Price:
$1,995.00
Days:
1
Virtual
– • Describe Cisco WSA
– • Deploy proxy services
– • Utilize authentication
– • Describe decryption policies to control HTTPS traffic
– • Understand differentiated traffic access policies and identification profiles
– • Enforce acceptable use control settings
– • Defend against malware
– • Describe data security and data loss prevention
– • Perform administration and troubleshooting
• TCP/IP services
• Domain Name System (DNS)
• Secure Shell (SSH)
• FTP
• Simple Network Management Protocol (SNMP)
• HTTP
• HTTPS
• IP routing
• Describing Cisco WSA
• Describing Cisco WSA
• Describing Cisco WSA
• Deploying Proxy Services
• Deploying Proxy Services
• Deploying Proxy Services
• Utilizing Authentication
• Utilizing Authentication
• Utilizing Authentication
• Creating Decryption Policies to Control HTTPS Traffic
• Creating Decryption Policies to Control HTTPS Traffic
• Creating Decryption Policies to Control HTTPS Traffic
• Understanding Differentiated Traffic Access Policies and Identification Profiles
• Understanding Differentiated Traffic Access Policies and Identification Profiles
• Understanding Differentiated Traffic Access Policies and Identification Profiles
• Defending Against Malware
• Defending Against Malware
• Defending Against Malware
• Enforcing Acceptable Use Control Settings
• Enforcing Acceptable Use Control Settings
• Enforcing Acceptable Use Control Settings
• Data Security and Data Loss Prevention
• Data Security and Data Loss Prevention
• Data Security and Data Loss Prevention
• Performing Administration and Troubleshooting
• Performing Administration and Troubleshooting
• Performing Administration and Troubleshooting
• References
• References
• References
• Lab Outline
• Lab Outline
• Lab Outline
• Describing Cisco WSA
• Describing Cisco WSA
• Describing Cisco WSA
• Deploying Proxy Services
• Deploying Proxy Services
• Deploying Proxy Services
• Utilizing Authentication
• Utilizing Authentication
• Utilizing Authentication
• Creating Decryption Policies to Control HTTPS Traffic
• Creating Decryption Policies to Control HTTPS Traffic
• Creating Decryption Policies to Control HTTPS Traffic
• Understanding Differentiated Traffic Access Policies and Identification Profiles
• Understanding Differentiated Traffic Access Policies and Identification Profiles
• Understanding Differentiated Traffic Access Policies and Identification Profiles
• Defending Against Malware
• Defending Against Malware
• Defending Against Malware
• Enforcing Acceptable Use Control Settings
• Enforcing Acceptable Use Control Settings
• Enforcing Acceptable Use Control Settings
• Data Security and Data Loss Prevention
• Data Security and Data Loss Prevention
• Data Security and Data Loss Prevention
• Performing Administration and Troubleshooting
• Performing Administration and Troubleshooting
• Performing Administration and Troubleshooting
• References
• References
• References
• Lab Outline
• Lab Outline
• Lab Outline
Support Diversity, Equity, and Inclusion with Every Purchase.
Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.
Give your organization the skills edge it needs. Our corporate training experts will work with you to design, deliver, and support a customized IT program that drives real business results.