Securing Networks with Cisco Firepower Next Generation Firewall (SSNGFW)

Seminarinformationen

Seminar - Ziel

This class will help you:

  • Implement Cisco Firepower NGFW to provide advanced threat protection before, during, and after attacks
  • Gain leading-edge skills for high-demand responsibilities focused on security

After taking this course, you should be able to:

  • Describe key concepts of NGIPS and NGFW technology and the Cisco Firepower Threat Defense system, and identify deployment scenarios
  • Perform initial Cisco Firepower Threat Defense device configuration and setup tasks
  • Describe how to manage traffic and implement quality of service (QoS) using Cisco Firepower Threat Defense
  • Describe how to implement NAT by using Cisco Firepower Threat Defense
  • Perform an initial network discovery, using Cisco Firepower to identify hosts, applications, and services
  • Describe the behavior, usage, and implementation procedure for access control policies
  • Describe the concepts and procedures for implementing security intelligence features

Teilnehmer - Zielgruppe

This course is designed for technical professionals who need to know how to deploy and manage a Cisco Firepower NGIPS and NGFW in their network environments.

Targeted roles include:

  • Security administrators
  • Security consultants
  • Network administrators
  • System engineers
  • Technical support personnel
  • Channel partners and resellers

Kurs - Voraussetzungen

Cisco recommends that you have the following knowledge and skills before taking this course:

  • Technical understanding of TCP/IP networking and network architecture
  • Basic familiarity with firewall and IPS concepts

Seminardauer

  • 5 Tage
  • 09:00 Uhr bis 17:00 Uhr

Schulungsunterlagen

  • nach Absprache

Seminar-Inhalt / Agenda

Cisco Firepower Threat Defense Overview

  • Examining Firewall and IPS Technology
  • Firepower Threat Defense Features and Components
  • Examining Firepower Platforms
  • Cisco Firepower Implementation Use Cases

Cisco Firepower NGFW Device Configuration

  • Firepower Threat Defense Device Registration
  • FXOS and Firepower Device Manager
  • Initial Device Setup
  • Managing NGFW Devices
  • Examining Firepower Management Center Policies
  • Examining Objects
  • Examining System Configuration and Health Monitoring
  • Device Management
  • Examining Firepower High Availability
  • Configuring High Availability
  • Cisco ASA to Firepower Migration
  • Migrating from Cisco ASA to Firepower Threat Defense

Cisco Firepower NGFW Traffic Control

  • Firepower Threat Defense Packet Processing
  • Implementing QoS
  • Bypassing Traffic

Cisco Firepower NGFW Address Translation

  • NAT Basics
  • Implementing NAT
  • NAT Rule Examples
  • Implementing NAT

Cisco Firepower Discovery

  • Examining Network Discovery
  • Configuring Network Discovery
  • Implementing Access Control Policies
  • Examining Access Control Policies
  • Examining Access Control Policy Rules and Default Action
  • Implementing Further Inspection
  • Examining Connection Events
  • Access Control Policy Advanced Settings
  • Access Control Policy Considerations
  • Implementing an Access Control Policy

Security Intelligence

  • Examining Security Intelligence
  • Examining Security Intelligence Objects
  • Security Intelligence Deployment and Logging
  • Implementing Security Intelligence

File Control and Advanced Malware Protection

  • Examining Malware and File Policy
  • Examining Advanced Malware Protection

Next-Generation Intrusion Prevention Systems

  • Examining Intrusion Prevention and Snort Rules
  • Examining Variables and Variable Sets
  • Examining Intrusion Policies

Site-to-Site VPN

  • Examining IPsec
  • Site-to-Site VPN Configuration
  • Site-to-Site VPN Troubleshooting
  • Implementing Site-to-Site VPN

Remote-Access VPN

  • Examining Remote-Access VPN
  • Examining Public-Key Cryptography and Certificates
  • Examining Certificate Enrollment
  • Remote-Access VPN Configuration
  • Implementing Remote-Access VPN

SSL Decryption

  • Examining SSL Decryption
  • Configuring SSL Policies
  • SSL Decryption Best Practices and Monitoring

Detailed Analysis Techniques

  • Examining Event Analysis
  • Examining Event Types
  • Examining Contextual Data
  • Examining Analysis Tools
  • Threat Analysis

System Administration

  • Managing Updates
  • Examining User Account Management Features
  • Configuring User Accounts
  • System Administration

Cisco Firepower Troubleshooting

  • Examining Common Misconfigurations
  • Examining Troubleshooting Commands
  • Firepower Troubleshooting
Tags: Cisco

Weitere Schulungen zu Thema Cisco

Cisco Digital Network Architecture Implementation Workshop (DNAIW)

- u.a. in Nürnberg, Berlin, Stuttgart, München, Köln

Dieser Praxisworkshop gibt den Teilnehmern einen umfassenden Einblick in die Cisco Digital Network Architecture (DNA) und ihre Lösungskomponenten. Der Kurs hebt die Notwendigkeit der Digitalisierung in Netzwerken und die Leitprinzipien der DNA hervor. Der Kurs konzentriert ...

Cisco ASA Firewall Deployment (ASAFW)

- u.a. in Nürnberg, Berlin, Stuttgart, München, Köln

Dieser fünftägige Kurs versetzt Security Administratoren in die Lage, grundlegende und fortgeschrittene Securitylösungen mit der Cisco ASA zu implementieren. Er vertieft bestehende Kenntnisse und erweitert diese durch Erläuterung des breiten Funktionsspektrums der Cisco ...

Understanding Cisco Wireless Foundations (WLFNDU)

- u.a. in Bremen, Stuttgart, Wien, Dresden, Offenbach

After taking this course, you should be able to: Describe and implement foundational wireless theory, Describe and implement basic wireless security and client access, Describe and implement a Cisco wireless network architecture, Configure Cisco centralized wireless networks, ...

Implementing Cisco SD-WAN Solutions (ENSDWI)

- u.a. in Berlin, Bremen, Stuttgart, Düsseldorf, Heidelberg

The Implementing Cisco SD-WAN Solutions (ENSDWI) v2.0 course gives you training about how to design, deploy, configure, and manage your Cisco® Software-Defined WAN (SD-WAN) solution in a large-scale live network, including how to migrate from legacy WAN to SD-WAN. You will ...