Price:
$4,295.00
Days:
1
Virtual
– • Describe information security concepts and strategies within the network
– • Describe security flaws in the transmission protocol/internet protocol (TCP/IP) and how they can be used to attack networks and hosts
– • Describe network application-based attacks
– • Describe how various network security technologies work together to guard against attacks
– • Implement access control on Cisco Secure Firewall Adaptive Security Appliance (ASA)
– • Deploy Cisco Secure Firewall Threat Defense basic configurations
– • Deploy Cisco Secure Firewall Threat Defense IPS, malware, and fire policies
– • Deploy Cisco Secure Email Gateway basic configurations
– • Deploy Cisco Secure Email Gateway policy configurations
– • Describe and implement basic web content security features and functions provided by Cisco Secure Web Appliance
– • Describe various attack techniques against the endpoints
– • Describe Cisco Umbrella® security capabilities, deployment models, policy management, and Investigate console
– • Provide basic understanding of endpoint security and be familiar with common endpoint security technologies
– • Describe Cisco Secure Endpoint architecture and basic features
– • Describe Cisco Secure Network Access solutions
– • Describe 802.1X and extensible authentication protocol (EAP) authentication
– • Configure devices for 802.1X operations
– • Introduce VPNs and describe cryptography solutions and algorithms
– • Describe Cisco secure site-to-site connectivity solutions
– • Deploy Cisco Internetwork Operating System (Cisco IOS®) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs
– • Configure point-to-point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
– • Describe Cisco secure remote access connectivity solutions
– • Deploy Cisco secure remote access connectivity solutions
– • Provide an overview of network infrastructure protection controls
– • Examine various defenses on Cisco devices that protect the control plane
– • Configure and verify Cisco IOS software layer 2 data plane controls
– • Configure and verify Cisco IOS software and Cisco ASA layer 3 data plane controls
– • Examine various defenses on Cisco devices that protect the management plane
– • Describe the baseline forms of telemetry recommended for network infrastructure and security devices
– • Describe deploying Cisco Secure Network Analytics
– • Describe basics of cloud computing and common cloud attacks
– • Describe how to secure cloud environment
– • Describe the deployment of Cisco Secure Cloud Analytics
– • Describe basics of software-defined networks and network programmability
• Intermediate knowledge of Cisco IOS or IOS XE
• Familiarity with Cisco IOS or IOS XE and Cisco IOS XR software configuration
• Knowledge of IPv4 and IPv6 transmission control protocol (TCP)/IP networking
• Intermediate knowledge of IP routing protocols
• Understanding of MPLS technologies
• Familiarity with VPN technologies
• Familiarity with Ethernet and TCP/IP networking
• Working knowledge of the Windows operating system
• Working knowledge of Cisco IOS networking and concepts
• Familiarity with basics of networking security concepts
– • Cisco Secure Email Policy Configuration
– • Cisco Secure Email Policy Configuration
– • Cisco Secure Email Policy Configuration
– • Cisco Secure Email Policy Configuration
– • Cisco Secure Web Appliance Deployment
– • Cisco Secure Web Appliance Deployment
– • Cisco Secure Web Appliance Deployment
– • Cisco Secure Web Appliance Deployment
– • VPN Technologies and Cryptography Concepts
– • VPN Technologies and Cryptography Concepts
– • VPN Technologies and Cryptography Concepts
– • VPN Technologies and Cryptography Concepts
– • Cisco Secure Site-to-Site VPN Solutions
– • Cisco Secure Site-to-Site VPN Solutions
– • Cisco Secure Site-to-Site VPN Solutions
– • Cisco Secure Site-to-Site VPN Solutions
– • Cisco IOS VTI-Based Point-to-Point IPsec VPNs
– • Cisco IOS VTI-Based Point-to-Point IPsec VPNs
– • Cisco IOS VTI-Based Point-to-Point IPsec VPNs
– • Cisco IOS VTI-Based Point-to-Point IPsec VPNs
– • Point-to-Point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
– • Point-to-Point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
– • Point-to-Point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
– • Point-to-Point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
– • Cisco Secure Remote-Access VPN Solutions
– • Cisco Secure Remote-Access VPN Solutions
– • Cisco Secure Remote-Access VPN Solutions
– • Cisco Secure Remote-Access VPN Solutions
– • Remote-Access SSL VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
– • Remote-Access SSL VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
– • Remote-Access SSL VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
– • Remote-Access SSL VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
– • Describing Information Security Concepts
– • Describing Information Security Concepts
– • Describing Information Security Concepts
