Training: Implementing Cisco Threat Control Solutions - SITCS (exam 300-210)

€ 389,00
€ 470,69 Incl. BTW

duur: 16 uur |

Taal: English (US) |

Online toegang: 180 dagen

In deze Cisco cursus maakt u kennis het implementeren en beveiligen van netwerken via de nieuwste Cisco technologieen.

U maakt onder andere kennis met de functies van Cisco Web Security, integratie van WSA, authenticatie technieken en de configuratie van WSA. Daarnaast leert u een aantal geavanceerde functionaliteiten zoals de configuratie van anti-malware controls, data security controls, configuratie cisco cloud web security, Cisco email security solutions en inkomend/uitgaande mail policies en nog veel meer.

Resultaat

Na succesvolle afronding bent u bekend met het implementeren en beveiligen van netwerken via de nieuwste Cisco technologieen. Tevens bent u optimaal voorbereid op het officiële SITCS examen 300-210/

Voorkennis

Je hebt bij voorkeur de CCNA Security certificering behaald.

Doelgroep

Netwerkbeheerder

Implementing Cisco Threat Control Solutions - SITCS (exam 300-210)

16 uur

Describing and Integrating Cisco Web Security Appliance Solutions

  • start the course
  • describe the way that the Cisco Modular Network Architecture works with the Cisco WSA
  • define the Cisco WSA and WSA Architecture
  • recognize Cisco WSA Malware Detection and Protection
  • describe the Cisco web-based reputation score feature
  • define the Cisco Acceptable Use Policy Enforcement feature
  • describe the Cisco WSA Access Policies
  • recognize the Cisco WSA Identity component
  • work with the Cisco WSA Policy Assignment using the Identity feature
  • describe the Cisco WSA Identity and Authentication feature
  • compare the difference between explicit and transparent proxy mode
  • work with pac files
  • describe the PAC File deployment options
  • recognize PAC File Hosting on Cisco WSA
  • specify Traffic Redirection In Transparent Mode
  • connect the Cisco WSA to a WCCP router
  • verify WCCP
  • define CWS solutions and CWS integration

Configuring Cisco Web Security Appliance Identities and User Authentication

  • start the course
  • configure identities to group client transactions
  • configure policy groups
  • describe the need for user authentication
  • describe authentication protocols and schemes
  • describe basic authentication in explicit proxy and transparent proxy modes
  • configure realms and realm sequences
  • configure NTLM realm for Active Directory
  • join Cisco WSA to Active Directory
  • configure global authentication settings
  • configure an identity to require authentication
  • configure transparent user identification
  • configure an LDAP realm for LDAP servers
  • define how user information is stored in LDAP
  • bind Cisco WSA to the LDAP directory
  • work with LDAP group authorization
  • specify guest access for users failing authentication
  • test authentication settings
  • describe authenticated users in reports
  • define WSA identities and authentication

Configuring WSA Acceptable Use Controls

  • start the course
  • implement acceptable use controls
  • describe the URL categorizing process
  • recognize application visibility and control
  • implement streaming media bandwidth control
  • enable acceptable use controls
  • use the policies table
  • configure URL filtering
  • enable safe search and site content ratings
  • configure custom URL categories
  • describe URL category reports
  • configure AVC
  • configure media bandwidth limits
  • describe AVC reports
  • define WSA acceptable use controls

Configuring WSA Anti-Malware Controls, Decryption, and Data Security Controls

  • start the course
  • describe dynamic vectoring and streaming engine
  • compare Webroot with Sophos or McAfee
  • define adaptive scanning
  • describe web reputation filtering
  • enable web reputation filtering, adaptive scanning, and malware scanning
  • configure inbound web reputation filtering and malware scanning
  • configure outbound malware scanning
  • describe malware reports
  • describe HTTPS proxy operations
  • enable HTTPS proxy
  • recognize invalid destination web server certificate handling
  • configure decryption policies
  • describe WSA data security
  • explain data security policies
  • control uploaded content
  • describe external data loss prevention (DLP)
  • add an ICAP Server
  • define WSA anti-malware controls, decryption, and data security

Configuring Cisco Cloud Web Security

Course_Description=Cloud computing is at the heart of next-generation security services, and Cisco Cloud Web Security (CWS) offers a powerful solution for robust, scalable, real-time security. This course is one in a series in the Skillsoft learning path that covers the objectives of the Implementing Cisco Threat Control Solutions (SITCS) 1.5 exam, 300-210. TargetAudience=IT professionals including managers, engineers, and developers evaluating or implementing network and application security using new Cisco technology, as well as CCNP security certification candidates Duration=00:52

