Cisco Security
Направление
- SISE — Implementing and Configuring Cisco Identity Services Engine
- Длительность: 5 дней (40 часов)
- Код курса: SISE
- Стоимость
- Очный формат: 995 000 ₸
- Онлайн формат: 968 000 ₸
Описание курса
Course Overview
The Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 course teaches you to deploy and use Cisco® Identity Services Engine (ISE) v3.x, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and VPN connections. This hands-on course provides you with the knowledge and skills to implement and apply Cisco ISE capabilities to support use cases for Zero Trust security posture. These use cases include tasks such as policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and Terminal Access Controller Access Control Server (TACACS+) device administration. Through hands-on practice via lab exercises, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency. This course helps you prepare to take the Implementing and Configuring Cisco Identity Services Engine (300-715 SISE) exam, which leads to CCNP® Security and the Cisco Certified Specialist — Security Identity Management Implementation certifications. This course also earns you 40 Continuing Education (CE) credits toward recertification
How You’ll Benefit
This class will help you use Cisco ISE to:
Develop and implement SASE architecture
Understand application of ISE capabilities towards development of a Zero Trust approach
Enable BYOD and guest access
Centrally configure and manage posture, authentication, and authorization services in a single webbased GUI console
Gain leading-edge career skills for high-demand job roles and responsibilities focused on enterprise security
Earn 40 CE credits toward recertificationWho should attend
Network security engineers
Network security architects
ISE administrators
Senior Security Operations Center (SOC) personnel responsible for Incidence Response
Cisco integrators and partnersCertifications
This course is part of the following Certifications:
Cisco Certified Network Professional SecurityPrerequisites
To fully benefit from this course, you should have the following knowledge:
Familiarity with the Cisco IOS® Software Command-Line Interface (CLI) for wired and wireless devices
Familiarity with Cisco AnyConnect® Secure Mobility Client
Familiarity with Microsoft Windows operating systems
Familiarity with 802.1XCourse Objectives
After taking this course, you should be able to:
Describe the Cisco Identity Services Engine (ISE)
Explain Cisco ISE deployment
Describe Cisco ISE policy enforcement components
Describe Cisco ISE policy configuration
Troubleshoot Cisco ISE policy and third-party Network Access Device (NAD) support
Configure guest access
Configure hotspots and guest portals
Describe the Cisco ISE profiler services
Describe profiling best practices and reporting
Configure a Cisco ISE BYOD solution
Configure endpoint compliance
Configure client posture services
Configure Cisco ISE device administration
Describe Cisco ISE TrustSec configurationsOutline: Implementing and Configuring Cisco Identity Services Engine (SISE)
Introducing Cisco ISE Architecture
Introducing Cisco ISE Deployment
Introducing Cisco ISE Policy Enforcement Components
Introducing Cisco ISE Policy Configuration
Troubleshooting Cisco ISE Policy and Third-Party NAD Support
Introducing Web Authentication and Guest Services
Configuring Hotspots and Guest Portals
Introducing the Cisco ISE Profiler
Introducing Profiling Best Practices and Reporting
Configuring Cisco ISE BYOD
Introducing Cisco ISE Endpoint Compliance Services
Configuring Client Posture Services and Compliance
Working With Network Access Devices
Exploring Cisco TrustSecLab Topology
Configure Initial Cisco ISE Setup and System Certificate Usage
Integrate Cisco ISE with Active Directory
Configure Cisco ISE Policy for MAC Authentication Bypass (MAB)
Configure Cisco ISE Policy for 802.1X
Configure Guest Access
Configure Hotspot and Self-Registered Guest Access
Configure Sponsor-Approved and Fully Sponsored Guest Access
Create Guest Reports
Configure Profiling
Customize the Cisco ISE Profiling Configuration
Create Cisco ISE Profiling Reports
Configure BYOD
Manage a Lost or Stolen BYOD Device
Configure Cisco ISE Compliance Services
Configure Client Provisioning
Configure Posture Policies
Test and Monitor Compliance-Based Access
Configure Cisco ISE for Basic Device Administration
Configure Cisco ISE Command Authorization
Configure Cisco TrustSec - SWSA — Securing the Web with Cisco Web Security Appliance v3.0
- Длительность: 2 дня (16 часов)
- Код курса: SWSA
- Стоимость
- Очный формат: 632 000 ₸
- Онлайн формат: 532 000 ₸
Описание курса
Длительность обучения:
Instructor-led training: 2 days in the classroom with hands-on lab practice
Virtual instructor-led training: 2 days of web-based classes with hands-on lab practice
E-learning: Equivalent of 2 days of instruction with videos, practice, and challengesКому следует посетить:
Security architects
System designers
Network administrators
Operations engineers
Network managers, network or security technicians, and security engineers and managers responsible for web security
Cisco integrators and partnersПредварительные требования:
To fully benefit from this course, you should have knowledge of these topics:
TCP/IP services, including Domain Name System (DNS), Secure Shell (SSH), FTP, Simple Network Management Protocol (SNMP), HTTP, and HTTPS
IP routing
You are expected to have one or more of the following basic technical competencies or equivalent knowledge:
Cisco certification (CCENT certification or higher)
Relevant industry certification [International Information System Security Certification Consortium ((ISC)2), Computing Technology Industry Association (CompTIA) Security+, International Council of Electronic Commerce Consultants (EC-Council), Global Information Assurance Certification (GIAC), ISACA]
Cisco Networking Academy letter of completion (CCNA 1 and CCNA 2)
Windows expertise: Microsoft [Microsoft Specialist, Microsoft Certified Solutions Associate (MCSA), Microsoft Certified Solutions Expert (MCSE)], CompTIA (A+, Network+, Server+)Программа курса:
After taking this course, you should be able to:
Describe Cisco WSA
Deploy proxy services
Utilize authentication
Describe decryption policies to control HTTPS traffic
Understand differentiated traffic access policies and identification profiles
Enforce acceptable use control settings
Defend against malware
Describe data security and data loss prevention
Perform administration and troubleshootingДополнительно:
This class includes lecture sections and some self-study sections. In instructor-led classes, lectures are delivered in real-time, either in person or via video conferencing. In e-learning classes, the lectures are on recorded videos
- SESA — Securing Email with Cisco Email Security Appliance v3.0
- Длительность: 3 дня (24 часа)
- Код курса: SESA
- Стоимость
- Очный формат: 731 000 ₸
- Онлайн формат: 713 000 ₸
Описание курса
Длительность обучения:
Instructor-led training: 3 days in the classroom with hands-on lab practice
Virtual instructor-led training: 3 days of web-based classes with hands-on lab practice
E-learning: Equivalent of 3 days of instruction with hands-on lab practice, videos, and challengesКому следует посетить:
Security engineers
Security administrators
Security architects
Operations engineers
Network engineers
Network administrators
Network or security technicians
Network managers
System designers
Cisco integrators and partnersПредварительные требования:
To fully benefit from this course, you should have one or more of the following basic technical competencies:
Cisco certification (Cisco CCENT® certification or higher)
Relevant industry certification, such as (ISC)2, CompTIA Security+, EC-Council, Global Information
Assurance Certification (GIAC), and ISACA
Cisco Networking Academy letter of completion (CCNA® 1 and CCNA 2)
Windows expertise: Microsoft [Microsoft Specialist, Microsoft Certified Solutions Associate (MCSA),
Microsoft Certified Systems Engineer (MCSE)], CompTIA (A+, Network+, Server+)
The knowledge and skills that a student must have before attending this course are:
TCP/IP services, including Domain Name System (DNS), Secure Shell (SSH), FTP, Simple Network
Management Protocol (SNMP), HTTP, and HTTPS
Experience with IP routingПрограмма курса:
After taking this course, you should be able to:
Describe and administer the Cisco Email Security Appliance (ESA)
Control sender and recipient domains
Control spam with Talos SenderBase and anti-spam
Use anti-virus and outbreak filters
Use mail policies
Use content filters
Use message filters to enforce email policies
Prevent data loss
Perform LDAP queries
Authenticate Simple Mail Transfer Protocol (SMTP) sessions
Authenticate email
Encrypt email
Use system quarantines and delivery methods
Perform centralized management using clusters
Test and troubleshootДополнительно:
This class includes lecture sections and some self-study sections. In instructor-led classes, lectures are delivered in real-time, either in person or via video conferencing. In e-learning classes, the lectures are on recorded videos
- SCOR — Implementing and Operating Cisco Security Core Technologies
- Длительность: 5 дней (40 часов)
- Код курса: SCOR
- Стоимость
- Очный формат: 731 000 ₸
- Онлайн формат: 713 000 ₸
Описание курса
Course Overview
The Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 course helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility and enforcements. You will get extensive hands-on experience deploying Cisco Firepower Next-Generation Firewall and Cisco ASA Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch Enterprise and Cisco Stealthwatch Cloud threat detection features.
