Digi Academy

Implementing Cisco Threat Control Solutions

Digi Academy
A Milano

Consultare
Preferisci chiamare subito il centro?
02694... Leggi tutto
Chiedi informazioni a un consulente Emagister

Informazioni importanti

Tipologia Corso
Luogo Milano
Inizio Scegli data
  • Corso
  • Milano
  • Inizio:
    Scegli data
Descrizione

Upon completing this course, the learner will be able to meet these overall objectives:
Understand Cisco ASA Next-Generation Firewall (NGFW)
Deploy Cisco Web Security appliance to mitigate malware
Configure Web Security appliance for acceptable use controls
Configure Cisco Cloud Web Security Connectors
Describe Cisco Email Security Solution
Configure Cisco Email Appliance Incoming and Outgoing Policies
Describe IPS Threat Controls
Configure and Implement Cisco IPS Sensor into a Network
Prerequisiti
This section lists the skills and knowledge that you must possess to benefit fully from the course. This section includes recommended Cisco learning offerings that the learners may complete to benefit fully from this course, including the following:
Cisco Certified Network Associate (CCNA®) certification
Cisco Certified Network Associate (CCNA®) Security certification
Knowledge of Microsoft Windows operating system
Target del corso
The primary audience for this course is as follows:
Network Security Engineers

Strutture (1)
Dove e quando
Inizio Luogo
Scegli data
Milano
Via Valtellina, 63, 20124, Milano, Italia
Visualizza mappa
Inizio Scegli data
Luogo
Milano
Via Valtellina, 63, 20124, Milano, Italia
Visualizza mappa

Domande e risposte

Comunicaci i tuoi dubbi,altri utenti potranno risponderti

Cosa impari in questo corso?

Web master
Security
ASA
CCNA
Email
<p class="ContenutiTitoli">Target del corso</p> <p class="Contenuti"> <p><div class="justified">The primary audience for this course is as follows: <ul><li>Network Security Engineers</li></ul></div></p>

Programma

dettagliati del corso
Module 1: Cisco ASA (CX) NGFW
Describing the Cisco (CX) NGFW Services within the Cisco Modular Network Architecture
Describing the Cisco ASA (CX) NGFW Management Architecture
Configuring Cisco ASA (CX) NGFW Policy Objects
Monitoring Cisco ASA (CX) NGFW Operations
Configuring Cisco ASA (CX) NGFW Access Policies
Lab 1-1: Exploring Cisco ASA (CX) NGFW and PRSM
Lab 1-2: Configuring Cisco ASA (CX) NGFW Access Policy Lab
Configuring Cisco ASA (CX) NGFW Identity Policies
Lab 1-3: Configuring Cisco ASA (CX) NGFW Identity Policy Lab
Configuring Cisco ASA (CX) NGFW Decryption Policies
Lab 1-4: Configuring Cisco ASA (CX) NGFW Decryption Policy Lab
Module 2: Cisco Web Security Appliance
Describing the Cisco Web Security Appliance Solutions
Integrating the Cisco Web Security Appliance
Configuring Cisco Web Security Appliance Identities and User Authentication Controls
Configuring Cisco Web Security Appliance Acceptable Use Controls
Configuring Cisco Web Security Appliance Anti-Malware Controls
Lab 2-1: Configuring Cisco Web Security Appliance Lab
Configuring Cisco Web Security Appliance Decryption Configuring Cisco Web Security Appliance Data Security Controls
Module 3 Cisco Cloud Web Security
Describing the Cisco Cloud Web Security Solutions
Configuring Cisco Cloud Web Security Connectors
Describing the Web Filtering Policy in Cisco ScanCenter
Lab 3-1: Configuring Cisco Cloud Web Security Connector on ISR G2 and on AnyConnect Lab
Module 4 Cisco Email Security Appliance
Describing the Cisco Email Security Solutions
Describing the Cisco Email Security Appliance Basic Configuration Concepts
Configuring Cisco Email Security Appliance Incoming and Outgoing Mail Policies
Lab 4-1 Configuring Basic Cisco Email Security Mail Policies Lab
Describing IPS Threat Controls
Module 5 Cisco Intrusion Prevention Systems
Integrating Cisco IPS Sensor into a Network
Configuring Basic Cisco IPS Settings
Lab 5-1: Configuring Basic Cisco IPS Settings Lab
Tuning Cisco IPS Signatures
Configuring Custom Cisco IPS Signatures
Configuring Cisco IPS Anomaly-Detection
Configuring Cisco IPS Reputation-Based Features
Lab 5-2: Tuning Cisco IPS Signatures and Anomaly-Detection Lab

Gli utenti che erano interessati a questo corso si sono informati anche su...
Leggi tutto