Description
Price: 10.00 USD | Size: 8.82 GB | Duration : 20+ Hours | 112 Video Lessons | Bonus : Cisco CCNP Security PDF Guides
BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️ 4.9
SSFIPS
1 Cisco Firepower Threat Defense Overview
01 Introduction
02 Examining Firewall and IPS Technology
03 Firepower Threat Defense Features and Components
04 Examining Firepower Platforms
05 Examining Firepower Threat Defense Licensing
06 Firepower Implementation Use Cases
2 Cisco Firepower NGFW Device Configuration
01 Introduction
02 Firepower Threat Defense Device Registration
03 FXOS and Firepower Device Manager
04 NGFW Device Management
05 Firepower Management Center Policies
06 System Configuration and Health Monitoring
3 Cisco Firepower NGFW Traffic Control
01 Introduction
02 Firepower Threat Defense Packet Processing
03 Traffic Bypass
4 Cisco Firepower Discovery
1 Introduction
02 Firepower Network Discovery
04 User Identity
5 Implementing Access Control Policies
3 Access Control Policy Rules and Default Action
04 Further Inspection
05 Connection Events
06 Access Control Policy Advanced Settings
07 Access Control Policy Considerations
6 Security Intelligence
01 Introduction
02 Security Intelligence
04 Security Intelligence Deployment and Logging
7 File Control and Advanced Malware Protection
01 Introduction
02 Malware and File Policy
8 Next-Generation Intrusion Prevention Systems
1 Introduction
02 Intrusion Prevention and Snort Rules
04 Intrusion Policies
05 Intrusion Policy Configuration
06 Intrusion Policy Management
07 Intrusion Policy Management Part 2
9 Network Analysis Policies
01 Introduction
02 Preprocessor Technologies
03 Network Analysis Policies
04 Adaptive Profiles
10 Detailed Analysis Techniques
01 Introduction
02 Event Analysis
03 Event Types
04 Contextual Data
05 Analysis Tools
06 Intrusion Event Tuning
11 Cisco Firepower Platform Integration
01 Introduction
02 Cisco Threat Intelligence Director
03 Firepower Integration with the Cisco Identity Services Engine
04 Firepower Integration with Splunk
12 Alerting and Correlation Policies
01 Introduction
02 External Alerting
03 Correlation Policies
13 System Administration
01 Introduction
02 Update Management
03 User Account Management Features
04 User Accounts
14 Cisco Firepower Troubleshooting
01 Introduction
02 Common Misconfigurations
03 Troubleshooting Commands Part 1
04 Troubleshooting Commands Part 2
05 Packet Capture
SSNGFW
1 Cisco Firepower Threat Defense Overview
01 Examining Firewall and IPS Technology
02 Firepower Threat Defense Features and Components
03 Examining Firepower Platforms
04 Examining Firepower Threat Defense Licensing
05 Cisco Firepower Implementation Use Cases
2 Firepower NGFW Device Configuration
01 Firepower Threat Defense Device Registration
02 FXOS and Firepower Device Manager
03 Managing NGFW Devices
04 Examining Firepower Management Center Policies
05 Examining Objects
06 Examining System Configuration and Health Monitoring
07 Examining Firepower High Availability
08 Cisco ASA to Firepower Migration
3 Firepower NGFW Traffic Control
01 Firepower Threat Defense Packet Processing
02 Implementing QoS
03 Bypassing Traffic
4 Firepower NGFW Address Translation
01 NAT Basics
02 Implementing NAT
03 mplementing NAT Part 2
04 NAT Rule Examples
5 Firepower Discovery
1 Examining Network Discovery
6 Implementing Access Control Policies
1 Examining Access Control Policies
02 Examining Access Control Policy Rules and Default Action
03 Examining Access Control Policy Rules and Default Action Part 2
04 Implementing Further Inspection
05 Examining Connection Events
06 Access Control Policy Advanced Settings
07 Access Control Policy Considerations
7 Security Intelligence
01 Examining Security Intelligence
02 Examining Security Intelligence Objects
03 Security Intelligence Deployment and Logging
8 File Control and Advanced Malware Protection
01 Examining the Malware and File Policy Part 1
02 Examining the Malware and File Policy Part 2
03 Examining Advanced Malware Protection Part 1
9 Next-Generation Intrusion Prevention Systems
01 Examining Intrusion Prevention and Snort Rules
02 Examining Variables and Variable Sets
03 Examining Intrusion Policies
10 Site-to-Site VPN
01 Examining IPsec
02 Site-to-Site VPN Configuration
03 Site-to-Site VPN Troubleshooting
11 Remote-Access VPN
01 Examining Remote-Access VPN
02 Examining Public-Key Cryptography and Certificates
03 Examining Certificate Enrollment
04 Remote-Access VPN Configuration
12 SSL Decryption
01 Examining SSL Decryption
13 Detailed Analysis Techniques
01 Examining Event Analysis
02 Examining Event Types
03 Examining Contextual Data
04 Examining Analysis Tools
14 System Administration
01 Managing Updates
02 Examining User Account Management Features
03 Configuring User Accounts
15 Firepower Troubleshooting
1 Examining Common Misconfigurations
02 Examining Troubleshooting Commands
Reviews
There are no reviews yet.