This course, including the self-paced material, helps prepare you to take the exam, Implementing and Operating Cisco Security Core Technologies (350-701 SCOR), which leads to the new CCNP Security, CCIE Security, and the Cisco Certified Specialist — Security Core certifications.Course Content
Describing Information Security Concepts*
Describing Common TCP/IP Attacks*
Describing Common Network Application Attacks*
Describing Common Endpoint Attacks*
Describing Network Security Technologies
Deploying Cisco ASA Firewall
Deploying Cisco Firepower Next-Generation Firewall
Deploying Email Content Security
Deploying Web Content Security
Deploying Cisco Umbrella*
Explaining VPN Technologies and Cryptography
Introducing Cisco Secure Site-to-Site VPN Solutions
Deploying Cisco IOS VTI-Based Point-to-Point
Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW
Introducing Cisco Secure Remote Access VPN Solutions
Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW
Explaining Cisco Secure Network Access Solutions
Describing 802.1X Authentication
Configuring 802.1X Authentication
Describing Endpoint Security Technologies*
Deploying Cisco AMP for Endpoints*
Introducing Network Infrastructure Protection*
Deploying Control Plane Security Controls*
Deploying Layer 2 Data Plane Security Controls*
Deploying Layer 3 Data Plane Security Controls*
Deploying Management Plane Security Controls*
Deploying Traffic Telemetry Methods*
Deploying Cisco Stealthwatch Enterprise*
Describing Cloud and Common Cloud Attacks*
Securing the Cloud*
Deploying Cisco Stealthwatch Cloud*
Describing Software-Defined Networking (SDN*)* This section is self-study material that can be done at your own pace if you are taking the instructor-led version of this course.
Who should attend
Security Engineer
Network Engineer
Network Designer
Network Administrator
Systems Engineer
Consulting Systems Engineer
Technical Solutions Architect
Cisco Integrators/Partners
Network Manager
Cisco integrators and partnersCertifications
This course is part of the following Certifications:
Cisco Certified Networkn Professional Security
Prerequisites
To fully benefit from this course, you should have the following knowledge and skills:
Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA) v1.0 course
Familiarity with Ethernet and TCP/IP networking
Working knowledge of the Windows operating system
Working knowledge of Cisco IOS networking and concepts
Familiarity with basics of networking security conceptsCourse Objectives
After taking this course, you should be able to:
Describe information security concepts and strategies within the network
Describe common TCP/IP, network application, and endpoint attacks
Describe how various network security technologies work together to guard against attacks
Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall
Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance
Describe and implement web content security features and functions provided by Cisco Web Security Appliance
Describe Cisco Umbrella security capabilities, deployment models, policy management, and Investigate console
Introduce VPNs and describe cryptography solutions and algorithms
Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco IOS VTI-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco FirePower NGFW
Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and EAP authentication
Provide basic understanding of endpoint security and describe AMP for Endpoints architecture and basic features
Examine various defenses on Cisco devices that protect the control and management plane
Configure and verify Cisco IOS Software Layer 2 and Layer 3 Data Plane Controls
Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions
Describe basics of cloud computing and common cloud attacks and how to secure cloud environmentThis course will help you:
Gain hands-on experience implementing core security technologies and learn best practices using Cisco security solutions
Prepare for the Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) exam
Qualify for professional and expert-level security job roles
This course will help you prepare to take the Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) exam. This exam tests a candidate’s knowledge of implementing and operating core security technologies.Follow On Courses
Implementing Automation for Cisco Security Solutions (SAUI)
Securing Email with Cisco Email Security Appliance (SESA)
Implementing and Configuring Cisco Identity Services Engine (SISE)
Implementing Secure Solutions with Virtual Private Networks (SVPN)
Securing the Web with Cisco Web Security Appliance (SWSA)Lab Topology
Configure Network Settings and NAT on Cisco ASA
Configure Cisco ASA Access Control Policies
Configure Cisco Firepower NGFW NAT
Configure Cisco Firepower NGFW Access Control Policy
Configure Cisco Firepower NGFW Discovery and IPS Policy
Configure Cisco NGFW Malware and File Policy
Configure Listener, Host Access Table (HAT), and Recipient Access Table (RAT) on Cisco Email Security Appliance (ESA)
Configure Mail Policies
Configure Proxy Services, Authentication, and HTTPS Decryption
Enforce Acceptable Use Control and Malware Protection
Examine the Umbrella Dashboard
Examine Cisco Umbrella Investigate
Explore DNS Ransomware Protection by Cisco Umbrella
Configure Static VTI Point-to-Point IPsec IKEv2 Tunnel
Configure Point-to-Point VPN between the Cisco ASA and Cisco Firepower NGFW
Configure Remote Access VPN on the Cisco Firepower NGFW
Explore Cisco AMP for Endpoints
Perform Endpoint Analysis Using AMP for Endpoints Console
Explore File Ransomware Protection by Cisco AMP for Endpoints Console
Explore Cisco Stealthwatch Enterprise v6.9.3
Explore Cognitive Threat Analytics (CTA) in Stealthwatch Enterprise v7.0
Explore the Cisco Cloudlock Dashboard and User Security
Explore Cisco Cloudlock Application and Data Security
Explore Cisco Stealthwatch Cloud
Explore Stealthwatch Cloud Alert Settings, Watchlists, and SensorsTraining Content
Describing Information Security Concepts*
Information Security Overview
Managing Risk
Vulnerability Assessment
Understanding CVSSDescribing Common TCP/IP Attacks*
Legacy TCP/IP Vulnerabilities
IP Vulnerabilities
ICMP Vulnerabilities
TCP Vulnerabilities
UDP Vulnerabilities
Attack Surface and Attack Vectors
Reconnaissance Attacks
Access Attacks
Man-In-The-Middle Attacks
Denial of Service and Distributed Denial of Service Attacks
Reflection and Amplification Attacks
Spoofing Attacks
DHCP AttacksDescribing Common Network Application Attacks*
Password Attacks
DNS-Based Attacks
DNS Tunneling
Web-Based Attacks
HTTP 302 Cushioning
Command Injections
SQL Injections
Cross-Site Scripting and Request Forgery
Email-Based AttacksDescribing Common Endpoint Attacks*
Buffer Overflow
Malware
Reconnaissance Attack
Gaining Access and Control
Gaining Access via Social Engineering
Gaining Access via Web-Based Attacks
Exploit Kits and Rootkits
Privilege Escalation
Post-Exploitation Phase
Angler Exploit KitDescribing Network Security Technologies
Defense-in-Depth Strategy
Defending Across the Attack Continuum
Network Segmentation and Virtualization Overview
Stateful Firewall Overview
Security Intelligence Overview
Threat Information Standardization
Network-Based Malware Protection Overview
IPS Overview
Next Generation Firewall Overview
Email Content Security Overview
Web Content Security Overview
Threat Analytic Systems Overview
DNS Security Overview
Authentication, Authorization, and Accounting Overview
Identity and Access Management Overview
Virtual Private Network Technology Overview
Network Security Device Form Factors OverviewDeploying Cisco ASA Firewall
Cisco ASA Deployment Types
Cisco ASA Interface Security Levels
Cisco ASA Objects and Object Groups
Network Address Translation
Cisco ASA Interface ACLs
Cisco ASA Global ACLs
Cisco ASA Advanced Access Policies
Cisco ASA High Availability OverviewDeploying Cisco Firepower Next-Generation Firewall
Cisco Firepower NGFW Deployments
Cisco Firepower NGFW Packet Processing and Policies
Cisco Firepower NGFW Objects
Cisco Firepower NGFW NAT
Cisco Firepower NGFW Prefilter Policies
Cisco Firepower NGFW Access Control Policies
Cisco Firepower NGFW Security Intelligence
Cisco Firepower NGFW Discovery Policies
Cisco Firepower NGFW IPS Policies
Cisco Firepower NGFW Malware and File PoliciesDeploying Email Content Security
Cisco Email Content Security Overview
SMTP Overview
Email Pipeline Overview
Public and Private Listeners
Host Access Table Overview
Recipient Access Table Overview
Mail Policies Overview
Protection Against Spam and Graymail
Anti-virus and Anti-malware Protection
Outbreak Filters
Content Filters
Data Loss Prevention
Email EncryptionDeploying Web Content Security
Cisco WSA Overview
Deployment Options
Network Users Authentication
HTTPS Traffic Decryption
Access Policies and Identification Profiles
Acceptable Use Controls Settings
Anti-Malware ProtectionDeploying Cisco Umbrella*
Cisco Umbrella Architecture
Deploying Cisco Umbrella
Cisco Umbrella Roaming Client
Managing Cisco Umbrella
Cisco Umbrella Investigate OverviewExplaining VPN Technologies and Cryptography
VPN Definition
VPN Types
Secure Communication and Cryptographic Services
Keys in Cryptography
Public Key InfrastructureIntroducing Cisco Secure Site-to-Site VPN Solutions
Site-to-Site VPN Topologies
IPsec VPN Overview
IPsec Static Crypto Maps
IPsec Static Virtual Tunnel Interface
Dynamic Multipoint VPN
Cisco IOS FlexVPNDeploying Cisco IOS VTI-Based Point-to-Point