– • Describing Information Security Concepts
– • Describe Common TCP/IP Attacks
– • Describe Common TCP/IP Attacks
– • Describe Common TCP/IP Attacks
– • Describe Common TCP/IP Attacks
– • Describe Common Network Application Attacks
– • Describe Common Network Application Attacks
– • Describe Common Network Application Attacks
– • Describe Common Network Application Attacks
– • Common Endpoint Attacks
– • Common Endpoint Attacks
– • Common Endpoint Attacks
– • Common Endpoint Attacks
– • Cisco Umbrella Deployment
– • Cisco Umbrella Deployment
– • Cisco Umbrella Deployment
– • Cisco Umbrella Deployment
– • Endpoint Security Technologies
– • Endpoint Security Technologies
– • Endpoint Security Technologies
– • Endpoint Security Technologies
– • Cisco Secure Endpoint
– • Cisco Secure Endpoint
– • Cisco Secure Endpoint
– • Cisco Secure Endpoint
– • Cisco Secure Network Access Solutions
– • Cisco Secure Network Access Solutions
– • Cisco Secure Network Access Solutions
– • Cisco Secure Network Access Solutions
– • 802.1X Authentication
– • 802.1X Authentication
– • 802.1X Authentication
– • 802.1X Authentication
– • 802.1X Authentication Configuration
– • 802.1X Authentication Configuration
– • 802.1X Authentication Configuration
– • 802.1X Authentication Configuration
– • Network Infrastructure Protection
– • Network Infrastructure Protection
– • Network Infrastructure Protection
– • Network Infrastructure Protection
– • Control Plane Security Solutions
– • Control Plane Security Solutions
– • Control Plane Security Solutions
– • Control Plane Security Solutions
– • Layer 2 Data Plane Security Controls
– • Layer 2 Data Plane Security Controls
– • Layer 2 Data Plane Security Controls
– • Layer 2 Data Plane Security Controls
– • Layer 3 Data Plane Security Controls
– • Layer 3 Data Plane Security Controls
– • Layer 3 Data Plane Security Controls
– • Layer 3 Data Plane Security Controls
– • Management Plane Security Controls
– • Management Plane Security Controls
– • Management Plane Security Controls
– • Management Plane Security Controls
– • Traffic Telemetry Methods
– • Traffic Telemetry Methods
– • Traffic Telemetry Methods
– • Traffic Telemetry Methods
– • Cisco Secure Network Analytics Deployment
– • Cisco Secure Network Analytics Deployment
– • Cisco Secure Network Analytics Deployment
– • Cisco Secure Network Analytics Deployment
– • Cloud Computing and Cloud Security
– • Cloud Computing and Cloud Security
– • Cloud Computing and Cloud Security
– • Cloud Computing and Cloud Security
– • Cloud Security
– • Cloud Security
– • Cloud Security
– • Cloud Security
– • Cisco Secure Cloud Analytics Deployment
– • Cisco Secure Cloud Analytics Deployment
– • Cisco Secure Cloud Analytics Deployment
– • Cisco Secure Cloud Analytics Deployment
– • Software-Defined Networking
– • Software-Defined Networking
– • Software-Defined Networking
– • Software-Defined Networking
– • Lab Outline
– • Lab Outline
– • Lab Outline
– • Lab Outline
– • Network Security Technologies
– • Network Security Technologies
– • Network Security Technologies
– • Network Security Technologies
– • Cisco Secure Firewall ASA Deployment
– • Cisco Secure Firewall ASA Deployment
– • Cisco Secure Firewall ASA Deployment
– • Cisco Secure Firewall ASA Deployment
– • Cisco Secure Firewall Threat Defense Basics
– • Cisco Secure Firewall Threat Defense Basics
– • Cisco Secure Firewall Threat Defense Basics
– • Cisco Secure Firewall Threat Defense Basics
– • Cisco Secure Firewall Threat Defense IPS, Malware, and File Policies
– • Cisco Secure Firewall Threat Defense IPS, Malware, and File Policies
– • Cisco Secure Firewall Threat Defense IPS, Malware, and File Policies
– • Cisco Secure Firewall Threat Defense IPS, Malware, and File Policies
– • Cisco Secure Email Gateway Basics
– • Cisco Secure Email Gateway Basics
– • Cisco Secure Email Gateway Basics
– • Cisco Secure Email Gateway Basics
– • Network Security Technologies
– • Network Security Technologies
– • Network Security Technologies
– • Network Security Technologies
– • Cisco Secure Firewall ASA Deployment
– • Cisco Secure Firewall ASA Deployment
– • Cisco Secure Firewall ASA Deployment
– • Cisco Secure Firewall ASA Deployment
– • Cisco Secure Firewall Threat Defense Basics
– • Cisco Secure Firewall Threat Defense Basics
– • Cisco Secure Firewall Threat Defense Basics
– • Cisco Secure Firewall Threat Defense Basics
– • Cisco Secure Firewall Threat Defense IPS, Malware, and File Policies
– • Cisco Secure Firewall Threat Defense IPS, Malware, and File Policies
– • Cisco Secure Firewall Threat Defense IPS, Malware, and File Policies
– • Cisco Secure Firewall Threat Defense IPS, Malware, and File Policies
– • Cisco Secure Firewall Threat Defense IPS, Malware, and File Policies
– • Cisco Secure Email Gateway Basics
– • Cisco Secure Email Gateway Basics
– • Cisco Secure Email Gateway Basics
– • Cisco Secure Email Gateway Basics
– • Cisco Secure Email Policy Configuration
– • Cisco Secure Email Policy Configuration
