Implementing Cisco Threat Control Solutions (SITCS)

Live Online & Classroom Enterprise Training

Location: Bangalore, Delhi, Chennai & Hyderabad – India

 

Industry Experienced Instructor  |  Remote Labs  |  Lab Access Post Training

Need help finding the right training?

This course provides network professionals with the knowledge to implement Cisco FirePOWER NGIPS (Next-Generation Intrusion Prevention System) and Cisco AMP (Advanced Malware Protection), as well as Web Security, Email Security, and Cloud Web Security. Students will gain hands-on experience configuring various advanced Cisco security solutions for mitigating outside threats and securing traffic traversing the firewall.

Prerequisites:

In order to fully benefit from this course, it is recommended that students have the following prerequisites:

  • CCNA Security or valid CCSP or any CCIE Certification

Target Audience:

This course is intended for Network Security Engineers.

Course Objectives:

Upon successful completion of this course, students should be able to meet these overall objectives:

  • Describe and implement the Cisco Web Security Appliance
  • Describe and implement Cloud Web Security
  • Describe and implement the Cisco Email Security Appliance
  • Describe and implement Advanced Malware Protection
  • Describe and implement Cisco FirePOWER Next-Generation IPS
  • Describe and implement Cisco ASA FirePOWER Services Module

Course Outline:

Module 1: Cisco Web Security Appliance

  • Lesson 1: Describing the Cisco Web Security Appliance Solutions
  • Lesson 2: Integrating the Cisco Web Security Appliance
  • Lesson 3: Configuring Cisco Web Security Appliance Identities and User Authentication Controls
  • Lesson 4: Configuring Cisco Web Security Appliance Acceptable Use Controls
  • Lesson 5: Configuring Cisco Web Security Appliance Anti-Malware Controls
  • Lesson 6: Configuring Cisco Web Security Appliance Decryption
  • Lesson 7: Configuring Cisco Web Security Appliance Data Security Controls

Module 2: Cisco Cloud Web Security

  • Lesson 1: Describing the Cisco Cloud Web Security Solutions
  • Lesson 2: Configuring Cisco Cloud Web Security Connectors
  • Lesson 3: Describing the Web Filtering Policy in Cisco ScanCenter

Module 3: Cisco Email Security Appliance

  • Lesson 1: Describing the Cisco Email Security Solutions
  • Lesson 2: Describing the Cisco Email Security Appliance Basic Setup Components
  • Lesson 3: Configuring Cisco Email Security Appliance Basic Incoming and Outgoing Mail Policies

Module 4: Advanced Malware Protection for Endpoints

  • Lesson 1: AMP for Endpoints Overview and Architecture
  • Lesson 2: Customizing Detection and AMP Policy
  • Lesson 3: IOCs and IOC Scanning
  • Lesson 4: Deploying AMP Connectors
  • Lesson 5: AMP Analysis Tools

Module 5: Cisco FirePOWER Next-Generation IPS

  • Lesson 1: Describing the Cisco FireSIGHT System
  • Lesson 2: Configuring and Managing Cisco FIrePOWER Devices
  • Lesson 3: Implementing an Access Control Policy
  • Lesson 4: Understanding Discovery Technology
  • Lesson 5: Configuring File-Type and Network Malware Detection
  • Lesson 6: Managing SSL Traffic with Cisco FireSIGHT
  • Lesson 7: Describing IPS Policy and Configuration Concepts
  • Lesson 8: Describing the Network Analysis Policy
  • Lesson 9: Creating Reports
  • Lesson 10: Describing Correlation Rules and Policies
  • Lesson 11: Understanding Basic Rule Syntax and Usage

Module 6: Cisco ASA FirePOWER Services Module

  • Lesson 1: Installing the Cisco ASA 5500-X Series FirePOWER Services (SFR) Module

LAB OUTLINE:

  • Lab 1: Configure Cisco Web Security Appliance Explicit Proxy and User Authentication Web-related Connectivity
  • Lab 2: Configure Cisco Web Security Appliance Acceptable Use Controls
  • Lab 3: Configure Cisco Email Security Appliance Basic Policies
  • Lab 4: Accessing the AMP Public Cloud Console
  • Lab 5: Customizing Detection and AMP Policy
  • Lab 6: IOCs and IOC Scanning
  • Lab 7: Deploying AMP Connectors
  • Lab 8: AMP Analysis Tools
  • Lab 9: Configure Inline Interfaces and Create Objects
  • Lab 10: Create Access Control Policy Rules
  • Lab 11: Configure Network Discovery Detection
  • Lab 12: Create a File Policy
  • Lab 13: Create an Intrusion Policy
  • Lab 14: Create a Network Analysis Policy
  • Lab 15: Compare Trends
  • Lab 16: Create Correlation Policies