Cisco IOS VTIs
Static VTI Point-to-Point IPsec IKEv2 VPN ConfigurationDeploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW
Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW
Cisco ASA Point-to-Point VPN Configuration
Cisco Firepower NGFW Point-to-Point VPN ConfigurationTraining ContentIntroducing Cisco Secure Remote Access VPN Solutions
Remote Access VPN Components
Remote Access VPN Technologies
SSL OverviewDeploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW
Remote Access Configuration Concepts
Connection Profiles
Group Policies
Cisco ASA Remote Access VPN Configuration
Cisco Firepower NGFW Remote Access VPN ConfigurationExplaining Cisco Secure Network Access Solutions
Cisco Secure Network Access
Cisco Secure Network Access Components
AAA Role in Cisco Secure Network Access Solution
Cisco Identity Services Engine
Cisco TrustSecDescribing 802.1X Authentication
802.1X and EAP
EAP Methods
Role of RADIUS in 802.1X Communications
RADIUS Change of AuthorizationConfiguring 802.1X Authentication
Cisco Catalyst Switch 802.1X Configuration
Cisco WLC 802.1X Configuration
Cisco ISE 802.1X Configuration
Supplicant 802.1x Configuration
Cisco Central Web AuthenticationDescribing Endpoint Security Technologies*
Host-Based Personal Firewall
Host-Based Anti-Virus
Host-Based Intrusion Prevention System
Application Whitelists and Blacklists
Host-Based Malware Protection
Sandboxing Overview
File Integrity CheckingDeploying Cisco AMP for Endpoints*
Cisco AMP for Endpoints Architecture
Cisco AMP for Endpoints Engines
Retrospective Security with Cisco AMP
Cisco AMP Device and File Trajectory
Managing Cisco AMP for EndpointsIntroducing Network Infrastructure Protection*
Identifying Network Device Planes
Control Plane Security Controls
Management Plane Security Controls
Network Telemetry
Layer 2 Data Plane Security Controls
Layer 3 Data Plane Security ControlsDeploying Control Plane Security Controls*
Infrastructure ACLs
Control Plane Policing
Control Plane Protection
Routing Protocol SecurityDeploying Layer 2 Data Plane Security Controls*
Overview of Layer 2 Data Plane Security Controls
VLAN-Based Attacks Mitigation
STP Attacks Mitigation
Port Security
Private VLANs
DHCP Snooping
ARP Inspection
Storm Control
MACsec EncryptionDeploying Layer 3 Data Plane Security Controls*
Infrastructure Antispoofing ACLs
Unicast Reverse Path Forwarding
IP Source Guard* This section is self-study material that can be done at your own pace if you are taking the instructor-led version of this course.
- SVPN — Implementing Secure Solutions with Virtual Private Networks
- Длительность: 5 дней (40 часов)
- Код курса: SVPN
- Стоимость
- Очный формат: 1 049 000 ₸
- Онлайн формат: 1 021 000 ₸
Описание курса
Длительность обучения:
Instructor-led training: 5 days in the classroom
Virtual instructor-led training: 5 days of web-based classes
E-learning: Equivalent to 5 days of classroom instructionКому следует посетить:
This course is designed for professionals in the following job roles:
Network security engineer
CCNP Security candidate
Channel PartnerПредварительные требования:
Before taking this course, you should have the following knowledge and skills:
Familiarity with the various Cisco router and firewall command modes
Experience navigating and managing Cisco routers and firewalls
Clear understanding of the benefits of site-to-site and Remote Access VPN options
The following Cisco courses can help you gain the knowledge you need to prepare for this course:
Implementing and Administering Cisco Solutions (CCNA®)
Implementing and Operating Cisco Security Core Technologies (SCOR)Программа курса:
After taking this course, you should be able to:
Introduce site-to-site VPN options available on Cisco router and firewalls
Introduce remote access VPN options available on Cisco router and firewalls
Review site-to-site and remote access VPN design options
Review troubleshooting processes for various VPN options available on Cisco router and firewallsДополнительно:
This class includes lecture sections and some self-study sections. In instructor-led classes, lectures are delivered in real-time, either in person or via video conferencing. In e-learning classes, the lectures are on recorded videos
- SECICC — Introducing Cisco Cloud Consumer Security
- Длительность: 1 день (8 часов)
- Код курса: SECICC
- Стоимость
- Очный формат: 936 000 ₸
- Онлайн формат: 868 000 ₸
Описание курса
Длительность обучения:
Instructor-led training: 1 day in the classroom
Virtual instructor-led training: 1 day of web-based classes
E-learning: Equivalent of 1 day of instruction with hands-on lab practiceКому следует посетить:
This course benefits cloud consumers and administrators of public cloud, private cloud, and hybrid cloud infrastructures:
Security architects
Cloud architects
Network engineers and administrators
System engineers and adminstrators
Cloud security consumers
Cloud application administrators
IT managers
Line of business managers
Cisco integrators and partnersПредварительные требования:
This course has no prerequisites, but you’ll get the most from the course if you have the following knowledge and skills:
Basic computer literacy
Basic PC operating system navigation skills
Basic Internet usage skills
Basic IP address knowledge
We also recommend that you have the following skills:
Prior knowledge of cloud computing and virtualization software basicsПрограмма курса:
After taking this course, you should be able to:
Describe public, private, and hybrid cloud models, concepts, and design
Explain the concepts and components for securing cloud environments
Describe Cisco security offerings for Amazon Web Services (AWS)
Define methods to secure SaaS application usageДополнительно:
This class includes lecture sections and some self-study sections. In instructor-led classes, lectures are delivered in real-time, either in person or via video conferencing. In e-learning classes, the lectures are on recorded videos
- SECCLD — Securing Cloud Deployments with Cisco Technologies
- Длительность: 4 дня (32 часа)
- Код курса: SECCLD
- Стоимость
- Очный формат: 933 000 ₸
- Онлайн формат: 843 500 ₸
Описание курса
Длительность обучения:
Instructor-led training: 4 days in the classroom with hands-on lab practice
Virtual instructor-led training: 4 days of web-based classes with hands-on lab practice
E-learning: Equivalent of 4 days of instruction with videos, practice, and challengesКому следует посетить:
This course is open to engineers, administrators, and security-minded users of public, private, and hybrid cloud infrastructures responsible for implementing security in cloud environments:
Security architects
Cloud architects
Security engineers
Cloud engineers
System engineers
Cisco integrators and partnersПредварительные требования:
To fully benefit from this course, you should have completed the following course or obtained the equivalent knowledge and skills:
Knowledge of cloud computing and virtualization software basics
Ability to perform basic UNIX-like OS commands
Cisco CCNP® security knowledge or understanding of the following topic areas:
Topic areas/Available in these courses
Cisco Adaptive Security Appliance (ASA) and Adaptive Security Virtual Appliance (ASAv) deployment, and Cisco IOS® Flexible NetFlow operations/Implementing Cisco Edge Network Security Solutions (SENSS)
Cisco NGFW (Cisco Firepower Threat Defense [FTD]), Cisco Firepower, and Cisco Firepower Management Center (FMC) deployment
Cisco Content Security operations including Cisco Web Security Appliance (WSA)/ Cisco Email Security Appliance (ESA)/Cisco Cloud Web Security (CWS)Cisco AMP for network and endpoints deployment/Implementing Cisco Threat Control Solutions (SITCS)
Cisco ISE operations and Cisco TrustSec architecture/Implementing Cisco Secure Access Solutions (SISAS)
VPN operation/Implementing Cisco Secure Mobility Solutions (SIMOS)Программа курса:
After taking this course, you should be able to:
Contrast the various cloud service and deployment models
Implement the Cisco Security Solution for SaaS using Cisco Cloudlock Micro Services
Deploy cloud security solutions using Cisco AMP for Endpoints, Cisco Umbrella, and Cisco Cloud Email Security
Define Cisco cloud security solutions for protection and visibility using Cisco virtual appliances and Cisco Stealthwatch Cloud
Describe the network as a sensor and enforcer using Cisco Identity Services Engine (ISE), Cisco Stealthwatch Enterprise, and Cisco TrustSec®
Implement Cisco Firepower NGFW Virtual (NGFWv) and Cisco Stealthwatch Cloud to provide protection and visibility in AWS environments
Explain how to protect the cloud management infrastructure by using specific examples, defined best practices, and AWS reporting capabilitiesДополнительно:
This class includes lecture sections and some self-study sections. In instructor-led classes, lectures are delivered in real-time, either in person or via video conferencing. In e-learning classes, the lectures are on recorded videos
- UCSEC — Implementing Cisco Unified Communications Security
- Длительность: 5 дней (40 часов)
- Код курса: UCSEC
- Стоимость
- Очный формат: 1 444 000 ₸
- Онлайн формат: 1 359 000 ₸
Описание курса
Кому следует посетить:
Курс предназначен для тех, кто работает на стыке телефонии и информационной безопасности, а также всем инженерам, работающим с архитектурой и продуктами UC. Данный курс следует посетить сетевым администраторам, сетевым инженерам, а также системным инженерам.