– • Cisco Secure Email Policy Configuration
– • Cisco Secure Email Policy Configuration
– • Cisco Secure Web Appliance Deployment
– • Cisco Secure Web Appliance Deployment
– • Cisco Secure Web Appliance Deployment
– • Cisco Secure Web Appliance Deployment
– • VPN Technologies and Cryptography Concepts
– • VPN Technologies and Cryptography Concepts
– • VPN Technologies and Cryptography Concepts
– • VPN Technologies and Cryptography Concepts
– • Cisco Secure Site-to-Site VPN Solutions
– • Cisco Secure Site-to-Site VPN Solutions
– • Cisco Secure Site-to-Site VPN Solutions
– • Cisco Secure Site-to-Site VPN Solutions
– • Cisco IOS VTI-Based Point-to-Point IPsec VPNs
– • Cisco IOS VTI-Based Point-to-Point IPsec VPNs
– • Cisco IOS VTI-Based Point-to-Point IPsec VPNs
– • Cisco IOS VTI-Based Point-to-Point IPsec VPNs
– • Point-to-Point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
– • Point-to-Point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
– • Point-to-Point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
– • Point-to-Point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
– • Cisco Secure Remote-Access VPN Solutions
– • Cisco Secure Remote-Access VPN Solutions
– • Cisco Secure Remote-Access VPN Solutions
– • Cisco Secure Remote-Access VPN Solutions
– • Remote-Access SSL VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
– • Remote-Access SSL VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
– • Remote-Access SSL VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
– • Remote-Access SSL VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
– • Describing Information Security Concepts
– • Describing Information Security Concepts
– • Describing Information Security Concepts
– • Describing Information Security Concepts
– • Describe Common TCP/IP Attacks
– • Describe Common TCP/IP Attacks
– • Describe Common TCP/IP Attacks
– • Describe Common TCP/IP Attacks
– • Describe Common Network Application Attacks
– • Describe Common Network Application Attacks
– • Describe Common Network Application Attacks
– • Describe Common Network Application Attacks
– • Common Endpoint Attacks
– • Common Endpoint Attacks
– • Common Endpoint Attacks
– • Common Endpoint Attacks
– • Cisco Umbrella Deployment
– • Cisco Umbrella Deployment
– • Cisco Umbrella Deployment
– • Cisco Umbrella Deployment
– • Endpoint Security Technologies
– • Endpoint Security Technologies
– • Endpoint Security Technologies
– • Endpoint Security Technologies
– • Cisco Secure Endpoint
– • Cisco Secure Endpoint
– • Cisco Secure Endpoint
– • Cisco Secure Endpoint
– • Cisco Secure Network Access Solutions
– • Cisco Secure Network Access Solutions
– • Cisco Secure Network Access Solutions
– • Cisco Secure Network Access Solutions
– • 802.1X Authentication
– • 802.1X Authentication
– • 802.1X Authentication
– • 802.1X Authentication
– • 802.1X Authentication Configuration
– • 802.1X Authentication Configuration
– • 802.1X Authentication Configuration
– • 802.1X Authentication Configuration
– • Network Infrastructure Protection
– • Network Infrastructure Protection
– • Network Infrastructure Protection
– • Network Infrastructure Protection
– • Control Plane Security Solutions
– • Control Plane Security Solutions
– • Control Plane Security Solutions
– • Control Plane Security Solutions
– • Layer 2 Data Plane Security Controls
– • Layer 2 Data Plane Security Controls
– • Layer 2 Data Plane Security Controls
– • Layer 2 Data Plane Security Controls
– • Layer 3 Data Plane Security Controls
– • Layer 3 Data Plane Security Controls
– • Layer 3 Data Plane Security Controls
– • Layer 3 Data Plane Security Controls
– • Management Plane Security Controls
– • Management Plane Security Controls
– • Management Plane Security Controls
– • Management Plane Security Controls
– • Traffic Telemetry Methods
– • Traffic Telemetry Methods
– • Traffic Telemetry Methods
– • Traffic Telemetry Methods
– • Cisco Secure Network Analytics Deployment
– • Cisco Secure Network Analytics Deployment
– • Cisco Secure Network Analytics Deployment
– • Cisco Secure Network Analytics Deployment
– • Cloud Computing and Cloud Security
– • Cloud Computing and Cloud Security
– • Cloud Computing and Cloud Security
– • Cloud Computing and Cloud Security
– • Cloud Security
– • Cloud Security
– • Cloud Security
– • Cloud Security
– • Cisco Secure Cloud Analytics Deployment
– • Cisco Secure Cloud Analytics Deployment
– • Cisco Secure Cloud Analytics Deployment
– • Cisco Secure Cloud Analytics Deployment
– • Software-Defined Networking
– • Software-Defined Networking
– • Software-Defined Networking
– • Software-Defined Networking
– • Lab Outline
– • Lab Outline
– • Lab Outline
– • Lab Outline
Support Diversity, Equity, and Inclusion with Every Purchase.
Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.
Give your organization the skills edge it needs. Our corporate training experts will work with you to design, deliver, and support a customized IT program that drives real business results.