Privée

Ce cours est disponible en session privée ou personnalisée. Il peut être offert à l’un de nos centres de formation ou directement à vos bureaux. Appelez l’un de nos conseillers ou faites une demande de soumission en ligne.

Appelez maintenant au 1 877 624.2344

  • Durée: 5 jours
  • Prix régulier: Sur demande

CISCO - Implementing Cisco Threat Control Solutions (SITCS) v1.5

Reference : © CISCO SITCS 1.5

Learning credits : 36

Duration : 5 days

This course provides you with the knowledge to implement Cisco FirePOWER NGIPS (Next-Generation Intrusion Prevention System) and Cisco AMP (Advanced Malware Protection), as well as Web Security, Email Security and Cloud Web Security. You will gain hands-on experience configuring various advance Cisco security solutions for mitigating outside threats and securing traffic traversing the firewall.

LanguagesThese scheduled public sessions are offered in English or in French (FR). The educational material is in English.
CertificationsThis course prepares for the 300-207 SITCS certification and prepares the CCNP Security exam.

Audience

  • Network Security Engineers
  • Network Engineers
  • Network Designers and Administrators
  • Network Managers
  • System Engineers

Prerequisites

It is recommended, but not required, that students have the following knowledge and skills before attending this course:

  • CCNA Security Certification
  • any CCIE certification can act as a prerequisite

Objectives

By the end of this course, you will be able to:
  • Understand Cisco ASA Next-Generation Firewall (NGFW)
  • Deploy Cisco Web Security appliance to mitigate malware
  • Configure Web Security appliance for acceptable use controls
  • Configure Cisco Cloud Web Security Connectors
  • Describe Cisco Email Security Solution
  • Configure Cisco Email Appliance Incoming and Outgoing Policies
  • Describe IPS Threat Controls
  • Configure and Implement Cisco IPS Sensor into a Network
Contents
Module 1 - Cisco Web Security Appliance
  • Cisco Web Security Appliance (WSA) Solutions
  • Integrating the Cisco Web Security Appliance
  • Configuring Cisco Web Security Appliance Identities and User Authentication Controls
  • Configuring Cisco Web Security Appliance Acceptable Use Control
  • Configuring Cisco Web Security Appliance Anti-Malware Controls
  • Configuring Cisco Web Security Appliance Decryption
  • Configuring Cisco Web Security Appliance Data Security Controls
Module 2 - Cisco Cloud Web Security
  • Cisco Cloud Web Security Solutions
  • Configuring Cisco Cloud Web Security Connectors
  • Web Filtering Policy in Cisco ScanCenter
Module 3 - Cisco Email Security Appliance
  • Cisco Email Security Solutions
  • Cisco Email Security Appliance Basic Setup Components
  • Configuring Cisco Email Security Appliance Basic Incoming and Outgoing Mail Policies
Module 4 - Advanced Malware Protection for Endpoints
  • AMP for Endpoints Overview and Architecture
  • Customizing Detection and AMP Policy
  • IOCs and IOC Scanning
  • Deploying AMP Connectors
  • AMP Analysis Tools
Module 5 - Cisco FirePOWER Next-Generation IPS
  • Cisco FireSIGHT System
  • Configuring and Managing Cisco FirePOWER Devices
  • Implementing an Access Control Policy
  • Discovery Technology
  • Configuring File-Type and Network Malware Detection
  • Managing SSL Traffic with Cisco FireSIGHT
  • IPS Policy and Configuration Concepts
  • Network Analysis Policy
  • Creating Reports
  • Correlation Rules and Policies
  • Basic Rule Syntax and Usage
Module 6 - Cisco ASA FirePOWER Services
  • Installing Cisco ASA 5500-X Series FirePOWER Services (SFR)
Labs :
  • Lab 1: Configure Cisco Web Security Appliance Explicit Proxy and User Authentication
  • Lab 2: Configure Cisco Web Security Appliance Acceptable Use Controls
  • Lab 3: Configure Cisco Email Security Appliance Basic Policies
  • Lab 4: Accessing the AMP Public Cloud Console
  • Lab 5: Customizing Detection and AMP Policy
  • Lab 6: IOCs and IOC Scanning
  • Lab 7: Deploying AMP Connectors
  • Lab 8: AMP Analysis Tools
  • Lab 9: Configure Inline Interfaces and Create Objects
  • Lab 10: Create Access Control Policy Rules
  • Lab 11: Configure Network Discovery Detection
  • Lab 12: Create a File Policy
  • Lab 13: Create an Intrusion Policy
  • Lab 14: Create a Network Analysis Policy
  • Lab 15: Compare Trends
  • Lab 16: Create Correlation Policies

Savoir s’entourer des meilleurs

Steve Waterhouse
Instructeur certifié avec les technologies du sans-fil (CWNP), les technologies de réseautique (Cisco et CompTIA) et conférencier en sécurité des technologies de l’information.
Simon Bourassa
Simon Bourassa
Formateur et conseiller en TI
Simon est passionné par le développement logiciel et le développement de produits, mais avant tout par l’ensemble des gens cachés derrière ces codes, qui travaillent main dans la main pour développer des solutions innovantes.
Pierre-Edouard Brondel
Pierre-Edouard Brondel
Formateur et conseiller en bureautique
Expert en pédagogie dans le domaine des technologies et de la bureautique cumulant plus de 25 ans d’expérience, Pierre-Édouard est d’abord et avant tout un passionné de capital humain.
Valère Drainville
Valère Drainville
Formateur et conseiller en efficacité professionnelle
Expert en collaboration et en efficacité professionnelle, Valère Drainville saura vous accompagner dans l’adoption et la gestion de vos outils de travail collaboratifs.