Cisco Email Security Solutions and Basic Setup Components

  • start the course
  • define Cisco Hybrid Email Security Solution
  • recognize SMTP Terminologies, Flow, and Conversation
  • describe Cisco ESA services and GUI management
  • define incoming and outgoing mail processing
  • describe Cisco ESA LDAP integration and Cisco Registered Envelope Service (CRES)
  • describe Cisco ESA Listener
  • specify Cisco ESA deployment examples
  • configure Cisco ESA Listener major components: HAT and RAT
  • describe Cisco ESA One Listener Deployment Scenarios
  • configure a One Listener Deployment Scenario: HAT > Sender Group and Sender Group SBRS
  • configure a One Listener Deployment Scenario: HAT > BLACKLIST and RELAYLIST Sender Groups
  • configure a One Listener Deployment Scenario: HAT > Add Sender Group
  • configure a One Listener Deployment Scenario: HAT > Mail Flow Policy
  • configure a One Listener Deployment Scenario: HAT > Mail Flow Policy > Anti-Spam and Anti-Virus
  • configure a One Listener Deployment Scenario: HAT > Mail Flow Policies Summary
  • configure a One Listener Deployment Scenario: RAT
  • configure a One Listener Deployment Scenario: SMTP Routes
  • configure a One Listener Deployment Scenario: Email Relaying on Internal Mail Server
  • define ESA security solutions and configuration

Configuring Cisco ESA Basic Incoming and Outgoing Mail Policies

Course_Description=The Cisco ESA uses two different sets of mail policies for message content security: incoming mail policies and outgoing mail policies. Having separate policies allows you to define different security rules for messages sent to your users and messages sent from your users. This course is one in a series in the Skillsoft learning path that covers the objectives of the Implementing Cisco Threat Control Solutions (SITCS) 1.5 exam, 300-210. TargetAudience=IT professionals including managers, engineers, and developers evaluating or implementing network and application security using new Cisco technology, as well as CCNP security certification candidates Duration=01:02

AMP for Endpoints Overview, Architecture, Custom Detection, and AMP Policy

  • start the course
  • describe modern malware and why defenses fail
  • define AMP for Endpoints
  • describe AMP for Endpoints architecture and AMP Connector architecture
  • install components and Connector component interaction
  • specify the role of the AMP cloud
  • recognize transaction processing
  • work with real-time data mining
  • define private cloud architecture and modes
  • describe detection, application control, DFC options, and IOCs
  • recognize Endpoint Policy
  • define policy modes
  • describe simple custom detections
  • create a simple custom detection
  • describe application blocking
  • work with advanced custom signatures
  • define whitelisting
  • specify Android custom detections
  • describe DFC IP blacklists and whitelists
  • configure exclusions and custom exclusion sets
  • define AMP for Endpoints

FireSIGHT, FirePOWER, Access Control, and Discovery

  • start the course
  • describe the Cisco FireSIGHT System - FirePOWER NGIPS and NGFW
  • define Cisco FireSIGHT system detection, architecture, and components
  • describe Cisco FireSIGHT system device configuration - traffic flows
  • describe device management
  • work with the Interfaces tab
  • configure virtual device and static route
  • manage objects
  • describe Access Control Policy
  • configure Access Control Policy
  • specify default action
  • describe the Targets tab
  • define security intelligence
  • describe HTTP responses
  • describe the Advanced tab
  • explain Access Control Policy rules
  • describe rule constraints
  • save and apply the Access Control Policy
  • work with the Host Discovery and Network Discovery Policy
  • define FireSIGHT, FirePOWER, Access Control Policy, and discovery

Additional FireSIGHT, FirePOWER, Access Control, and Discovery

Course_Description=Cisco is presently driving customers to the Firepower services. Although customers have made investments in Cisco IPS, and Cisco continues to invest in and update Cisco IPS, the long-term direction is definitely Firepower services. This course is one in a series in the Skillsoft learning path that covers the objectives of the Implementing Cisco Threat Control Solutions (SITCS) 1.5 exam, 300-210. TargetAudience=IT professionals including managers, engineers, and developers evaluating or implementing network and application security using new Cisco technology, as well as CCNP security certification candidates. Duration=00:55

