Sale!

CCNP Security Cisco Firepower SNCF 300-710 Course

Original price was: $25.00.Current price is: $10.00.

Price: 10.00 USD | Size: 8.82 GB |  Duration : 20+ Hours  | 112 Video Lessons | Bonus : Cisco CCNP Security PDF Guides  

BRAND:

ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️ 4.9

Description

Price: 10.00 USD | Size: 8.82 GB |  Duration : 20+ Hours  | 112 Video Lessons | Bonus : Cisco CCNP Security PDF Guides  

BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️ 4.9

 

SSFIPS

1 Cisco Firepower Threat Defense Overview

01 Introduction

02 Examining Firewall and IPS Technology

03 Firepower Threat Defense Features and Components

04 Examining Firepower Platforms

05 Examining Firepower Threat Defense Licensing

06 Firepower Implementation Use Cases

 

2 Cisco Firepower NGFW Device Configuration

01 Introduction

02 Firepower Threat Defense Device Registration

03 FXOS and Firepower Device Manager

04 NGFW Device Management

05 Firepower Management Center Policies

06 System Configuration and Health Monitoring

 

3 Cisco Firepower NGFW Traffic Control

01 Introduction

02 Firepower Threat Defense Packet Processing

03 Traffic Bypass

 

4 Cisco Firepower Discovery

1 Introduction

02 Firepower Network Discovery

04 User Identity

5 Implementing Access Control Policies

3 Access Control Policy Rules and Default Action

04 Further Inspection

05 Connection Events

06 Access Control Policy Advanced Settings

07 Access Control Policy Considerations

6 Security Intelligence

01 Introduction

02 Security Intelligence

04 Security Intelligence Deployment and Logging

7 File Control and Advanced Malware Protection

01 Introduction

02 Malware and File Policy

8 Next-Generation Intrusion Prevention Systems

1 Introduction

02 Intrusion Prevention and Snort Rules

04 Intrusion Policies

05  Intrusion Policy Configuration

06  Intrusion Policy Management

07 Intrusion Policy Management Part 2

9 Network Analysis Policies

01 Introduction

02 Preprocessor Technologies

03 Network Analysis Policies

04 Adaptive Profiles

10 Detailed Analysis Techniques

01 Introduction

02 Event Analysis

03 Event Types

04 Contextual Data

05 Analysis Tools

06 Intrusion Event Tuning

11 Cisco Firepower Platform Integration

01 Introduction

02 Cisco Threat Intelligence Director

03 Firepower Integration with the Cisco Identity Services Engine

04 Firepower Integration with Splunk

12 Alerting and Correlation Policies

01 Introduction

02 External Alerting

03 Correlation Policies

13 System Administration

01 Introduction

02 Update Management

03 User Account Management Features

04 User Accounts

14 Cisco Firepower Troubleshooting

01 Introduction

02 Common Misconfigurations

03 Troubleshooting Commands Part 1

04 Troubleshooting Commands Part 2

05 Packet Capture

SSNGFW

1  Cisco Firepower Threat Defense Overview

01 Examining Firewall and IPS Technology

02 Firepower Threat Defense Features and Components

03 Examining Firepower Platforms

04 Examining Firepower Threat Defense Licensing

05 Cisco Firepower Implementation Use Cases

 

2  Firepower NGFW Device Configuration

01 Firepower Threat Defense Device Registration

02 FXOS and Firepower Device Manager

03 Managing NGFW Devices

04 Examining Firepower Management Center Policies

05 Examining Objects

06 Examining System Configuration and Health Monitoring

07 Examining Firepower High Availability

08 Cisco ASA to Firepower Migration

3 Firepower NGFW Traffic Control

01 Firepower Threat Defense Packet Processing

02 Implementing QoS

03 Bypassing Traffic

4 Firepower NGFW Address Translation

01 NAT Basics

02 Implementing NAT

03 mplementing NAT Part 2

04 NAT Rule Examples

5 Firepower Discovery

1 Examining Network Discovery

6  Implementing Access Control Policies

1 Examining Access Control Policies

02  Examining Access Control Policy Rules and Default Action

03 Examining Access Control Policy Rules and Default Action Part 2

04 Implementing Further Inspection

05 Examining Connection Events

06 Access Control Policy Advanced Settings

07 Access Control Policy Considerations

7 Security Intelligence

01 Examining Security Intelligence

02 Examining Security Intelligence Objects

03 Security Intelligence Deployment and Logging

8 File Control and Advanced Malware Protection

01 Examining the Malware and File Policy Part 1

02 Examining the Malware and File Policy Part 2

03 Examining Advanced Malware Protection Part 1

9 Next-Generation Intrusion Prevention Systems

01 Examining Intrusion Prevention and Snort Rules

02 Examining Variables and Variable Sets

03  Examining Intrusion Policies

10 Site-to-Site VPN

01 Examining IPsec

02 Site-to-Site VPN Configuration

03 Site-to-Site VPN Troubleshooting

11 Remote-Access VPN

01 Examining Remote-Access VPN

02 Examining Public-Key Cryptography and Certificates

03 Examining Certificate Enrollment

04 Remote-Access VPN Configuration

12 SSL Decryption

01 Examining SSL Decryption

13 Detailed Analysis Techniques

01 Examining Event Analysis

02 Examining Event Types

03 Examining Contextual Data

04 Examining Analysis Tools

14 System Administration

01 Managing Updates

02 Examining User Account Management Features

03 Configuring User Accounts

15  Firepower Troubleshooting

1 Examining Common Misconfigurations

02  Examining Troubleshooting Commands

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

You may also like…

0
    0
    Your Cart
    Your cart is emptyReturn to Shop

    Add to cart