Training agenda
Course Outline
- Network Security Technologies
- Cisco Secure Firewall ASA Deployment
- Cisco Secure Firewall Threat Defense Basics
- Cisco Secure Firewall Threat Defense IPS, Malware, and File Policies
- Cisco Secure Email Gateway Basics
- Cisco Secure Email Policy Configuration
- Cisco Secure Web Appliance Deployment
- VPN Technologies and Cryptography Concepts
- Cisco Secure Site-to-Site VPN Solutions
- Cisco IOS VTI-Based Point-to-Point IPsec VPNs
- Point-to-Point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
- Cisco Secure Remote-Access VPN Solutions
- Remote-Access SSL VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
- Describing Information Security Concepts
- Describe Common TCP/IP Attacks
- Describe Common Network Application Attacks
- Common Endpoint Attacks
- Cisco Umbrella Deployment
- Endpoint Security Technologies
- Cisco Secure Endpoint
- Cisco Secure Network Access Solutions
- 802.1X Authentication
- 802.1X Authentication Configuration
- Network Infrastructure Protection
- Control Plane Security Solutions
- Layer 2 Data Plane Security Controls
- Layer 3 Data Plane Security Controls
- Management Plane Security Controls
- Traffic Telemetry Methods
- Cisco Secure Network Analytics Deployment
- Cloud Computing and Cloud Security
- Cloud Security
- Cisco Secure Cloud Analytics Deployment
- Software-Defined Networking
Lab Outline
- Configure Network Settings and NAT on Cisco Secure Firewall ASA
- Configure Cisco Secure Firewall ASA Access Control Policies
- Configure Cisco Secure Firewall Threat Defense NAT
- Configure Cisco Secure Firewall Threat Defense Access Control Policy
- Configure Cisco Secure Firewall Threat Defense Discovery and IPS Policy
- Configure Cisco Secure Firewall Threat Defense Malware and File Policy
- Configure Listener, HAT, and RAT on Cisco Email Secure Email Gateway
- Configure Cisco Secure Email Policies
- Configure Proxy Services, Authentication, and HTTPS Decryption
- Enforce Acceptable Use Control and Malware Protection
- Configure Static VTI Point-to-Point IPsec IKEv2 Tunnel
- Configure Point-to-Point VPN between Cisco Secure Firewall Threat Defense Devices
- Configure Remote Access VPN on the Cisco Secure Firewall Threat Defense
- Examine Cisco Umbrella Dashboard and DNS Security
- Examine Cisco Umbrella Secure Web Gateway and Cloud-Delivered Firewall
- Explore Cisco Umbrella CASB Functionalities
- Explore Cisco Secure Endpoint
- Perform Endpoint Analysis Using Cisco Secure Endpoint Console
- Explore File Ransomware Protection by Cisco Secure Endpoint Console
- Explore Secure Network Analytics v7.4.2
- Explore Global Threat Alerts Integration and ETA Cryptographic Audit
- Explore Cloud Analytics Dashboard and Operations
- Explore Secure Cloud Private and Public Cloud Monitoring