Предварительные требования:
Перед посещением данного курса слушатели должны обладать следующими навыками:
Практические знания конвергентных голосовых сетей и СХД
Знакомство с Cisco IOS gateway, Cisco Unified SRST gateway и Cisco Unified Border Element
Знание продуктов Cisco Unified Communications Manager и Cisco Unified Communications Manager Express
Рекомендовано наличие сертификата CCNP® VoiceДополнительные навыки, которые будут полезны:
Знание основ сетевой безопасности
Знание технологий Cisco IOS Firewall и Cisco ASA adaptive security appliance firewalls
Знакомство с IPsec и SSL VPNs
Рекомендовано наличие сертификата CCNA® SecurityЦели курса:
После посещения тренинга слушатели смогут:
Определять уязвимые места в сетях Cisco Unified Communications, а также описывать стратегии безопасности, криптографические сервисы , PKI и технологии VPN
Использовать функционал системы безопасности сетевой инфраструктуры
Внедрять Cisco Unified Communications Manager и Cisco Unified Communications endpoint security featuresСодержание курса:
5-дневный курс UCSEC посвящен описанию уязвимостей и атак на инфраструктуру IP-телефонии, а также методов борьбы с ними и методов обеспечения безопасности инфраструктуры. За время курса слушатели научатся определять уязвимые места в сетях Cisco Unified Communications, а также описывать стратегии безопасности, криптографические сервисы PKI и технологии VPN, использовать функционал системы безопасности сетевой инфраструктуры и внедрять функции безопасности в Cisco Unified Communications Manager и терминалах Cisco.
Программа курса
1. Введение
2. Уязвимости сети Cisco Unified Communications и основы безопасности
2.1. Оценка уязвимостей сети Cisco Unified Communications
2.2. Стратегии реализации безопасности
2.3. Криптографические службы и функции
2.4. Управления ключами и PKI
2.5. IPsec и Cisco AnyConnect SSL VPN
2.6. Лабораторная работа 1: Идентификация уязвимых мест в Cisco UC сетях3. Функционал системы безопасности сетевой инфраструктуры
3.1. Разделение сети и фильтрация пакетов
3.2. Функции безопасности коммутаторов
3.3. Cisco AnyConnect SSL VPN в сетях Cisco Unified Communications
3.4. Лабораторная работа 2: Внедрение межсетевых экранов
3.5. Лабораторная работа 3: Внедрение 802.1X
3.6. Лабораторная работа 4: Внедрение Cisco AnyConnect SSL VPN-ов4. Cisco Unified Communications Manager и функции защиты абонентских устройств
4.1. Повышение защиты абонентских устройств
4.2. Предотвращение мошеннических звонков
4.3. Встроенные функции безопасности Cisco Unified Communications Manager
4.4. Функции безопасности Cisco Unified Communications Manager, основанные на маркерах безопасности
4.5. Лабораторная работа 5: Внедрение механизмов безопасности Cisco Unified Communications Manager, основанных на безопасных токенах5. Интеграция Cisco Unified Communications с внешними элементами защиты
5.1. Применение SRTP для шлюзов и защита сигнала средствами IPSec
5.2. Применение SRTP для шлюзов и защита сигнала в SRST and Cisco Unified Communications Manager Express
5.3. Trusted Relay Points
5.4. Прокси
5.5. Лабораторная работа 6: Внедрение SRTP на шлюзах и защита сигнализации с помощью IPsec
5.6. Лабораторная работа 7: Внедрение безопасного SRST и безопасного Cisco Unified Communications Manager Express
5.7. Лабораторная работа 8: Внедрение Trusted Relay Points
5.8. Лабораторная работа 9: Внедрение прокси для сигнализации и RTP потоков - 802.1x — Introduction to 802.1X Operations for Cisco Security Professionals
- Длительность: 3 дня (24 часа)
- Код курса: 802.1X
- Стоимость
- Очный формат: 752 000 ₸
- Онлайн формат: 657 000 ₸
Описание курса
Описание курса:
Этот курс предназначен для инженеров и менеджеров, обслуживающих клиентов с решениями на базе 802.1x, архитекторов систем информационной безопасности, инженеров и других специалистов, желающие получить практический опыт реализации архитектуры Cisco TrustSec 802.1X на базе Cisco ISE.
Предварительные требования:
Сертификация CCNA
Участие в тренинге Обеспечение безопасности сетей с помощью маршрутизаторов и коммутаторов Cisco (SECURE) или эквивалентный объем знаний
Знание Microsoft Windows Server 2008 Active Directory
Знание принципов работы легковесных беспроводных точек и контроллеров беспроводных точек Cisco
Умение базовой настройки коммутаторов Cisco Catalyst при помощи командной строкиПосле прохождения обучения слушатели будут уметь:
Описывать принципы Cisco TrustSec
Описывать принципы, архитектуру и требования к реализации IEEE 802.1X
Описывать как протокол аутентификации RADIUS используется в Cisco TrustSec
Настроить работу ISE для 802.1x
Описывать клиентскую часть IEEE 802.1X от Microsoft, Apple и Cisco
Настраивать IEEE 802.1X для проводной сети
Настраивать IEEE 802.1X для беспроводной сети
Описывать, каким образом можно реализовать сервис защищенного гостевого доступа в сети Cisco TrustSec
Построить общий дизайн сети Cisco TrustSec с использованием IEEE 802.1XСодержание курса:
Это 3-дневный курс, разработанный для подготовки системных инженеров компаний-партнеров к конфигурации решений Cisco TrustSec на базе Cisco Identity Services Module, коммутаторов Cisco Catalyst, и контроллеров Cisco Wireless LAN.
Цель курса — обеспечить участников базовыми знаниями о возможностях и функциях протокола IEEE 802.1X, а также умением настроить Cisco Identity Services Engine (ISE) для работы 802.1X. Курс описывает архитектуру, компоненты и возможности сети Cisco TrustSec на базе протоколов IEEE 802.1X и RADIUS.
Студенты получат практический опыт конфигурации сетевых служб на базе 802.1X при помощи Cisco ISE, коммутаторов Cisco Catalyst, а также беспроводных продуктов Cisco. Этот курс является предварительным требованием для прохождения тренинга Внедрение решения Cisco Identity Services Engine (ISE). На данный момент только сертифицированные партнеры ATP (Authorized Technology Partners) могут продавать решения Cisco ISE/802.1x.
Программа курса:
Введение
Архитектура Cisco TrustSec
Обзор Cisco TrustSec
Обзор составляющих архитектуры Cisco TrustSec
Обзор аутентификации на уровне порта
Обзор стандарта IEEE 802.1X
Обзор 802.1X и EAP
Роль протокола RADIUS в соединениях, использующих протокол EAP
Лабораторная работа 1: Предварительная настройка сетиКонфигурация устройств для работы с 802.1X
Компоненты и топологии 802.1X
Конфигурация Cisco ISE для работы с 802.1X
Конфигурация сетевых устройств для поддержки 802.1X
Конфигурация клиентских станций для поддержки 802.1X
Лабораторная работа 2: Настройка компонентов 802.1X на Cisco ISE, коммутаторе, WLC и клиенте
Конфигурация гостевого доступаКонфигурация Cisco TrustSec для клиентских станций без поддержки 802.1X
Конфигурация Cisco WebAuth для клиентских станций без поддержки 802.1X
Лабораторная работа 3: Настройка гостевого доступа с помощью веб-аутентификацииРазработка дизайна сетей Cisco TrustSec на базе Cisco ISE и 802.1X
Совместимость составляющих сети с 802.1X
Обзор нюансов внедрения 802.1X, влияющих на дизайн сети
Обзор масштабируемых архитектур 802.1X
Лабораторная работа 4: Построение архитектуры Cisco TrustSecИтоговый контроль знаний
- SSFIPS — Securing Networks with Cisco Firepower Next-Generation IPS
- Длительность: 5 дней (40 часов)
- Код курса: SSFIPS
- Стоимость
- Очный формат: 1 049 000 ₸
- Онлайн формат: 1 021 000 ₸
Описание курса
Кому следует посетить:
Этот курс предназначен для технических специалистов, которым необходимо знать, как развертывать Cisco Firepower NGIPS и управлять им в своей сетевой среде.
