Font size:

Description:

This is a bundled training package. It contains training for each of the bundled items below:

Course Price
Cisco SITCS 1.0: Cisco ASA (CX) NGFW Services I $74.95
Cisco SITCS 1.0: Cisco ASA (CX) NGFW Services II $74.95
Cisco SITCS 1.0: Cisco Web Security Appliance $74.95
Cisco SITCS 1.0: Configuring Cisco Web Security Appliance $74.95
Cisco SITCS 1.0: Cisco Cloud Web Security $74.95
Cisco SITCS 1.0: Cisco Email Security Appliance $74.95
Cisco SITCS 1.0: Cisco Intrusion Prevention Systems I $74.95
Cisco SITCS 1.0: Cisco Intrusion Prevention Systems II $74.95

Bundle Price: $249.00
Total Savings: $350.60


Cisco SITCS 1.0: Cisco ASA (CX) NGFW Services I

Cisco Adaptive Security Appliance Context Aware Next-Generation Firewalls, or ASA (CX) NGFW provide context-aware security functionality on the Cisco ASA adaptive security appliance platform. Context-awareness implies knowledge and control that are based on application (what), location (where), user-device type (how), and user identity (who). In this course you will learn key Cisco ASA (CX) NGFW functions, management architecture, and protocols as well as the basic Cisco Prime Security Manager (PRSM) GUI functions and Cisco ASA (CX) NGFW CLI operations. In addition, you'll learn the caveats of the Cisco (CX) NGFW management interface, and the Cisco (CX) NGFW and Cisco PRSM licensing requirements, as well as how to how to configure Cisco ASA (CX) NGFW policy objects. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
  • start the course
  • describe where the Cisco ASA (CX) NGFW fits in the overall network topology
  • list the components and explain the benefits of the Cisco ASA (CX) NGFW solution
  • describe how Cisco ASA (CX) NGFW broad and web AVC operate
  • describe the three Cisco ASA (CX) NGFW policy types
  • list the Cisco ASA features that are compatible with Cisco ASA (CX) NGFW
  • identify the physical features of the Cisco ASA CX-SSP hardware module
  • describe the Cisco ASA (CX) NGFW management architecture and protocols
  • compare the on-box Cisco PRSM (single-device mode) and the off-box Cisco PRSM
  • describe the PRSM GUI operations
  • describe the caveats of the Cisco ASA (CX) NGFW software module management interface
  • describe the caveats of the Cisco ASA CX-SSP hardware module management interfaces
  • describe the Cisco ASA (CX) NGFW CLI operations
  • describe the Cisco ASA (CX) NGFW licensing requirements
  • describe the Cisco Off-Box PRSM licensing requirements
  • redirect traffic from Cisco ASA to Cisco ASA (CX) NGFW to enforce context-aware policies on the traffic
  • describe the Cisco ASA (CX) NGFW policy structure
  • describe how policy objects are used within the Cisco ASA (CX) NGFW policy for traffic matching
  • describe how to configure Cisco ASA (CX) network groups
  • describe how to configure Cisco ASA (CX) service objects and service groups
  • describe how to configure Cisco ASA (CX) application objects and application service objects
  • describe how to configure Cisco ASA (CX) URL, User Agent, and identify objects
  • describe how to configure Cisco ASA (CX) source object groups and destination object groups
  • describe how to configure Cisco ASA (CX) secure mobility objects
  • describe how to configure Cisco ASA (CX) action profile objects
  • identify where each policy object can be used in Cisco ASA (CX) NGFW policy configurations
  • describe the use of tagging, ticket IDs, and metadata
  • understand basic Cisco ASA Next-Generation Firewall (NGFW) Services

