Who should attend
- Security Engineers
- Network Engineers
- Network Designers
- Network Administrators
- Systems Engineers
- Consulting Systems Engineers
- Technical Solutions Architects
- Cisco Integrators and Partners
- Network Managers
- Program Managers
- Project Managers
Prerequisites
There are no formal prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
- Familiarity with Ethernet and TCP/IP networking
- Working knowledge of the Windows operating system
- Working knowledge of Cisco IOS networking and concepts
- Familiarity with basics of networking security concept
s These skills can be found in the following Cisco Learning Offering:
Course Objectives
After taking this course, you should be able to:
- Describe information security concepts and strategies within the network
- Describe security flaws in the transmission protocol/internet protocol (TCP/IP) and how they can be used to attack networks and hosts
- Describe network application-based attacks
- Describe how various network security technologies work together to guard against attacks
- Implement access control on Cisco Secure Firewall Adaptive Security Appliance (ASA)
- Deploy Cisco Secure Firewall Threat Defense basic configurations
- Deploy Cisco Secure Firewall Threat Defense IPS, malware, and fire policies
- Deploy Cisco Secure Email Gateway basic configurations
- Deploy Cisco Secure Email Gateway policy configurations
- Describe and implement basic web content security features and functions provided by Cisco Secure Web Appliance
- Describe various attack techniques against the endpoints
- Describe Cisco Umbrella® security capabilities, deployment models, policy management, and Investigate console
- Provide basic understanding of endpoint security and be familiar with common endpoint security technologies
- Describe Cisco Secure Endpoint architecture and basic features
- Describe Cisco Secure Network Access solutions
- Describe 802.1X and extensible authentication protocol (EAP) authentication
- Configure devices for 802.1X operations
- Introduce VPNs and describe cryptography solutions and algorithms
- Describe Cisco secure site-to-site connectivity solutions
- Deploy Cisco Internetwork Operating System (Cisco IOS®) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs
- Configure point-to-point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
- Describe Cisco secure remote access connectivity solutions
- Deploy Cisco secure remote access connectivity solutions
- Provide an overview of network infrastructure protection controls
- Examine various defenses on Cisco devices that protect the control plane
- Configure and verify Cisco IOS software layer 2 data plane controls
- Configure and verify Cisco IOS software and Cisco ASA layer 3 data plane controls
- Examine various defenses on Cisco devices that protect the management plane
- Describe the baseline forms of telemetry recommended for network infrastructure and security devices
- Describe deploying Cisco Secure Network Analytics
- Describe basics of cloud computing and common cloud attacks
- Describe how to secure cloud environment
- Describe the deployment of Cisco Secure Cloud Analytics
- Describe basics of software-defined networks and network programmability
Detailed Course Outline
- Network Security Technologies
- Cisco Secure Firewall ASA Deployment
- Cisco Secure Firewall Threat Defense Basics
- Cisco Secure Firewall Threat Defense IPS, Malware, and File Policies
- Cisco Secure Email Gateway Basics
- Cisco Secure Email Policy Configuration
- Cisco Secure Web Appliance Deployment
- VPN Technologies and Cryptography Concepts
- Cisco Secure Site-to-Site VPN Solutions
- Cisco IOS VTI-Based Point-to-Point IPsec VPNs
- Point-to-Point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
- Cisco Secure Remote-Access VPN Solutions
- Remote-Access SSL VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
- Describing Information Security Concepts
- Describe Common TCP/IP Attacks
- Describe Common Network Application Attacks
- Common Endpoint Attacks
- Cisco Umbrella Deployment
- Endpoint Security Technologies
- Cisco Secure Endpoint
- Cisco Secure Network Access Solutions
- 802.1X Authentication
- 802.1X Authentication Configuration
- Network Infrastructure Protection
- Control Plane Security Solutions
- Layer 2 Data Plane Security Controls
- Layer 3 Data Plane Security Controls
- Management Plane Security Controls
- Traffic Telemetry Methods
- Cisco Secure Network Analytics Deployment
- Cloud Computing and Cloud Security
- Cloud Security
- Cisco Secure Cloud Analytics Deployment
- Software-Defined Networking