Course Details
Course Outline
1 - Describing Information Security Concepts*
Information Security OverviewAssets, Vulnerabilities, and CountermeasuresManaging RiskVulnerability AssessmentUnderstanding Common Vulnerability Scoring System (CVSS)
2 - Describing Common TCP/IP Attacks*
Legacy TCP/IP VulnerabilitiesIP VulnerabilitiesInternet Control Message Protocol (ICMP) VulnerabilitiesTCP VulnerabilitiesUser Datagram Protocol (UDP) VulnerabilitiesAttack Surface and Attack VectorsReconnaissance AttacksAccess AttacksMan-in-the-Middle AttacksDenial of Service and Distributed Denial of Service AttacksReflection and Amplification AttacksSpoofing AttacksDynamic Host Configuration Protocol (DHCP) Attacks
3 - Describing Common Network Application Attacks*
Password AttacksDomain Name System (DNS)-Based AttacksDNS TunnelingWeb-Based AttacksHTTP 302 CushioningCommand InjectionsSQL InjectionsCross-Site Scripting and Request ForgeryEmail-Based Attacks
4 - Describing Common Endpoint Attacks*
Buffer OverflowMalwareReconnaissance AttackGaining Access and ControlGaining Access via Social EngineeringGaining Access via Web-Based AttacksExploit Kits and RootkitsPrivilege EscalationPost-Exploitation PhaseAngler Exploit Kit
5 - Describing Network Security Technologies
Defense-in-Depth StrategyDefending Across the Attack ContinuumNetwork Segmentation and Virtualization OverviewStateful Firewall OverviewSecurity Intelligence OverviewThreat Information StandardizationNetwork-Based Malware Protection OverviewIntrusion Prevention System (IPS) OverviewNext Generation Firewall OverviewEmail Content Security OverviewWeb Content Security OverviewThreat Analytic Systems OverviewDNS Security OverviewAuthentication, Authorization, and Accounting OverviewIdentity and Access Management OverviewVirtual Private Network Technology OverviewNetwork Security Device Form Factors Overview
6 - Deploying Cisco ASA Firewall
Cisco ASA Deployment TypesCisco ASA Interface Security LevelsCisco ASA Objects and Object GroupsNetwork Address TranslationCisco ASA Interface Access Control Lists (ACLs)Cisco ASA Global ACLsCisco ASA Advanced Access PoliciesCisco ASA High Availability Overview
7 - Deploying Cisco Firepower Next-Generation Firewall
Cisco Firepower NGFW DeploymentsCisco Firepower NGFW Packet Processing and PoliciesCisco Firepower NGFW ObjectsCisco Firepower NGFW Network Address Translation (NAT)Cisco Firepower NGFW Prefilter PoliciesCisco Firepower NGFW Access Control PoliciesCisco Firepower NGFW Security IntelligenceCisco Firepower NGFW Discovery PoliciesCisco Firepower NGFW IPS PoliciesCisco Firepower NGFW Malware and File Policies
8 - Deploying Email Content Security
Cisco Email Content Security OverviewSimple Mail Transfer Protocol (SMTP) OverviewEmail Pipeline OverviewPublic and Private ListenersHost Access Table OverviewRecipient Access Table OverviewMail Policies OverviewProtection Against Spam and GraymailAnti-virus and Anti-malware ProtectionOutbreak FiltersContent FiltersData Loss PreventionEmail Encryption
9 - Deploying Web Content Security
Cisco Web Security Appliance (WSA) OverviewDeployment OptionsNetwork Users AuthenticationSecure HTTP (HTTPS) Traffic DecryptionAccess Policies and Identification ProfilesAcceptable Use Controls SettingsAnti-Malware Protection
10 - Deploying Cisco Umbrella*
Cisco Umbrella ArchitectureDeploying Cisco UmbrellaCisco Umbrella Roaming ClientManaging Cisco UmbrellaCisco Umbrella Investigate Overview and Concepts
11 - Explaining VPN Technologies and Cryptography
VPN DefinitionVPN TypesSecure Communication and Cryptographic ServicesKeys in CryptographyPublic Key Infrastructure
12 - Introducing Cisco Secure Site-to-Site VPN Solutions
Site-to-Site VPN TopologiesIPsec VPN OverviewIPsec Static Crypto MapsIPsec Static Virtual Tunnel InterfaceDynamic Multipoint VPNCisco IOS FlexVPN
13 - Deploying Cisco IOS VTI-Based Point-to-Point IPsec VPNs
Cisco IOS VTIsStatic VTI Point-to-Point IPsec Internet Key Exchange (IKE) v2 VPN Configuration
14 - Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW
Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFWCisco ASA Point-to-Point VPN ConfigurationCisco Firepower NGFW Point-to-Point VPN Configuration
15 - Introducing Cisco Secure Remote Access VPN Solutions
Remote Access VPN ComponentsRemote Access VPN TechnologiesSecure Sockets Layer (SSL) Overview
16 - Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW
Remote Access Configuration ConceptsConnection ProfilesGroup PoliciesCisco ASA Remote Access VPN ConfigurationCisco Firepower NGFW Remote Access VPN Configuration
17 - Explaining Cisco Secure Network Access Solutions
Cisco Secure Network AccessCisco Secure Network Access ComponentsAAA Role in Cisco Secure Network Access SolutionCisco Identity Services EngineCisco TrustSec
18 - Describing 802.1X Authentication