Администраторы безопасности
Консультанты по безопасности
Сетевые администраторы
Системные инженеры
Персонал технической поддержки
Торговые партнеры и реселлерыПредварительные требования:
Для прохождения данного курса рекомендуется обладать знаниями и навыками:
Базовое понимание работы TCP/IP сетей
Базовые знания о работе систем IDS и IPSЦели курса:
После прохождения данного курса слушатели будут уметь:
Описывать компоненты Cisco Firepower Threat Defense, управлять процессом регистрации устройства
Настраивать политику обнаружения устройств
Внедрять политик контроля доступа
Настраивать intrusion-политики
Создавать и анализировать отчеты Firepower Management Center
Интегрировать Firepower Management Center с внешними системами логирования
Обновлять ПО и управлять административными аккаунтами Firepower Management Center
Использовать базовые команды и инструменты для поиска и устранения неполадок в работе Firepower Management Center и устройств Firepower Threat DefenseПрограмма курса:
Введение
Обзор Cisco Firepower Threat Defense
Сравнение и анализ систем предотвращения вторжений и межсетевых экранов
Основные функции и компоненты системы Firepower Threat Defense
Сравнение модельного ряда
Принципы лицензирования
Процесс внедрения FirepowerНастройки устройства Firepower NGFW
FXOS и Firepower Device Manager
Управление устройствами
Исследование политик Firepower Management Center
Системные настройки, показатели здоровья устройстваКонтроль трафика
Packet Processing
BypassingМеханизм анализа сети Firepower Discovery
Обзор механизма анализа сети
Анализ профиля хоста
Работа с идентификационной информацией пользователяПолитика контроля доступа к ресурсам
Введение, анализ работы политики
Анализ списка правил, действие по умолчанию
Further Inspection
Расширенные функции
Рекомендации для внедрения политики контроля доступаМеханизм Security Intelligence
Обзор механизма Security Intelligence
Объекты Security Intelligence
Настройка Security Intelligence, анализ логовКонтроль файлов и расширенная защита от вредоносного ПО
Анализ файловой политики
Анализ сервиса AMPСистема предотвращения вторжений
Введение, Snort-правила
Variables, Variable Set
Создание IPS-политики
Настройка IPS-политики
Управление IPS-политикойПолитика анализа сети
Исследование работы препроцессора
Обзор политики анализа сетиДополнительные техники анализа
Анализ событий
Типа событий
Контекстная информация
Инструменты для анализаИнтеграция с другими платформами
Интеграция с Cisco ISE
Интеграция со SplunkПолитики корреляции и оповещения
Оповещение внешних систем
Политика корреляцииСистемное администрирование
Обновления ПО
Управление пользовательскими аккаунтамиПоиск и устранение неполадок в работе системы Firepower
Распространенные ошибки в настройках
Команды для поиска и устранения неполадок
Packet Capture - FTD — Cisco Secure Firewall 7.2 Implementation
- Длительность: 5 дней (40 часов)
- Код курса: FTD
- Стоимость
- Очный формат: 1 396 000 ₸
- Онлайн формат: 1 277 000 ₸
Описание курса
Этот курс поможет Вам:
Получить знания и навыки, которые необходимы для настройки и эксплуатации передовой сетевой системы защиты информации Cisco.
В процессе прохождения данного курса Вы научитесь:
Понимать архитектуру, разбираться в управляющих и исполнительных компонентах системы, понимать взаимодействия между компонентами системы;
Понимать принципы лицензирования;
Понимать возможные варианты разворачивания компонентов системы;
Понимать назначение, редактировать и создавать политики Management;
Понимать возможные пути прохождения трафика через систему;
Использовать механизм Discovery для анализа сети и создания профилей хостов;
Использовать механизм Security Intelligence;
Понимать принципы работы, редактировать и создавать политики контроля доступа к ресурсам, политики контроля файлов и сервиса AMP, политики системы предотвращения вторжений, политики анализа сети;
Работать с инструментами для анализа событий;
Искать и устранять неполадки в работе системы.Предварительные требования:
Данный курс предполагает наличие у слушателей базового знания сетевых технологий, терминологии в области ИБ, умения работать с Windows Workstation, понимания TCP/IP.
Course Outline
1. Cisco Secure Firewall Family
2. Cisco Firepower Threat Defense Components and Features
3. Firepower Threat Defense High Availability and Clustering
4. Routing for Firepower Threat Defense
5. Network Address Translation (NAT)
6. Firepower Discovery
7. Prefiltering and Prefilter Policies
8. Security Intelligence
9. SSL Policy
10. Access Control Policy
11. File Control and Advanced Malware Protection
12. Next-Generation Intrusion Prevention Systems
13. Network Analysis Policies
14. Correlation Policy
15. Firepower QoS
16. Firepower Threat Defense VPN
17. Cisco Threat Intelligence Director
18. Event Analysis Techniques
19. Cisco Secure Firewall TroubleshootingLab Outline
1. Navigating Firepower Management Center
2. FTD Device Configuration
3. NAT Configuration
4. Network Discovery Policy
5. Object Management
6. Access Control Policy
7. Security Intelligence
8. File Policy
9. Intrusion Policy
10. Network Analysis Policy
11. SSL Policy Configuration
12. QoS Policy Configuration
13. Correlation Policy - SDAFND — Understanding Cisco SDA Fundamentals
- Длительность: 3 дня (24 часа)
- Код курса: SDAFND
- Стоимость
- Очный формат: 1 011 000 ₸
- Онлайн формат: 917 000 ₸
Описание курса
Course Overview
The Understanding Cisco SDA Fundamentals (SDAFND) v1.0 course introduces you to Cisco® Software-Defined Access and teaches you, through a combination of lectures and labs, how to implement simple, single-site fabric networks. You will learn the benefits of leveraging Software-Defined Access in the Cisco-powered Enterprise Campus network. SDAFND will introduce the solution, its architecture and components, and guide you through labs to design and deploy simple Cisco SD-Access networks.
This course will help you:
Deploy Cisco SD-Access networks
Explain Cisco Software-Designed Access
Operate, manage, and integrate Cisco DNA Center™
Prepare for various Cisco certifications: Cisco Certified Specialist – Enterprise Core (ENCOR), and Cisco Certified Specialist – Enterprise Design (ENSLD)Who should attend
Field engineers
Network engineers
Network administrators
System engineersPrerequisites
To fully benefit from this course, you should have the following knowledge and skills:
CCNP® level core networking knowledge
Ability to use Windows and Linux CLI tools such as ping, SSH, or running scriptsThese are the recommended Cisco offerings that may help you meet these prerequisites:
Implementing and Administering Cisco Solutions (CCNA)
Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)Course Objectives
After taking this course, you should be able to:
Describe Cisco SD-Access architecture and its components
Explain Cisco DNA Center deployment models, scaling, and high availability
Identify Cisco SD-Access fabric protocols and node roles
Understand the Cisco SD-Access Wireless deployment models
Automate Day 0 device onboarding with Cisco DNA Center LAN Automation and Network PnP
Deploy simple Cisco SD-Access fabric networks
Monitor health and performance of the network with Cisco DNA Center Assurance
Interact with the Cisco DNA Center Platform Intent APIsCourse Outline:
Understanding Cisco SDA Fundamentals (SDAFND)
Introducing Cisco SD-Access
Introducing Cisco DNA Center
Exploring Cisco SD-Access Solution Components
Exploring Cisco SD-Access Wireless Architecture
Automating Network Changes with Cisco DNA Center
Deploying Fabric Networks with Cisco DNA Center
Exploring Cisco DNA Center Assurance
Exploring Cisco DNA Center ProgrammabilityLab Topology
Explore Cisco DNA Center User Interface
Verify Location Identifier Separation Protocol (LISP) Operation in Cisco SD-Access
Integrate Cisco DNA Center and Cisco Identity Services Engine (Cisco ISE)
Provision Access Points in Cisco DNA Center
Provision Underlay Networks with Cisco DNA Center LAN Automation
Provision Underlay Networks with Cisco DNA Center LAN Automation (cont.)
Deploy Cisco SD-Access Single Site Fabric
Deploy Cisco SD-Access Single Site Fabric (cont.)
Explore Cisco DNA Center Assurance
Cisco DNA Assurance Issues and Guided Remediation
Interact with Cisco DNA Center Intent APIs Using Python - SSFAMP — Protecting against Malware Threats with Cisco AMP for Endpoints
- Длительность: 3 дня (24 часа)
- Код курса: SSFAMP
- Стоимость
- Очный формат: 750 500 ₸
- Онлайн формат: 655 500 ₸
Описание курса
Course Overview
The Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) v6.0 course shows you how to deploy and use Cisco® AMP for Endpoints, a next-generation endpoint security solution that prevents, detects, and responds to advanced threats. Through expert instruction and hands-on lab exercises, you will learn how to implement and use this powerful solution through several step-by-step attack scenarios. You’ll learn how to build and manage a Cisco AMP for Endpoints deployment, create policies for endpoint groups, and deploy connectors. You will also analyze malware detections using the tools available in the AMP for Endpoints console.