Cisco SITCS 1.0: Cisco ASA (CX) NGFW Services II

The Cisco Prime Security Manager (PRSM) includes a variety of dashboards with different reports to provide Cisco Adaptive Security Appliance Context Aware Next Generation Firewall, or ASA (CX) NGFW information about device health, performance, and network usage. In this course you will learn how to monitor the Cisco ASA (CX) NGFW, using the Cisco PRSM dashboards, reports, and event viewer and how to configure Cisco ASA (CX) NGFW access and identity policies. You'll also learn how to configure Cisco ASA (CX) NGFW decryption policies in order to detect and control what users are doing on the network. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
  • start the course
  • monitor Cisco ASA (CX) by using the Cisco PRSM dashboards and reports
  • monitor and troubleshoot Cisco ASA (CX) by using the Cisco PRSM Event Viewer
  • monitor Cisco ASA (CX) and Cisco PRSM Cisco SIO updates
  • describe how to configure Cisco ASA (CX) NGFW access policies to match security requirements
  • describe how to configure application controls within an access policy to match security requirements
  • describe how to configure application controls within an access policy to match security requirements
  • describe how to configure URL filtering within an access policy to match security requirements
  • describe how to configure a file filtering profile and apply it to an access policy to match security requirements
  • describe how to configure a web reputation profile and apply it to an access policy to match security requirements
  • troubleshoot Cisco ASA (CX) NGFW access policies
  • describe the differences between Cisco ASA (CX) NGFW active and passive authentication methods
  • describe the functions of Cisco ASA (CX) NGFW passive authentication
  • describe the functions of Cisco ASA (CX) NGFW active authentication
  • list the steps to configure the Cisco ASA (CX) NGFW identity policies
  • describe how to configure an LDAP authentication realm and LDAP directory servers
  • describe how to configure an Active Directory authentication realm and Active Directory directory servers
  • describe how to configure Cisco CDA to integrate with Cisco ASA (CX) NGFW
  • describe how to configure Cisco ASA (CX) NGFW identity policies
  • describe how to configure Cisco ASA (CX) NGFW authentication settings
  • describe how to configure Cisco ASA (CX) NGFW access and decryption policies that use identity objects
  • troubleshoot Cisco ASA (CX) NGFW identity policies
  • describe Cisco ASA (CX) NGFW TLS/SSL decryption operations
  • describe how to enable Cisco ASA (CX) NGFW decryption
  • describe how to configure Cisco ASA (CX) NGFW decryption policies to match security requirements
  • describe how to manage Cisco ASA (CX) NGFW certificates
  • describe how to configure Cisco ASA (CX) NGFW decryption policies to match security requirements
  • troubleshoot Cisco NGFW decryption policies
  • describe how the identity, decryption, and access policies interact with one another
  • configure Cisco ASA (CX) NGFW decryption policies

Cisco SITCS 1.0: Cisco Web Security Appliance

Determining how web traffic will be sent to the Cisco Web Security Appliance (WSA) is often perceived as the most challenging portion of the Cisco WSA integration, since it involves devices outside the WSA. In this course, you will learn Cisco WSA deployment approaches while exploring Cisco WSA key features and supported policies. You'll also learn how to configure identities and user authentication on the Cisco WSA. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
  • start the course
  • identify how to place Cisco WSA into a typical modularized network design
  • provide a high-level overview of the web proxy service and architecture
  • describe the Cisco Web Reputation Filters and the WBRS
  • describe how the Cisco WSA enforces acceptable use
  • describe the Cisco WSA GUI management
  • describe the Cisco WSA policy types
  • describe the Cisco WSA identities
  • describe the Cisco WSA access policy assignment using identity
  • describe the Cisco WSA policy trace tool
  • contrast the Cisco WSA proxy modes
  • describe the PAC files and deployment options
  • describe the PAC file hosting on the Cisco WSA
  • describe the traffic redirection options in the transparent proxy mode
  • describe the required steps to connect the Cisco WSA to the WCCP router
  • describe how to verify operation of WCCP
  • describe how to configure identities to group client transactions
  • describe how to configure a policy group and assign identify to it
  • describe the authentication protocols and proxy modes
  • describe the basic authentication operations in explicit proxy and transparent proxy mode
  • describe the configuration of the realms and realm sequences
  • describe how to join the Cisco WSA to the Active Directory
  • describe the global authentication settings
  • describe how to configure an identity to require authentication
  • describe how to configure transparent user identification
  • describe the creation of LDAP realms
  • describe how to allow guest access to users who fail authentication
  • describe how to test Cisco WSA authentication settings
  • configure Cisco user authentication controls