802.1X and Extensible Authentication Protocol (EAP)EAP MethodsRole of Remote Authentication Dial-in User Service (RADIUS) in 802.1X CommunicationsRADIUS Change of Authorization
19 - Configuring 802.1X Authentication
Cisco Catalyst® Switch 802.1X ConfigurationCisco Wireless LAN Controller (WLC) 802.1X ConfigurationCisco Identity Services Engine (ISE) 802.1X ConfigurationSupplicant 802.1x ConfigurationCisco Central Web Authentication
20 - Describing Endpoint Security Technologies*
Host-Based Personal FirewallHost-Based Anti-VirusHost-Based Intrusion Prevention SystemApplication Whitelists and BlacklistsHost-Based Malware ProtectionSandboxing OverviewFile Integrity Checking
21 - Deploying Cisco Advanced Malware Protection (AMP) for Endpoints*
Cisco AMP for Endpoints ArchitectureCisco AMP for Endpoints EnginesRetrospective Security with Cisco AMPCisco AMP Device and File TrajectoryManaging Cisco AMP for Endpoints
22 - Introducing Network Infrastructure Protection*
Identifying Network Device PlanesControl Plane Security ControlsManagement Plane Security ControlsNetwork TelemetryLayer 2 Data Plane Security ControlsLayer 3 Data Plane Security Controls
23 - Deploying Control Plane Security Controls*
Infrastructure ACLsControl Plane PolicingControl Plane ProtectionRouting Protocol Security
24 - Deploying Layer 2 Data Plane Security Controls*
Overview of Layer 2 Data Plane Security ControlsVirtual LAN (VLAN)-Based Attacks MitigationSpanning Tree Protocol (STP) Attacks MitigationPort SecurityPrivate VLANsDynamic Host Configuration Protocol (DHCP) SnoopingAddress Resolution Protocol (ARP) InspectionStorm ControlMACsec Encryption
25 - Deploying Layer 3 Data Plane Security Controls*
Infrastructure Antispoofing ACLsUnicast Reverse Path ForwardingIP Source Guard
26 - Deploying Management Plane Security Controls*
Cisco Secure Management AccessSimple Network Management Protocol Version 3Secure Access to Cisco DevicesAAA for Management Access
27 - Deploying Traffic Telemetry Methods*
Network Time ProtocolDevice and Network Events Logging and ExportNetwork Traffic Monitoring Using NetFlow
28 - Deploying Cisco Stealthwatch Enterprise*
Cisco Stealthwatch Offerings OverviewCisco Stealthwatch Enterprise Required ComponentsFlow Stitching and DeduplicationStealthwatch Enterprise Optional ComponentsStealthwatch Enterprise and ISE IntegrationCisco Stealthwatch with Cognitive AnalyticsCisco Encrypted Traffic AnalyticsHost GroupsSecurity Events and AlarmsHost, Role, and Default Policies
29 - Describing Cloud and Common Cloud Attacks*
Evolution of Cloud ComputingCloud Service ModelsSecurity Responsibilities in CloudCloud Deployment ModelsCommon Security Threats in CloudPatch Management in the CloudSecurity Assessment in the Cloud
30 - Securing the Cloud*
Cisco Threat-Centric Approach to Network SecurityCloud Physical Environment SecurityApplication and Workload SecurityCloud Management and API SecurityNetwork Function Virtualization (NFV) and Virtual Network Functions (VNF)Cisco NFV ExamplesReporting and Threat Visibility in CloudCloud Access Security BrokerCisco CloudLock®OAuth and OAuth Attacks
31 - Deploying Cisco Stealthwatch Cloud*
Cisco Stealthwatch Cloud for Public Cloud MonitoringCisco Stealthwatch Cloud for Private Network MonitoringCisco Stealthwatch Cloud Operations
32 - Describing Software-Defined Networking (SDN*)
Software-Defined Networking ConceptsNetwork Programmability and AutomationCisco Platforms and APIsBasic Python Scripts for Automation
33 - Lab outline
Configure Network Settings and NAT on Cisco ASAConfigure Cisco ASA Access Control PoliciesConfigure Cisco Firepower NGFW NATConfigure Cisco Firepower NGFW Access Control PolicyConfigure Cisco Firepower NGFW Discovery and IPS PolicyConfigure Cisco NGFW Malware and File PolicyConfigure Listener, Host Access Table (HAT), and Recipient Access Table (RAT) on Cisco Email Security Appliance (ESA)Configure Mail PoliciesConfigure Proxy Services, Authentication, and HTTPS DecryptionEnforce Acceptable Use Control and Malware ProtectionExamine the Umbrella DashboardExamine Cisco Umbrella InvestigateExplore DNS Ransomware Protection by Cisco UmbrellaConfigure Static VTI Point-to-Point IPsec IKEv2 TunnelConfigure Point-to-Point VPN between the Cisco ASA and Cisco Firepower NGFWConfigure Remote Access VPN on the Cisco Firepower NGFWExplore Cisco AMP for EndpointsPerform Endpoint Analysis Using AMP for Endpoints ConsoleExplore File Ransomware Protection by Cisco AMP for Endpoints ConsoleExplore Cisco Stealthwatch Enterprise v6.9.3Explore Cognitive Threat Analytics (CTA) in Stealthwatch Enterprise v7.0Explore the Cisco Cloudlock Dashboard and User SecurityExplore Cisco Cloudlock Application and Data SecurityExplore Cisco Stealthwatch CloudExplore Stealthwatch Cloud Alert Settings, Watchlists, and Sensors
Actual course outline may vary depending on offering center. Contact your sales representative for more information.