How you’ll benefit
This class will help you:
Learn how to deploy and manage Cisco AMP for Endpoints
Succeed in today’s high-demand security operations rolesWho should attend
Cisco integrators, resellers, and partners
Network administrators
Security administrators
Security consultants
Systems engineers
Technical support personnelPrerequisites
To fully benefit from this course, you should have the following knowledge and skills:
Technical understanding of TCP/IP networking and network architecture
Technical understanding of security concepts and protocols
The recommended Cisco offering may help you meet these prerequisites:Implementing and Administering Cisco Solutions (CCNA)
Course Objectives
After taking this course, you should be able to:
Identify the key components and methodologies of Cisco Advanced Malware Protection (AMP)
Recognize the key features and concepts of the AMP for Endpoints product
Navigate the AMP for Endpoints console interface and perform first-use setup tasks
Identify and use the primary analysis features of AMP for Endpoints
Use the AMP for Endpoints tools to analyze a compromised host
Analyze files and events by using the AMP for Endpoints console and be able to produce threat reports
Configure and customize AMP for Endpoints to perform malware detection
Create and configure a policy for AMP-protected endpoints
Plan, deploy, and troubleshoot an AMP for Endpoints installation
Use Cisco Orbital to pull query data from installed AMP for Endpoints connectors.
Describe the AMP Representational State Transfer (REST) API and the fundamentals of its use
Describe all the features of the Accounts menu for both public and private cloud installationsCourse Outline:
Protecting against Malware Threats with Cisco AMP for Endpoints (SSFAMP)
Introducing to Cisco AMP Technologies
Introducing AMP for Endpoints Overview and Architecture
Navigating the Console Interface
Using Cisco AMP for Endpoints
Identifying Attacks
Analyzing Malware
Managing Outbreak Control
Creating Endpoint Policies
Working with AMP for Endpoint Groups
Using Orbital for Endpoint Visibility
Introducing AMP REST API
Navigating AccountsLab Topology
Amp Account Self-Registration
Accessing AMP for Endpoints
Attack Scenario
Analysis Tools and Reporting
Outbreak Control
Endpoint Policies
Groups and Deployment
Testing Your Configuration
Endpoint Visibility Using Orbital
REST API
Endpoint Isolation Using Cisco AMP API
User Accounts - SSFRULES — Securing Cisco Networks with Snort Rule Writing Best Practices
- Длительность: 3 дня (24 часа)
- Код курса: SSFRULES
- Стоимость
- Очный формат: 750 500 ₸
- Онлайн формат: 655 500 ₸
Описание курса
Course Overview
The Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRules) v2.1 course shows you how to write rules for Snort, an open-source intrusion detection and prevention system. Through a combination of expert-instruction and hands-on practice, this course provides you with the knowledge and skills to develop and test custom rules, standard and advanced rules-writing techniques, how to integrate OpenAppID into rules, rules filtering, rules tuning, and more. The hands-on labs give you practice in creating and testing Snort rules.
This course will help you:
Gain an understanding of characteristics of a typical Snort rule development environment
Gain hands-on practices on creating rules for Snort
Gain knowledge in Snort rule development, Snort rule language, standard and advanced rule optionsWho should attend
This course is for technical professionals to gain skills in writing rules for Snort-based intrusion detection systems (IDS) and intrusion prevention systems (IPS). The primary audience includes:
Security administrators
Security consultants
Network administrators
System engineers
Technical support personnel using open source IDS and IPS
Channel partners and resellersPrerequisites
To fully benefit from this course, you should have:
Basic understanding of networking and network protocols
Basic knowledge of Linux command-line utilities
Basic knowledge of text editing utilities commonly found in Linux
Basic knowledge of network security concepts
Basic knowledge of a Snort-based IDS/IPS systemCourse Objectives
After taking this course, you should be able to:
Describe the Snort rule development process
Describe the Snort basic rule syntax and usage
Describe how traffic is processed by Snort
Describe several advanced rule options used by Snort
Describe OpenAppID features and functionality
Describe how to monitor the performance of Snort and how to tune rulesCourse Outline:
Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRULES)
Introduction to Snort Rule Development
Snort Rule Syntax and Usage
Traffic Flow Through Snort Rules
Advanced Rule Options
OpenAppID Detection
Tuning SnortLab Topology
Connecting to the Lab Environment
Introducing Snort Rule Development
Basic Rule Syntax and Usage
Advanced Rule Options
OpenAppID
Tuning Snort - SSFSNORT — Securing Cisco Networks with Open Source Snort
- Длительность: 4 дня (32 часа)
- Код курса: SSFSNORT
- Стоимость
- Очный формат: 1 206 000 ₸
- Онлайн формат: 1 116 000 ₸
Описание курса
Course Overview
The Securing Cisco Networks with Open Source Snort (SSFSNORT) v2.1 course shows you how to deploy a network intrusion detection system based on Snort. Through a combination of expert instruction and hands-on practice, you will learn how to install, configure, operate, and manage a Snort system, rules writing with an overview of basic options, advanced rules writing, how to configure Pulled Pork, and how to use OpenAppID to provide protection of your network from malware. You will learn techniques of tuning and performance monitoring, traffic flow through Snort rules, and more.
This course will help you:
Learn how to implement Snort, an open-source, rule-based, intrusion detection and prevention system
Gain leading-edge skills for high-demand responsibilities focused on securityWho should attend
This course is for technical professionals who need to know how to deploy open source intrusion detection systems (IDS) and intrusion prevention systems (IPS), and how to write Snort rules.
Security administrators
Security consultants
Network administrators
System engineers
Technical support personnel
Channel partners and resellersPrerequisites
To fully benefit from this course, you should have:
Technical understanding of TCP/IP networking and network architecture
Proficiency with Linux and UNIX text editing tools (vi editor is suggested by not required)Course Objectives
After taking this course, you should be able to:
Describe Snort technology and identify resources available for maintaining a Snort deployment
Install Snort on a Linux-based operating system
Describe the Snort operation modes and their command-line options
Describe the Snort intrusion detection output options
Download and deploy a new rule set to Snort
Describe and configure the snort.conf file
Configure Snort for inline operation and configure the inline-only features
Describe the Snort basic rule syntax and usage
Describe how traffic is processed by the Snort engine
Describe several advanced rule options used by Snort
Describe OpenAppID features and functionality
Describe how to monitor Snort performance and how to tune rules
Course BenefitsCourse Outline:
Securing Cisco Networks with Open Source Snort (SSFSNORT)
Introduction to Snort Technology
Snort Installation
Snort Operation
Snort Intrusion Detection Output
Rule Management
Snort Configuration
Inline Operation and Configuration
Snort Rule Syntax and Usage
Traffic Flow Through Snort Rules
Advanced Rule Options
OpenAppID Detection
Tuning SnortLab Outline
Connecting to the Lab Environment
Snort Installation
Snort Operation
Snort Intrusion Detection Output
Pulled Pork Installation
Configuring Variables
Reviewing Preprocessor Configurations
Inline Operations
Basic Rule Syntax and Usage
Advanced Rule Options
OpenAppID
Tuning Snort - SSNGFW — Securing Networks with Cisco Firepower Next Generation Firewall
- Длительность: 5 дней (40 часов)
- Код курса: SSNGFW
- Стоимость
- Очный формат: 1 608 500 ₸
- Онлайн формат: 1 588 500 ₸
Описание курса
Course Overview
The Securing Networks with Cisco Firepower Next Generation Firewall (SSNGFW) v1.0 course shows you how to deploy and use Cisco Firepower® Threat Defense system. This hands-on course gives you knowledge and skills to use and configure Cisco® Firepower Threat Defense technology, beginning with initial device setup and configuration and including routing, high availability, Cisco Adaptive Security Appliance (ASA) to Cisco Firepower Threat Defense migration, traffic control, and Network Address Translation (NAT). You will learn how to implement advanced Next-Generation Firewall (NGFW) and Next-Generation Intrusion Prevention System (NGIPS) features, including network intelligence, file type detection, network-based malware detection, and deep packet inspection. You will also learn how to configure site-to-site VPN, remote-access VPN, and SSL decryption before moving on to detailed analysis, system administration, and troubleshooting.
Course Prerequisites
Attendees should meet the following prerequisites:
Knowledge of TCP/IP and basic routing protocols — ICND1 or CCNA Recommended
Familiarity with firewall, vpn and IPS concepts — IINS or SFNDU RecommendedRecommended prerequisites:
CCNA — Implementing and Administering Cisco Solutions
SCOR — Implementing and Operating Cisco Security Core TechnologiesTarget Audience:
This course is designed for technical professionals who need to know how to deploy and manage a Cisco Firepower NGIPS and NGFW in their network environments.