Cisco SITCS 1.0: Configuring Cisco Web Security Appliance

Cisco Web Security Appliance (WSA) enables you to control user access based on the web server category of a particular HTTP or HTTPS request. Using access policy groups, you can create access policies that control access to websites containing objectionable or questionable content. The sites that are blocked, allowed, or decrypted depend on the categories that you select when you set up URL category filtering within each policy group. In this course, you will learn acceptable use controls provided by the Cisco WSA and the anti-malware feature and its implementation on the Cisco WSA. You will also learn how to configure decryption policies on Cisco Web Security Appliance and the data security controls available on the Cisco WSA. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
  • start the course
  • provide an overview of the two main Cisco Web Security Appliance acceptable use controls
  • describe the process of categorizing a web site
  • describe Cisco Application Visibility Control
  • describe streaming media bandwidth control
  • describe how to use the policies table
  • describe how to configure URL filtering
  • describe the URL category reports
  • describe how to configure AVC
  • describe the Cisco WSA DVS engine
  • describe the differences between Webroot with Sophos or McAfee
  • describe the Cisco WSA adaptive scanning feature
  • describe the Cisco Web Reputation Filters
  • describe how to enable global Scanning Engines, Web Reputation Filtering and Adaptive Scanning
  • describe the inbound reputation filtering and malware scanning configuration
  • describe the outbound malware scanning configuration
  • describe the HTTPS proxy operation
  • describe the invalid certificate handling
  • describe how to configure decryption policies
  • describe data security on the Cisco WSA
  • describe data security policies
  • describe how to control uploaded content
  • configure Web Security Appliance anti-malware controls

Cisco SITCS 1.0: Cisco Cloud Web Security

Web security threats have become more sophisticated, targeted, and harder to avoid, yet the use of personal devices and cloud-delivered services limit your visibility and control. Cisco Cloud Web Security (CWS), formerly known as ScanSafe, delivers web security and control for organizations of all sizes, with multiple deployment options and tight integration into your Cisco data center, network, or branch office. In this course, you will learn how to deploy Cloud Web Security and redirect traffic to the cloud. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
  • start the course
  • identify how to place Cisco Cloud Web Security integration into a typical modularized network design
  • describe the Cisco Cloud Web Security solution
  • describe the Cisco Cloud Web Security traffic flow
  • describe how to obtain the correct type of Cisco Cloud Web Security authentication key and how to verify traffic redirection
  • describe the Cisco ASA Cloud Web Security feature
  • describe how to configure the Cisco ASA using ASDM to integrate with the Cisco CWS
  • describe how to configure the Cisco Cloud Web Security proxy servers in Cisco ASA using the CLI
  • describe how to configure the Cisco Cloud Web Security proxy servers in Cisco ASA with the Whitelist and Identity options
  • provide a Cisco AnyConnect Web Security Module overview
  • describe the overview of installing the Cisco AnyConnect Web Security Module procedure
  • describe how to configure Cisco AnyConnect Web Security Module for Standalone use
  • describe how to configure Cisco ASA to download Cisco AnyConnect Web Security Module to the client machine
  • describe how to verify Cisco AnyConnect Web Security Module operations
  • provide an overview of Cloud Web Security connector on Cisco ISR G2 routers
  • describe how to configure Cloud Web Security connector on Cisco ISR G2 router using the CLI
  • provide a Cisco WSA Cloud Web Security overview
  • provide an overview of the Cisco ScanCenter web filtering configuration
  • describe how to configure ScanCenter web filtering policy
  • describe how to verify web filtering
  • configure Cisco Cloud Web Security Connectors

Cisco SITCS 1.0: Cisco Email Security Appliance

Cisco E-mail Security Appliance (ESA) protects the e-mail infrastructure and employees who use e-mail at work by providing high-availability e-mail protection against the constant, dynamic, and rapidly changing threats affecting e-mail today. The appliance combines best-in-class technologies to prevent and respond to multilevel threats and integrates into existing e-mail infrastructures with a high degree of flexibility. In this course, you will learn about Cisco ESA services and the basic configuration components required to set up the Cisco ESA. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
  • start the course
  • identify how to place Cisco WSA into a typical modularized network design
  • recognize components of the Cisco hybrid security solution
  • describe the SMTP terms
  • describe the e-mail conversation
  • describe the Cisco ESA services
  • describe the Cisco ESA GUI management
  • describe the Cisco Email Security Appliance licensing requirements
  • describe the incoming mail processing
  • explain Cisco ESA to LDAP Integration functions
  • explain the Cisco Registered Envelope Service
  • describe the Cisco ESA listener
  • describe the two Cisco ESA listener types
  • describe one interface, one listener deployment
  • provide an example of LDAP integration using LDAP Query to drop e-mails to nonexisting users
  • describe the Cisco ESA HAT
  • describe the Cisco ESA Sender Group HAT component
  • describe how to Add a Sender Group
  • describe ESA Mail Flow Policy deployments
  • describe the Cisco ESA RAT
  • describe the Cisco ESA SMTP Routes
  • recognize how e-mail relaying on an Internal Mail Server works
  • understand the basics of e-mail security deployment and configurations using the Cisco Email Security Appliance

