Securing Networks with Cisco Firepower Next-Generation IPS

The Securing Networks with Cisco Firepower Next-Generation IPS course shows you how to deploy and use Cisco Firepower Next-Generation Intrusion Prevention System (NGIPS). This hands-on course gives you the knowledge and skills required to use the platform features and includes firewall security concepts, platform architecture and key features; in-depth event analysis including detection of network-based malware and file type, NGIPS tuning and configuration including application control, security intelligence, firewall, and network-based malware and file controls; Snort® rules language; file and malware inspection, security intelligence, and network analysis policy configuration designed to detect traffic patterns; configuration and deploypment of correleation policies to take action based on events detected; troubleshooting; system and user administration tasks, and more.

Objetivos

After completing this course, you should be able to:

Describe the components of Cisco Firepower Threat Defense and the managed device registration process
Detail Next-Generation Firewalls (NGFW) traffic control and configure the Cisco Firepower system for network discovery
Implement access control policies and describe access control policy advanced features
Configure security intelligences features and the Advanced Malware Protection (AMP) for Networks implementation procedure for file control and advanced malware protection
Implement and manage intrusion and network analysis policies for NGIPS inspection
Describe and demonstrate the detailed analysis techniques and reporting features provided by the Cisco Firepower Management Center
Integrate the Cisco Firepower Management Center with an external logging destination
Describe and demonstrate the external alerting options available to Cisco Firepower Management Center and configure a correlation policy
Describe key Cisco Firepower Management Center software update and user account management features
Identify commonly misconfigured settings within the Cisco Firepower Management Center and use basic commands to troubleshoot a Cisco Firepower Threat Defense device

Ciberseguridad

Disponible en formato e-learning

Disponible en formato presencial

Disponible en formato a distancia

Subvención disponible
A través de Fundae, cumpliendo requisitos.

Duración
25 horas

  • Dificultad 50% 50%
  • Nivel alcanzado 80% 80%

Dirigido a

Technical professionals who need to know how to deploy and manage a Cisco FirePower NGIPS in their network environment.

Conocimientos requeridos

Attendees should meet the following prerequisites:

Technical understanding of TCP/IP networking and network architecture
Basic familiarity with the concepts of intrusion detection systems (IDS) and IPS
CCNA Security (ICND1 and IINS) recommended.
Pre-requisitos:
SCOR – Implementing and Operating Cisco Security Core Technologies

Temario

Cisco Firepower Threat Defense Overview

Cisco Firepower NGFW Device Configuration

Cisco Firepower NGFW Traffic Control

Cisco Firepower Discovery

Implementing Access Control Policies

Security Intelligence

File Control and Advanced Malware Protection

Next-Generation Intrusion Prevention Systems

Network Analysis Policies

Detailed Analysis Techniques

Cisco Firepower Platform Integration

Alerting and Correlation Policies

System Administration

Cisco Firepower Troubleshooting

Labs:

Lab1: Initial Device Setup
Lab 2: Device Management
Lab 3: Configuring Network Discovery
Lab 4: Implementing and Access Control Policy
Lab 5: Implementing Security Intelligence
Lab 6: File Control and Advanced Malware Protection
Lab 7: Implementing NGIPS
Lab 8: Customizing a Network Analysis Policy
Lab 9: Detailed Analysis
Lab 10: Configuring Cisco Firepower Platform Integration with Splunk
Lab 11: Configuring Alerting and Event Correlation
Lab 12: System Administration
Lab 13: Cisco Firepower Troubleshooting

Solicita información del curso

Esta web utiliza cookies propias y de terceros para su correcto funcionamiento y para fines analíticos. Contiene enlaces a sitios web de terceros con políticas de privacidad ajenas que podrás aceptar o no cuando accedas a ellos. Al hacer clic en el botón Aceptar, acepta el uso de estas tecnologías y el procesamiento de tus datos para estos propósitos. Ver Política de cookies
Privacidad