Welcome to Camit Solutions
info@camit.in
Working Hour: 09:00 am - 5:00 pm

Course Details

CISCO-FIREPOWER

 

 

 

 

 

 

 

 

 

 

 

 

Cisco Firepower Threat Defense Overview


1. Examining Firewall and IPS Technology
2. Firepower Threat Defense Features and Components
3. Examining Firepower Platforms
4. Examining Firepower Threat Defense Licensing
5. Cisco Firepower Implementation Use Cases


Cisco Firepower NGFW Device Configuration


1. Firepower Threat Defense Device Registration
2. FXOS and Firepower Device Manager
3. Initial Device Setup
4. Managing NGFW Devices
5. Examining Firepower Management Center Policies
6. Examining Objects
7. Examining System Configuration and Health Monitoring
8. Device Management
9. Examining Firepower High Availability

10.Configuring High Availability
11.Cisco ASA to Firepower Migration
12.Migrating from Cisco ASA to Firepower Threat Defense


? Cisco Firepower NGFW Traffic Control


1. Firepower Threat Defense Packet Processing
2. Implementing QoS
3. Bypassing Traffic


Cisco Firepower NGFW Address Translation


1. NAT Basics
2. Implementing NAT
3. NAT Rule Examples
4. Implementing NAT


Cisco Firepower Discovery


1. Examining Network Discovery
2. Configuring Network Discovery


Implementing Access Control Policies


1. Examining Access Control Policies
2. Examining Access Control Policy Rules and Default Action
3. Implementing Further Inspection
4. Examining Connection Events
5. Access Control Policy Advanced Settings
6. Access Control Policy Considerations
7. Implementing an Access Control Policy

 

Security Intelligence


1. Examining Security Intelligence
2. Examining Security Intelligence Objects
3. Security Intelligence Deployment and Logging
4. Implementing Security Intelligence


File Control and Advanced Malware Protection


1. Examining Malware and File Policy
2. Examining Advanced Malware Protection

 

Next-Generation Intrusion Prevention Systems


1. Examining Intrusion Prevention and Snort Rules
2. Examining Variables and Variable Sets
3. Examining Intrusion Policies


Site-to-Site VPN


1. Examining IPsec
2. Site-to-Site VPN Configuration
3. Site-to-Site VPN Troubleshooting
4. Implementing Site-to-Site VPN


Remote-Access VPN


1. Examining Remote-Access VPN
2. Examining Public-Key Cryptography and Certificates
3. Examining Certificate Enrollment
4. Remote-Access VPN Configuration
5. Implementing Remote-Access VPN


SSL Decryption


1. Examining SSL Decryption
2. Configuring SSL Policies
3. SSL Decryption Best Practices and Monitoring


Detailed Analysis Techniques


1. Examining Event Analysis
2. Examining Event Types
3. Examining Contextual Data
4. Examining Analysis Tools
5. Threat Analysis


System Administration


1. Managing Updates
2. Examining User Account Management Features
3. Configuring User Accounts
4. System Administration

 

Cisco Firepower Troubleshooting


1. Examining Common Misconfigurations
2. Examining Troubleshooting Commands
3. Firepower Troubleshooting


Lab outline


1. Initial Device Setup
2. Device Management
3. Configuring High Availability
4. Migrating from Cisco ASA to Cisco Firepower Threat Defense
5. Implementing QoS
6. Implementing NAT
7. Configuring Network Discovery
8. Implementing an Access Control Policy
9. Implementing Security Intelligence

10. Implementing Site-to-Site VPN
11. Implementing Remote Access VPN
12. Threat Analysis
13. System Administration
14. Firepower Troubleshooting