisco AMP (Advanced Malware Protection), as well as Web Security, Email Security, and Cloud Web Security.  Students will gain hands-on experience configuring various advanced Cisco security solutions for mitigating outside threats and securing traffic traversing the firewall. Special Note: This course is part of the Cisco Certified Network ProfessionalSecurity Certification (CCNP Security). Course kits are available in digital format only.  The digital version is designed for online use only, not for printing.

Intended Audience

​This course is intended for Network Security Engineers.


At Completion

​Upon successful completion of this course, students should be able to meet these overall objectives:

  • Describe and implement Cisco Web Security Appliance
  • Describe and implement Cloud Web Security
  • Describe and implement Cisco Email Security Appliance
  • Describe and implement Advanced Malware Protection
  • Describe and implement Cisco FirePOWER Next-Generation IPS
  • Describe and implement Cisco ASA FirePOWER Services Module

Prerequisites

​In order to fully benefit from this course, it is recommended that students have the following prerequisites:

  • CCNA Security or valid CCSP or any CCIE Certification

Exams & Certifications

​CCNP Security


Materials


Course Outline

​Module 1: Cisco Web Security Appliance

  • Lesson 1: Describing the Cisco Web Security Appliance Solutions
  • Lesson 2: Integrating the Cisco Web Security Appliance
  • Lesson 3: Configuring Cisco Web Security Appliance Identities and User Authentication Controls
  • Lesson 4: Configuring Cisco Web Security Appliance Acceptable Use Controls
  • Lesson 5: Configuring Cisco Web Security Appliance Anti-Malware Controls
  • Lesson 6: Configuring Cisco Web Security Appliance Decryption
  • Lesson 7: Configuring Cisco Web Security Appliance Data Security Controls


Module 2: Cisco Cloud Web Security

  • Lesson 1: Describing the Cisco Cloud Web Security Solutions
  • Lesson 2: Configuring Cisco Cloud Web Security Connectors
  • Lesson 3: Describing the Web Filtering Policy in Cisco ScanCenter


Module 3: Cisco Email Security Appliance

  • Lesson 1: Describing the Cisco Email Security Solutions
  • Lesson 2: Describing the Cisco Email Security Appliance Basic Setup Components
  • Lesson 3: Configuring Cisco Email Security Appliance Basic Incoming and Outgoing Mail Policies


Module 4: Advanced Malware Protection for Endpoints

  • Lesson 1: AMP for Endpoints Overview and Architecture
  • Lesson 2: Customizing Detection and AMP Policy
  • Lesson 3: IOCs and IOC Scanning
  • Lesson 4: Deploying AMP Connectors
  • Lesson 5: AMP Analysis Tools


Module 5: Cisco FirePOWER Next-Generation IPS

  • Lesson 1: Describing the Cisco FireSIGHT System
  • Lesson 2: Configuring and Managing Cisco FIrePOWER Devices
  • Lesson 3: Implementing an Access Control Policy
  • Lesson 4: Understanding Discovery Technology
  • Lesson 5: Configuring File-Type and Network Malware Detection
  • Lesson 6: Managing SSL Traffic with Cisco FireSIGHT
  • Lesson 7: Describing IPS Policy and Configuration Concepts
  • Lesson 8: Describing the Network Analysis Policy
  • Lesson 9: Creating Reports
  • Lesson 10: Describing Correlation Rules and Policies
  • Lesson 11: Understanding Basic Rule Syntax and Usage


Module 6: Cisco ASA FirePOWER Services Module

  • Lesson 1: Installing Cisco ASA 5500-X Series FirePOWER Services (SFR) Module


LAB OUTLINE:

  • Lab 1: Configure Cisco Web Security Appliance Explicit Proxy and User Authentication Web-related Connectivity
  • Lab 2: Configure Cisco Web Security Appliance Acceptable Use Controls
  • Lab 3: Configure Cisco Email Security Appliance Basic Policies
  • Lab 4: Accessing the AMP Public Cloud Console
  • Lab 5: Customizing Detection and AMP Policy
  • Lab 6: IOCs and IOC Scanning
  • Lab 7: Deploying AMP Connectors
  • Lab 8: AMP Analysis Tools
  • Lab 9: Configure Inline Interfaces and Create Objects
  • Lab 10: Create Access Control Policy Rules
  • Lab 11: Configure Network Discovery Detection
  • Lab 12: Create a File Policy
  • Lab 13: Create an Intrusion Policy
  • Lab 14: Create a Network Analysis Policy
  • Lab 15: Compare Trends
  • Lab 16: Create Correlation Policies

 

 

Implementing Cisco Threat Control Solutions (SITCS)http://springhouse.com/course-catalog/SITCSImplementing Cisco Threat Control Solutions (SITCS)

Get More Information
Name:

Phone:  

Email:  

Comments:

Help us prove you're not a robot:
 

 ‭(Hidden)‬ Catalog-Item Reuse

Microsoft Gold Partner

PMI R.E.P.

AXELOS Limited

The Microsoft Gold CPLS logo is a mark of Microsoft, Inc.

The PMI R.E.P. logo is a mark of the Project Management Institute, Inc.

ITIL® is a registered trade mark of AXELOS Limited.
IT Infrastructure Library® is a registered trade mark of AXELOS Limited
The Swirl logo™ is a registered trade mark of AXELOS Limited
Accredited course material is property of ITSM Academy.

Connect with us

Springhouse Education & Consulting Services

Corporate HQ:Eagleview Corporate Park
707 Eagleview Boulevard
Suite 207
Exton, PA 19341

610-321-3500 - info@springhouse.com