This lab-intensive 5-day course introduces the student to the basic next-generation intrusion prevention system (NGIPS) and next-generation firewall (NGFW) security concepts. The course then leads you through the Cisco Firepower system. Among other powerful features, you become familiar with:
Firepower Threat Defense configuration,
In-depth event analysis and
NGIPS tuning and configuration.
You also become familiar with the latest platform features: file and malware inspection, security intelligence, domain awareness, and more.
The course begins by introducing the system architecture, the latest major features, and the role of policies in implementing the solution. You learn how to deploy and manage Cisco Firepower Threat Defense devices and perform basic Cisco Firepower discovery. You learn how to use and configure Threat Defense technology, including application control, security intelligence, NGFW, NGIPS, and network-based malware and file controls. Also, you learn how to take advantage of powerful tools, so you can perform more efficient event analysis, including the detection of file types and network-based malware. And you’ll learn how to properly tune systems for better performance and greater network intelligence. The course concludes with system and user administration tasks and Threat Defense system troubleshooting. This course combines lecture materials and hands-on labs that give you practice in deploying and managing the Cisco Firepower system.
Describe the Cisco Firepower Threat Defense system and key concepts of NGIPS and NGFW technology
Describe how to perform the configurations tasks required for implementing a Cisco Firepower Threat Defense device
Describe how to implement quality of service (QoS) and Network Address Translation (NAT) by using Cisco Firepower Threat Defense
Perform an initial network discovery using Cisco Firepower to identify hosts, applications, and services
Identify and create the objects required as prerequisites to implementing access control policies
Describe the behavior, usage, and implementation procedure for access control policies
Describe the concepts and implementation procedure of security intelligence features
Describe Cisco Advanced Malware Protection (AMP) for Networks and the implementation procedure of file control and advanced malware protection
Implement and manage intrusion policies
Explain the use of network analysis policies and the role of preprocessor technology in processing network traffic for NGIPS inspection
Describe and demonstrate the detailed analysis techniques and reporting features provided by the Cisco Firepower Management Center
Describe key Cisco Firepower Management Center system administration and user account management features
Describe the processes that can be used to troubleshoot Cisco Firepower Threat Defense systems
United Training is committed to working as a partner with our clients. Choose United Training and take advantage of the following benefits.
- Robust Public Enrollment Schedule. Enjoy access to hundreds of Guaranteed to Run dates across a diverse catalog of course titles.
- Private Group Training. Let our world-class instructors come to you to deliver training at your place of business or we can present to your team online using our Virtual Instructor-Led Training platform.
- Custom Training Solutions. Our subject matter experts can customize the class to specifically address the unique goals of your team.
- Free Re-Takes. Most completed United Training courses carry our unbeatable Learning Guarantee. This guarantee allows students to repeat most United Training courses, if they are the same version, FREE OF CHARGE, within six months of completion of the courses. Exceptions: Cisco, Citrix, VMware, Red Hat, and courses provided by affiliated 3rd party training providers.
1 - Cisco Firepower Threat Defense Overview
2 - Cisco Firepower System Setup
3 - QoS and NAT Implementation
4 - Cisco Firepower Discovery
5 - Access Control Policy Prerequisites
6 - Implementing Access Control Policies
7 - Security Intelligence
8 - AMP for Networks Malware Protection
9 - Next-Generation Intrusion Prevention Systems
10 - Network Analysis Policies
11 - Detailed Analysis Techniques
12 - System Administration
13 - Cisco Firepower Threat Defense Troubleshooting