Implementing Cisco Threat Control Solutions Training (SITCS) (v1.5)

Implementing Cisco Threat Control Solutions Training (SITCS) (v1.5)

Print Friendly, PDF & Email

Introduction:

Implementing Cisco Threat Control Solutions Training (SITCS) (v1.5) Course with hands-on Labs – Cisco Learning Credits: 38 CLC

Learn how to implement and manage security on Cisco ASA firewalls utilizing Cisco next-generation product solutions with this Implementing Cisco Threat Control Solutions Training (SITCS) (v1.5)

In this Implementing Cisco Threat Control Solutions Training (SITCS) (v1.5) course, you will learn how to deploy Cisco’s Email Security (ESA); Web Security (CWS, WSA); Advanced Malware Protection (AMP); and Next Generation Intrusion Prevention Systems (NGIPS).

With Cisco SITCS Training | Implementing Cisco Threat Control Solutions Training, you will also learn how to implement and manage security threat controls by leveraging the capabilities of Cisco’s FirePOWER NGIPS, AMP, WSA, CWS, and ESA products and solutions. The hands-on labs enable to configure advanced Cisco security solutions for mitigating outside threats, and to secure traffic traversing the network and security systems.

Duration: 5 days

Implementing Cisco Threat Control Solutions Training (SITCS)
 
Implementing Cisco Threat Control Solutions Training (SITCS)Related Courses
 

Customize It:

• If you are familiar with some aspects of this Implementing Cisco Threat Control Solutions Training (SITCS) course, we can omit or shorten their discussion.
• We can adjust the emphasis placed on the various topics or build the Implementing Cisco Threat Control Solutions Training (SITCS) course around the mix of technologies of interest to you (including technologies other than those included in this outline).
• If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Implementing Cisco Threat Control Solutions Training (SITCS) course in manner understandable to lay audiences.

Audience / Target Group:

The target audience for this Implementing Cisco Threat Control Solutions Training (SITCS) course is defined here:

• Network Security Engineers
• Network Engineers
• Network Designers and Administrators
• Network Managers
• System Engineers

Class Prerequisites:

The knowledge and skills that a learner must have before attending this Implementing Cisco Threat Control Solutions Training (SITCS) course are:

• Foundational IP networking skills
• An understanding of Cisco IOS security features such as acquired from the CCNA Routing and Switching and CCNA Security certifications
• IINS – Implementing Cisco IOS Network Security 3.0
• Cisco CCNA Security Boot Camp

Objectives:

After completing this Implementing Cisco Threat Control Solutions Training (SITCS) course, attendees will be able to:

• Understand Cisco ASA Next-Generation Firewall (NGFW)
• Deploy Cisco Web Security appliance to mitigate malware
• Configure Web Security appliance for acceptable use controls
• Configure Cisco Cloud Web Security Connectors
• Describe Cisco Email Security Solution
• Configure Cisco Email Appliance Incoming and Outgoing Policies
• Describe IPS Threat Controls
• Configure and Implement Cisco IPS Sensor into a Network

Certifications

This course is part of the following Certification:

• Cisco Certified Network Professional Security (CCNP Security)

Follow On Courses

• Implementing Cisco Edge Network Security Solutions (SENSS)
• Implementing Cisco Secure Mobility Solutions (SIMOS)
• Implementing Cisco Secure Access Solutions (SISAS)

Implementing Cisco Threat Control Solutions Training (SITCS) – Course Outline:

Module 1: Cisco Web Security Appliance

Lesson 1: Describing the Cisco Web Security Appliance Solutions
Lesson 2: Integrating the Cisco Web Security Appliance
Lesson 3: Configuring Cisco Web Security Appliance Identities and User Authentication Controls
Lesson 4: Configuring Cisco Web Security Appliance Acceptable Use Controls
Lesson 5: Configuring Cisco Web Security Appliance Anti-Malware Controls
Lesson 6: Configuring Cisco Web Security Appliance Decryption
Lesson 7: Configuring Cisco Web Security Appliance Data Security Controls

Module 2: Cisco Cloud Web Security

Lesson 1: Describing the Cisco Cloud Web Security Solutions
Lesson 2: Configuring Cisco Cloud Web Security Connectors
Lesson 3: Describing the Web Filtering Policy in Cisco ScanCenter

Module 3: Cisco Email Security Appliance

Lesson 1: Describing the Cisco Email Security Solutions
Lesson 2: Describing the Cisco Email Security Appliance Basic Setup Components
Lesson 3: Configuring Cisco Email Security Appliance Basic Incoming and Outgoing Mail Policies

Module 4: Advanced Malware Protection for Endpoints

Lesson 1: AMP for Endpoints Overview and Architecture
Lesson 2: Customizing Detection and AMP Policy
Lesson 3: IOCs and IOC Scanning
Lesson 4: Deploying AMP Connectors
Lesson 5: AMP Analysis Tools

Module 5: Cisco FirePOWER Next-Generation IPS

Lesson 1: Describing the Cisco FireSIGHT System
Lesson 2: Configuring and Managing Cisco FirePOWER Devices
Lesson 3: Implementing an Access Control Policy
Lesson 4: Understanding Discovery Technology
Lesson 5: Configuring File-Type and Network Malware Detection
Lesson 6: Managing SSL Traffic with Cisco FireSIGHT
Lesson 7: Describing IPS Policy and Configuration Concepts
Lesson 8: Describing the Network Analysis Policy
Lesson 9: Creating Reports
Lesson 10: Describing Correlation Rules and Policies
Lesson 11: Understanding Basic Rule Syntax and Usage

Module 6: Cisco ASA FirePOWER Services Module

Lesson 1: Installing Cisco ASA 5500-X Series FirePOWER Services (SFR) Module

Implementing Cisco Threat Control Solutions Training (SITCS) – LABS:

Lab 1: Configure Cisco Web Security Appliance Explicit Proxy and User Authentication
Lab 2: Configure Cisco Web Security Appliance Acceptable Use Controls
Lab 3: Configure Cisco Email Security Appliance Basic Policies
Lab 4: Accessing the AMP Public Cloud Console
Lab 5: Customizing Detection and AMP Policy
Lab 6: IOCs and IOC Scanning
Lab 7: Deploying AMP Connectors
Lab 8: AMP Analysis Tools
Lab 9: Configure Inline Interfaces and Create Objects
Lab 10: Create Access Control Policy Rules
Lab 11: Configure Network Discovery Detection
Lab 12: Create a File Policy
Lab 13: Create an Intrusion Policy
Lab 14: Create a Network Analysis Policy
Lab 15: Compare Trends
Lab 16: Create Correlation Policies

Whether you are looking for general information or have a specific question, we want to help!
 
Request More Information

    Time frame:

    0