Cisco SITCS 1.0: Cisco Intrusion Prevention Systems I

Protecting your business assets is becoming more complicated as applications become more dynamic and as more users access enterprise and cloud-based resources from mobile devices. Cisco traditional and next generation Intrusion Prevention System (IPS) solutions can identify and mitigate attacks with market-leading, context-aware threat prevention that augments your firewall and VPN deployments. Cisco IPS devices intelligently determine the best response by looking at multiple factors, including the network reputation of an incoming flow's source, the target's value to the organization, the target's operating system, and the user identity associated with the flow. In this course you'll learn basic definitions and approaches to traditional intrusion prevention/detection systems and next generation IPS, including learning how to configure different Cisco IPS sensor interface modes and Cisco IPS. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
  • start the course
  • identify how to place the Cisco IPS into a typical modularized network design
  • compare Intrusion Detection Systems vs. Intrusion Prevention Systems
  • recognize specific terminology associated with the Intrusion Prevention Systems
  • describe network intrusion prevention approaches
  • describe the Cisco Sourcefire NGIPS Benefits
  • describe the Cisco ASA NGFW Services NGIPS Threat Profile
  • describe how to apply an IPS Threat Profile within a NGFW Services Access Policy
  • describe Cisco IPS sensor deployment modes
  • describe the deployment of Cisco IPS sensors in promiscuous mode
  • describe how to deploy sensors in inline interface pair mode
  • describe how to deploy sensors in inline VLAN pair mode
  • describe how to deploy sensors in inline VLAN group mode
  • describe the Cisco IPS Management options
  • describe how to configure interfaces on an IPS sensor
  • describes how to configure traffic redirection for IPS modules
  • describe different types, features, and actions of Cisco IPS signatures
  • describe the Cisco IPS actions
  • describe how to configure virtual sensor
  • describe the threat rating
  • describe how to configure basic signature properties
  • explain the risk rating
  • describe the inputs for the risk rating calculation
  • describe event action overrides
  • describe how to configure and verify event action overrides
  • describe event action filters
  • examine the IPS Events using IDM
  • integrate Cisco IPS Sensor into a network

Cisco SITCS 1.0: Cisco Intrusion Prevention Systems II

The Cisco SensorBase correlates real-time data from more than 1.5 million devices around the world to create network reputation scores that enable Cisco IPS devices to block threats from known malicious hosts before they pass through the IPS inspection process. In this course, you'll learn how to describe some methodologies for tuning a Cisco IPS sensor to properly manage false positive and negative events, including the methods and configuration procedures to create custom signatures on a Cisco IPS sensor. In addition, you'll learn how to enable the anomaly detection functionality and the reputation-based feature on the Cisco IPS sensor. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
  • start the course
  • describe false negative and false positive events
  • describe Cisco IPS tuning approaches
  • tune Cisco IPS to reduce false positives
  • reduce false positives by narrowing the search context and the header values, limiting the number of matched patterns, decreasing the attention span, and increasing the number of events
  • tune Cisco IPS to reduce false negatives
  • reduce false negatives by using IP reassembly, TCP reassembly, and deobfuscation
  • provide an overview of custom signatures
  • describe the configuration and procedure options in the Custom Signature wizard
  • describe the principles behind anomaly detection
  • describe scanners and histograms
  • describe anomaly detection and actions
  • describe an anomaly detection scenario
  • describe the anomaly detection configuration procedure
  • describe how to verify the operational mode and statistics of anomaly detection
  • describe the traffic processing flow in the IPS sensor Global Correlation and Reputation Filter active
  • describe global correlation operations
  • describe how the IPS sensors send information to Cisco SensorBase using network participation
  • describe the global correlation inspection configurations
  • verify Global Correlation and Reputation Filter operations
  • understanding Cisco Intrusion Prevention Systems
Register Now
Cisco SITCS 1.0: Implementing Cisco Threat Control Solutions e-learning bundle
  • Course ID:
    252889
  • Duration:
    16 hours
  • Price:
    $249