Course Objectives:
After completing this course, you should be able to:
Describe key concepts of NGIPS and NGFW technology and the Cisco Firepower Threat Defense system and identify deployment scenarios
Perform initial Firepower Threat Defense device configuration and setup tasks
Describe how to manage traffic and implement Quality of Service (QoS) using Cisco Firepower Threat Defense
Describe how to implement NAT by using Cisco Firepower Threat Defense
Perform an initial network discovery, using Cisco Firepower to identify hosts, applications and services
Describe the behavior, usage and implementation procedure for access control policies
Describe the concepts and procedures for implementing security Intelligence features
Describe Cisco AMP for Networks and the procedures for implementing file control and Advanced Malware Protection
Implement and manage intrusion policies
Describe the components and configuration of site-to-site VPN
Describe and configure a remote-access SSL VPN that uses Cisco AnyConnect
Describe SSL decryption capabilities and usageCourse Content:
Cisco Firepower Threat Defense Overview:
Examining Firewall and IPS Technology
Firepower Threat Defense Features and Components
Examining Firepower Platforms
Examining Firepower Threat Defense Licensing
Cisco Firepower Implementation Use CasesCisco Firepower NGFW Device Configuration
Firepower Threat Defense Device Registration
FXOS and Firepower Device Manager
Initial Device Setup
Managing NGFW Devices
Examining Firepower Management Center Policies
Examining Objects
Examining System Configuration and Health Monitoring
Device Management
Examining Firepower High Availability
Configuring High Availability
Cisco ASA to Firepower Migration
Migrating from Cisco ASA to Firepower Threat DefenseCisco Firepower NGFW Traffic Control
Firepower Threat Defense Packet Processing
Implementing QoS
Bypassing TrafficCisco Firepower NGFW Address Translation
NAT Basics
Implementing NAT
NAT Rule Examples
Implementing NATCisco Firepower Discovery
Examining Network Discovery
Configuring Network DiscoveryImplementing Access Control Policies
Examining Access Control Policies
Examining Access Control Policy Rules and Default Action
Implementing Further Inspection
Examining Connection Events
Access Control Policy Advanced Settings
Access Control Policy Considerations
Implementing an Access Control PolicySecurity Intelligence
Examining Security Intelligence
Examining Security Intelligence Objects
Security Intelligence Deployment and Logging
Implementing Security IntelligenceFile Control and Advanced Malware Protection
Examining Malware and File Policy
Examining Advanced Malware ProtectionNext-Generation Intrusion Prevention Systems
Examining Intrusion Prevention and Snort Rules
Examining Variables and Variable Sets
Examining Intrusion PoliciesSite-to-Site VPN
Examining IPsec
Site-to-Site VPN Configuration
Site-to-Site VPN Troubleshooting
Implementing Site-to-Site VPNRemote-Access VPN
Examining Remote-Access VPN
Examining Public-Key Cryptography and Certificates
Examining Certificate Enrollment
Remote-Access VPN Configuration
Implementing Remote-Access VPNSSL Decryption
Examining SSL Decryption
Configuring SSL Policies
SSL Decryption Best Practices and MonitoringDetailed Analysis Techniques
Examining Event Analysis
Examining Event Types
Examining Contextual Data
Examining Analysis Tools
Threat AnalysisSystem Administration
Managing Updates
Examining User Account Management Features
Configuring User Accounts
System AdministrationCisco Firepower Troubleshooting
Examining Common Misconfigurations
Examining Troubleshooting Commands
Firepower TroubleshootingLabs
Lab 1: Initial Device Setup
Lab 2: Device Management
Lab 3: Configuring High Availability
Lab 4: Migrating from Cisco ASA to Firepower Threat Defense
Lab 5: Implementing QoS
Lab 6: Implementing NAT
Lab 7: Configuring Network Discovery
Lab 8: Implementing an Access Control Policy
Lab 9: Implementing Security Intelligence
Lab 10: Implementing Site-to-Site VPN
Lab 11: Implementing Remote Access VPN
Lab 12: Threat Analysis
Lab 13: System Administration
Lab 14: Firepower Troubleshooting - SFWIPA — Securing Data Center Networks and VPNs with Cisco Secure Firewall Threat Defense
- Длительность: 5 дней (40 часов)
- Код курса: SFWIPA
- Стоимость
- Очный формат: 1 022 000 ₸
- Онлайн формат: 938 000 ₸
Описание курса
Course Description (full version)
The Securing Data Center Networks and VPNs with Cisco Secure Firewall Threat Defense training shows you how to deploy and configure Cisco Secure Firewall Threat Defense system and its features as a data center network firewall or as an Internet Edge firewall with Virtual Private Network (VPN) support. You will learn how to configure identity-based policies, Secure Sockets Layer (SSL) decryption, remote-access VPN, and site-to-site VPN before moving on to advanced Intrusion Prevention System (IPS) configuration and event management, integrations with other systems, and advanced troubleshooting. You will also learn how to automate configuration and operations of Cisco Secure Firewall Threat Defense system using programmability and Application Programming Interfaces (APIs) and how to migrate configuration from Cisco Secure Firewall Adaptive Security Appliances (ASA).
This training prepares you for the 300-710 Securing Networks with Cisco Firepower (SNCF) exam. If passed, you earn the Cisco Certified Specialist – Network Security Firepower certification and satisfy the concentration exam requirement for the Cisco Certified Networking Professional (CCNP) Security certification. This training also earns you 40 Continuing Education (CE) credits toward recertification.How You’ll Benefit
This training will help you:
Attain advanced knowledge of Cisco Secure Firewall Threat Defense technology
Gain competency and skills required to implement and manage a Cisco Secure Firewall Threat Defense system regardless of platform
Learn detailed information on policy management, traffic flow through the system, and the system architecture
Deploy and manage many of the advanced features available in the Cisco Secure Firewall Threat Defense system
Gain knowledge for protocols, solutions, and designs to acquire professional-level and expert-level data center roles
Earn 40 CE credits toward recertificationWho Should Enroll
System Installers
System Integrators
System Administrators
Network Administrators
Solutions DesignersWhat to Expect in the Exam
300-710 SNCF: Securing Networks with Cisco Firepower is a 90-minute exam associated with the Cisco Certified Specialist – Network Security Firepower certification and satisfies the concentration exam requirement for the CCNP Security certification.
The multiple-choice format tests your knowledge of Cisco Firepower Threat Defense and Firepower 7000 and 8000 Series virtual appliances, including:
Policy configurations
Integrations
Deployments
Management and troubleshootingCourse Objectives
Describe Cisco Secure Firewall Threat Defense
Describe advanced deployment options on Cisco Secure Firewall Threat Defense
Describe advanced device settings for Cisco Secure Firewall Threat Defense device
Configure dynamic routing on Cisco Secure Firewall Threat Defense
Configure advanced network address translation on Cisco Secure Firewall Threat Defense
Configure SSL decryption policy on Cisco Secure Firewall Threat Defense
Deploy Remote Access VPN on Cisco Secure Firewall Threat Defense
Deploy identity-based policies on Cisco Secure Firewall Threat Defense
Deploy site-to-site IPsec-based VPN on Cisco Secure Firewall Threat Defense
Deploy advanced access control settings on Cisco Secure Firewall Threat Defense
Describe advanced event management on Cisco Secure Firewall Threat Defense
Describe available integrations with Cisco Secure Firewall Threat Defense
Troubleshoot traffic flow using advanced options on Cisco Secure Firewall Threat Defense
Describe benefits of automating configuration and operations of Cisco Secure Firewall Threat Defense
Describe configuration migration to Cisco Secure Firewall Threat DefenseCourse Prerequisites
The knowledge and skills you are expected to have before attending this training are:
Knowledge of Transmission Control Protocol/Internet Protocol (TCP/IP)
Basic knowledge of routing protocols
Familiarity with the content explained in the Securing Internet Edge with Cisco Secure Firewall Threat Defense training
These skills can be found in the following Cisco Learning Offerings:
Implementing and Administering Cisco Solutions 2.0
Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention 1.0Course Outline
1. Introducing Cisco Secure Firewall Threat Defense
2. Describing Advanced Deployment Options on Cisco Secure Firewall Threat Defense
3. Configuring Advanced Device Settings on Cisco Secure Firewall Threat Defense
4. Configuring Dynamic Routing on Cisco Secure Firewall Threat Defense
5. Configuring Advanced NAT on Cisco Secure Firewall Threat Defense
6. Configuring SSL Policy on Cisco Secure Firewall Threat Defense
7. Deploying Remote Access VPN on Cisco Secure Firewall Threat Defense
8. Deploying Identity-Based Policies on Cisco Secure Firewall Threat Defense
9. Deploying Site-to-Site VPN on Cisco Secure Firewall Threat Defense
10. Configuring Snort Rules and Network Analysis Policies
11. Describing Advanced Event Management Cisco Secure Firewall Threat Defense
12. Describing Integrations on Cisco Secure Firewall Threat Defense
13. Troubleshooting Advanced Traffic Flow on Cisco Secure Firewall Threat Defense
14. Automating Cisco Secure Firewall Threat Defense
15. Migrating to Cisco Secure Firewall Threat DefenseLab Outline
1. Deploy Advanced Connection Settings
2. Configure Dynamic Routing
3. Configure SSL Policy
4. Configure Remote Access VPN
5. Configure Site-to-Site VPN
6. Customize IPS and NAP Policies
7. Configure Cisco Secure Firewall Threat Defense Integrations
8. Troubleshoot Cisco Secure Firewall Threat Defense
9. Migrate Configuration from Cisco Secure Firewall ASA - SFWIPF — Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention
- Длительность: 5 дней (40 часов)
- Код курса: SFWIPF
- Стоимость
- Очный формат: 871 000 ₸
- Онлайн формат: 851 000 ₸
Описание курса
Course Description (full version)
The Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention (SFWIPF) training shows you how to implement and configure Cisco Secure Firewall Threat Defense for deployment as a next generation firewall at the internet edge. You’ll gain an understanding of Cisco Secure Firewall architecture and deployment, base configuration, packet processing and advanced options, and conducting Secure Firewall administration troubleshooting.
