Who should attend
- Security engineers
- Security administrators
- Security architects
- Operations engineers
- Network engineers
- Network administrators
- Network or security technicians
- Network managers
- System designers
- Cisco integrators and partners
Prerequisites
The basic technical competencies you are expected to have before attending this training are:
- Cisco certification, such as Cisco Certified Support Technician (CCST) Cybersecurity certification or higher
- Relevant industry certification, such as (ISC)2, CompTIA Security+, EC-Council, Global Information Assurance Certification (GIAC), and ISACA
- Cisco Networking Academy letter of completion (CCNA® 1 and CCNA 2)
- Windows expertise, such as Microsoft [Microsoft Specialist, Microsoft Certified Solutions Associate (MCSA), Microsoft Certified Systems Engineer (MCSE)], and CompTIA (A+, Network+, Server+)
The knowledge and skills you are expected to have before attending this training are:
- Transmission control protocol/internet protocol (TCP/IP) services, including domain name system (DNS), secure shell (SSH), file transfer protocol (FTP), simple network management protocol (SNMP), hypertext transfer protocol (HTTP), and hypertext transfer protocol secure (HTTPS)
- Experience with IP routing
Course Objectives
After taking this course, you should be able to:
- Describe and administer the Cisco Email Security Appliance
- Control sender and recipient domains
- Control spam with Talos SenderBase and anti-spam
- Use anti-virus and outbreak filters
- Use mail policies
- Use content filters
- Use message filters
- Prevent data loss
- Perform lightweight directory access protocol (LDAP) queries
- Authenticate simple mail transfer protocol (SMTP) sessions
- Authenticate email
- Encrypt email
- Use system quarantines and delivery methods
- Perform centralized management using clusters
- Test and troubleshoot
Detailed Course Outline
- Describing the Cisco Email Security Appliance
- Controlling Sender and Recipient Domains
- Controlling Spam with Talos SenderBase and Anti-Spam
- Using Anti-Virus and Outbreak Filters
- Using Mail Polices
- Using Content Filters
- Using Message Filters
- Preventing Data Loss
- Using LDAP
- Describing SMTP Session Authentication
- Using Email Authentication
- Using Email Encryption
- Administering the Cisco Email Security Appliance
- Using System Quarantines and Delivery Methods
- Centralizing Management Using Clusters
- Testing and Troubleshooting