IOCs, Deploying AMP Connectors, and AMP Analysis Tools

  • start the course
  • describe Indications of Compromise (IOCs)
  • define IOC scanning
  • customize IOCs
  • create groups
  • deploy Windows Connectors
  • deploy Direct Download
  • create the installer (public cloud)
  • deploy Email
  • describe Microsoft Windows installation and interface
  • specify connectivity considerations
  • perform command line installation
  • describe Event View Filters and Events List
  • define Event Detail: File Detection and Connector info
  • describe File Analysis and the File Analysis page
  • recognize File Analysis Results and File Repository
  • describe Trajectory and the File Trajectory Page, Device Trajectory, Filters, and Search
  • define Prevalence
  • recognize vulnerable software
  • report and create a report
  • define IOCs and IOC Scanning, Deploying AMP Connectors, and AMP Analysis tools

Network Analysis Policy

Course_Description=One of the biggest trends in security today is telemetry. This involves information gathering, reporting, and analysis in order to offer robust and dynamic defense in depth. This course covers analysis, reporting, correlation rules, and policy. This course is one in a series in the Skillsoft learning path that covers the objectives of the Implementing Cisco Threat Control Solutions (SITCS) 1.5 exam, 300-210. TargetAudience=IT professionals including managers, engineers, and developers evaluating or implementing network and application security using new Cisco technology, as well as CCNP security certification candidates. Duration=00:44

IPS and Cisco ASA 5500-X Series FirePOWER Services (SFR) Module

  • start the course
  • describe basic Snort rule structure
  • define Snort rule headers
  • describe Snort rule bodies
  • recognize Cisco ASA FirePOWER services (SFR) module
  • work with Cisco FireSIGHT management center
  • describe Cisco ASA FirePOWER services software module management interface
  • install Cisco ASA FirePOWER services module package
  • verify Cisco ASA FirePOWER services module
  • redirect traffic to Cisco ASA FirePOWER services module
  • define basic rule syntax and usage, and install ASA 5500-X SFR module

Wij bieden, naast de training, in sommige gevallen ook diverse extra leermiddelen aan. Wanneer u zich gaat voorbereiden op een officieel examen dan raden wij aan om ook de extra leermiddelen te gebruiken die beschikbaar zijn bij deze training. Het kan voorkomen dat bij sommige cursussen alleen een examentraining en/of LiveLab beschikbaar is.

Examentraining (proefexamens)

In aanvulling op deze training kunt u een speciale examentraining aanschaffen. De examentraining bevat verschillende proefexamens die het echte examen dicht benaderen. Zowel qua vorm als qua inhoud. Dit is de ultieme manier om te testen of u klaar bent voor het examen. 

LiveLab

Als extra mogelijkheid bij deze training kunt u een LiveLab toevoegen. U voert de opdrachten uit op de echte hardware en/of software die van toepassing zijn op uw Lab. De LiveLabs worden volledig door ons gehost in de cloud. U heeft zelf dus alleen een browser nodig om gebruik te maken van de LiveLabs. In de LiveLab omgeving vindt u de opdrachten waarmee u direct kunt starten. De labomgevingen bestaan uit complete netwerken met bijvoorbeeld clients, servers, routers etc. Dit is de ultieme manier om uitgebreide praktijkervaring op te doen.

Waarom Icttrainingen.nl?

Orderproces

Zodra wij je order en betaling hebben verwerkt, zetten wij de trainingen klaar en kan je aan de slag. Heb je toch nog vragen over ons orderproces kan je onderstaande button raadplegen.

lees meer over het orderproces

Wat is inbegrepen?

Duur 16 uur
Taal English (US)
Certificaat van deelname Ja
Online toegang 180 dagen
Voortgangsbewaking Ja
Award Winning E-learning Ja
Examen mogelijkJa
Geschikt voor mobiel Ja

Ook inbegrepen in ons unieke leerplatform

Kennis delen Onbeperkte toegang to onze community van IT professionals
Studieadvies Onze consultants staan altijd voor je klaar om advies te geven over je studie of carrière
Studiemateriaal Gecertificeerde docenten met inhoudelijke kennis over de onderwerpen
Platform Toegang tot ons platform
Service Service via chat, telefoon, e-mail (razendsnel)

Life Long Learning

Meerdere cursussen volgen? Misschien is ons Life Long Learning concept wel wat voor u

lees meer

Neem contact op

Studieadvies nodig? Neem contact op!


contact