This training prepares you for the CCNP Security certification, which requires passing the 350-701 Implementing and Operating Cisco Security Core Technologies (SCOR) core exam and one concentration exam such as the 300-710 Securing Networks with Cisco Firepower (SNCF) concentration exam. This training also earns you 40 Continuing Education (CE) credits towards recertification.How You’ll Benefit
This training will teach you how to implement, configure, and manage Cisco Secure Firewall Threat Defense for deployment, including:
Configure settings and policies on Cisco Secure Firewall Threat Defense
Gain an understanding of Cisco Secure Firewall Threat Defense policies and explain how different policies influence packet processing through the device
Perform basic threat analysis and administration tasks using Cisco Secure Firewall Management CenterWho Should Enroll
Network security engineers
AdministratorsWhat to Expect in the Exam
350-701 SCOR: Implementing and Operating Cisco Security Core Technologies is a 120-minute exam associated with the CCNP Security certification. The multiple-choice format tests knowledge and skills related to implementing and operating core security technologies, including:
Network security
Cloud security
Content security
Endpoint protection and detection
Secure network access
Visibility and enforcement300-710 SNCF: Securing Networks with Cisco Firepower is a 90-minute exam associated with the CCNP Security certification. The multiple-choice format tests knowledge of Cisco Firepower® Threat Defense and Firepower® 7000 and 8000 Series virtual appliances, including:
Policy configurations
Integrations
Deployments
Management and troubleshootingCourse Objectives
Describe Cisco Secure Firewall Threat Defense
Describe Cisco Secure Firewall Threat Defense Deployment Options
Describe management options for Cisco Secure Firewall Threat Defense
Configure basic initial settings on Cisco Secure Firewall Threat Defense
Configure high availability on Cisco Secure Firewall Threat Defense
Configure basic Network Address Translation on Cisco Secure Firewall Threat Defense
Describe Cisco Secure Firewall Threat Defense policies and explain how different policies influence packet processing through the device
Configure Discovery Policy on Cisco Secure Firewall Threat Defense
Configure and explain prefilter and tunnel rules in prefilter policy
Configure an access control policy on Cisco Secure Firewall Threat Defense
Configure security intelligence on Cisco Secure Firewall Threat Defense
Configure file policy on Cisco Secure Firewall Threat Defense
Configure Intrusion Policy on Cisco Secure Firewall Threat Defense
Perform basic threat analysis using Cisco Secure Firewall Management Center
Perform basic management and system administration tasks on Cisco Secure Firewall Threat Defense
Perform basic traffic flow troubleshooting on Cisco Secure Firewall Threat Defense
Manage Cisco Secure Firewall Threat Defense with Cisco Secure Firewall Threat Defense ManagerCourse Prerequisites
Before taking this offering, you should understand:
TCP/IP
Basic routing protocols
Firewall, VPN, and IPS conceptsCourse Outline
1. Introducing Cisco Secure Firewall Threat Defense
2. Describing Cisco Secure Firewall Threat Defense Deployment Options
3. Describing Cisco Secure Firewall Threat Defense Management Options
4. Configuring Basic Network Settings on Cisco Secure Firewall Threat Defense
5. Configuring High Availability on Cisco Secure Firewall Threat Defense
6. Configuring Auto NAT on Cisco Secure Firewall Threat Defense
7. Describing Packet Processing and Policies on Cisco Secure Firewall Threat Defense
8. Configuring Discovery Policy on Cisco Secure Firewall Threat Defense
9. Configuring Prefilter Policy on Cisco Secure Firewall Threat Defense
10. Configuring Access Control Policy on Cisco Secure Firewall Threat Defense
11. Configuring Security Intelligence on Cisco Secure Firewall Threat Defense
12. Configuring File Policy on Cisco Secure Firewall Threat Defense
13. Configuring Intrusion Policy on Cisco Secure Firewall Threat Defense
14. Performing Basic Threat Analysis on Cisco Secure Firewall Management Center
15. Managing Cisco Secure Firewall Threat Defense System
16. Troubleshooting Basic Traffic Flow
17. Cisco Secure Firewall Threat Defense Device ManagerLab Outline
1. Perform Initial Device Setup
2. Configure High Availability
3. Configure Network Address Translation
4. Configure Network Discovery
5. Configure Prefilter and Access Control Policy
6. Configure Security Intelligence
7. Implement File Control and Advanced Malware Protection
8. Configure Cisco Secure IPS
9. Detailed Analysis Using the Firewall Management Center
10. Manage Cisco Secure Firewall Threat Defense System
11. Secure Firewall Troubleshooting Fundamentals
12. Configure Managed Devices Using Cisco Secure Firewall Device Manager - C2C — Cisco DoD Comply-to-Connect
- Длительность: 5 дней (40 часов)
- Код курса: C2C
- Стоимость
- Очный формат: 1 247 500 ₸
- Онлайн формат: 1 163 000 ₸
Описание курса
Course Objectives
Define DoD C2C, including its steps and alignment with ISE features/functions and Zero Trust
Describe Cisco Identity-Based Networking Services
Explain 802.1X extensible authentication protocol (EAP)
Configure devices for 802.1X operation
Configure access for non-supplicant devices
Describe the Cisco Identity Services Engine
Explain Cisco ISE deployment
Describe Cisco ISE policy enforcement concepts
Describe Cisco ISE policy configuration
Explain PKI fundamentals, technology, components, roles, and software supplicants
Troubleshoot Cisco ISE policy and third-party network access device (NAD) support
Describe Cisco ISE TrustSec configurations
Describe the Cisco ISE profiler service
Describe profiling best practices and reporting
Configure endpoint compliance
Configure client posture services
Configure Cisco ISE device administration
Describe the four main use cases within C2CCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Familiarity with 802.1X
Familiarity with Microsoft Windows Operating Systems
Familiarity with Cisco IOS CLI for wired and wireless network devices
Familiarity with Cisco Identity Service Engine
The following recommended Cisco offering may help you meet these prerequisites:
Implementing and Operating Cisco Security Core Technologies (SCOR)Course Outline
C2C Fundamentals
Cisco Identity-Based Networking Services
802.1X EAP Authentication
Configure Devices for 802.1X Operation
Configure Access for Non-Supplicant Devices
Introducing Cisco ISE Architecture
Introducing Cisco ISE Deployment
Introducing Cisco ISE Policy Enforcement Components
Introducing Cisco ISE Policy Configuration
PKI and Advanced Supplicants
Troubleshooting Cisco ISE Policy and Third-Party NAD Support
Exploring Cisco TrustSec
Introducing the Cisco ISE Profiler
Introducing Profiling Best Practices and Reporting
Introducing Cisco ISE Endpoint Compliance Services
Configuring Client Posture Services and Compliance
Working with Network Access Devices
C2C Use CasesLab Outline
Configure and Test 802.1X Operations
Configure Initial Cisco ISE Configuration and System Certificate Usage
Integrate Cisco ISE with Active Directory
Configure Cisco ISE Policy for MAB
Configure Cisco ISE Policy for 802.1X
TEAP on Windows
Configure Cisco TrustSec
Configure Profiling
Customize the Cisco ISE Profiling Configuration
Create Cisco ISE Profiling Reports
Configure Cisco ISE Compliance Services
Configure Client Provisioning
Configure Posture Policies
Test and Monitor Compliance-Based Access
Configure Cisco ISE for Basic Device Administration
Configure Cisco ISE Command Authorization
DISA Reports
Certificate-Based Authentication for Cisco ISE Administration
Записаться на курс
Контакты
LinkedIn
Email
Web