Course Details
Course Outline
1 - Cisco Firepower Threat Defense Overview
Examining Firewall and IPS TechnologyFirepower Threat Defense Features and ComponentsExamining Firepower PlatformsExamining Firepower Threat Defense LicensingCisco Firepower Implementation Use Cases
2 - Cisco Firepower NGFW Device Configuration
Firepower Threat Defense Device RegistrationFXOS and Firepower Device ManagerInitial Device SetupManaging NGFW DevicesExamining Firepower Management Center PoliciesExamining ObjectsExamining System Configuration and Health MonitoringDevice ManagementExamining Firepower High AvailabilityConfiguring High AvailabilityCisco ASA to Firepower MigrationMigrating from Cisco ASA to Firepower Threat Defense
3 - Cisco Firepower NGFW Traffic Control
Firepower Threat Defense Packet ProcessingImplementing QoSBypassing Traffic
4 - Cisco Firepower NGFW Address Translation
NAT BasicsImplementing NATNAT Rule ExamplesImplementing NAT
5 - Cisco Firepower Discovery
Examining Network DiscoveryConfiguring Network DiscoveryImplementing Access Control PoliciesExamining Access Control PoliciesExamining Access Control Policy Rules and Default ActionImplementing Further InspectionExamining Connection EventsAccess Control Policy Advanced SettingsAccess Control Policy ConsiderationsImplementing an Access Control Policy
6 - Security Intelligence
Examining Security IntelligenceExamining Security Intelligence ObjectsSecurity Intelligence Deployment and LoggingImplementing Security Intelligence
7 - File Control and Advanced Malware Protection
Examining Malware and File PolicyExamining Advanced Malware Protection
8 - Next-Generation Intrusion Prevention Systems
Examining Intrusion Prevention and Snort RulesExamining Variables and Variable SetsExamining Intrusion Policies
9 - Site-to-Site VPN
Examining IPsecSite-to-Site VPN ConfigurationSite-to-Site VPN TroubleshootingImplementing Site-to-Site VPN
10 - Remote-Access VPN
Examining Remote-Access VPNExamining Public-Key Cryptography and CertificatesExamining Certificate EnrollmentRemote-Access VPN ConfigurationImplementing Remote-Access VPN
11 - SSL Decryption
Examining SSL DecryptionConfiguring SSL PoliciesSSL Decryption Best Practices and Monitoring
12 - Detailed Analysis Techniques
Examining Event AnalysisExamining Event TypesExamining Contextual DataExamining Analysis ToolsThreat Analysis
13 - System Administration
Managing UpdatesExamining User Account Management FeaturesConfiguring User AccountsSystem Administration
14 - Cisco Firepower Troubleshooting
Examining Common MisconfigurationsExamining Troubleshooting CommandsFirepower Troubleshooting
Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Who is it For?
Target Audience
Security administrators
Security consultants
Network administrators
System engineers
Technical support personnel
Cisco integrators and partners
Other Prerequisites
To fully benefit from this course, you should have the following knowledge:
Knowledge of TCP/IP and basic routing protocols, and familiarity with firewall, VPN, and Intrusion Prevention System (IPS) concepts