SITCS - Implementing Cisco Threat Control Solutions
Overview
The Implementing Cisco Threat Control Solutions (SITCS) course provides network professionals with the knowledge to implement Cisco FirePOWER NGIPS (Next-Generation Intrusion Prevention System) and Cisco AMP (Advanced Malware Protection), as well as Web Security, Email Security, and Cloud Web Security.Despite, In SITCS – Implementing Cisco Threat Control Solutions course Students will gain hands-on experience configuring various advanced Cisco security solutions for mitigating outside threats and securing traffic traversing the firewall.
Prerequisites:
In order to fully benefit from this course, it is recommended that students have the following prerequisites:
Target Audience:
This course is intended for Network Security Engineers.
Course Objectives:
Upon successful completion of this course, students should be able to meet these overall objectives:
- Describe and implement the Cisco Web Security Appliance
- Describe and implement Cloud Web Security
- Describe and implement the Cisco Email Security Appliance
- Describe and implement Advanced Malware Protection
- Describe and implement Cisco FirePOWER Next-Generation IPS
- Describe and implement Cisco ASA FirePOWER Services Module
Course Outline:
Module 1: Cisco Web Security Appliance
- Lesson 1: Describing the Cisco Web Security Appliance Solutions
- Lesson 2: Integrating the Cisco Web Security Appliance
- Lesson 3: Configuring Cisco Web Security Appliance Identities and User Authentication Controls
- Lesson 4: Configuring Cisco Web Security Appliance Acceptable Use Controls
- Lesson 5: Configuring Cisco Web Security Appliance Anti-Malware Controls
- Lesson 6: Configuring Cisco Web Security Appliance Decryption
- Lesson 7: Configuring Cisco Web Security Appliance Data Security Controls
Module 2: Cisco Cloud Web Security
- Lesson 1: Describing the Cisco Cloud Web Security Solutions
- Lesson 2: Configuring Cisco Cloud Web Security Connectors
- Lesson 3: Describing the Web Filtering Policy in Cisco ScanCenter
Module 3: Cisco Email Security Appliance
- Lesson 1: Describing the Cisco Email Security Solutions
- Lesson 2: Describing the Cisco Email Security Appliance Basic Setup Components
- Lesson 3: Configuring Cisco Email Security Appliance Basic Incoming and Outgoing Mail Policies
Module 4: Advanced Malware Protection for Endpoints
- Lesson 1: AMP for Endpoints Overview and Architecture
- Lesson 2: Customizing Detection and AMP Policy
- Lesson 3: IOCs and IOC Scanning
- Lesson 4: Deploying AMP Connectors
- Lesson 5: AMP Analysis Tools
Module 5: Cisco FirePOWER Next-Generation IPS
- Lesson 1: Describing the Cisco FireSIGHT System
- Lesson 2: Configuring and Managing Cisco FIrePOWER Devices
- Lesson 3: Implementing an Access Control Policy
- Lesson 4: Understanding Discovery Technology
- Lesson 5: Configuring File-Type and Network Malware Detection
- Lesson 6: Managing SSL Traffic with Cisco FireSIGHT
- Lesson 7: Describing IPS Policy and Configuration Concepts
- Lesson 8: Describing the Network Analysis Policy
- Lesson 9: Creating Reports
- Lesson 10: Describing Correlation Rules and Policies
- Lesson 11: Understanding Basic Rule Syntax and Usage
Module 6: Cisco ASA FirePOWER Services Module
- Lesson 1: Installing the Cisco ASA 5500-X Series FirePOWER Services (SFR) Module
LAB OUTLINE:
- Lab 1: Configure Cisco Web Security Appliance Explicit Proxy and User Authentication Web-related Connectivity
- Lab 2: Configure Cisco Web Security Appliance Acceptable Use Controls
- Lab 3: Configure Cisco Email Security Appliance Basic Policies
- Lab 4: Accessing the AMP Public Cloud Console
- Lab 5: Customizing Detection and AMP Policy
- Lab 6: IOCs and IOC Scanning
- Lab 7: Deploying AMP Connectors
- Lab 8: AMP Analysis Tools
- Lab 9: Configure Inline Interfaces and Create Objects
- Lab 10: Create Access Control Policy Rules
- Lab 11: Configure Network Discovery Detection
- Lab 12: Create a File Policy
- Lab 13: Create an Intrusion Policy
- Lab 14: Create a Network Analysis Policy
- Lab 15: Compare Trends
- Lab 16: Create Correlation PoliciesSITCS – Implementing Cisco Threat Control Solutions