Course Overview
This lab-intensive 5-day course introduces the student to the basic next-generation intrusion prevention system (NGIPS) and next-generation firewall (NGFW) security concepts. The course then leads you through the Cisco Firepower system. Among other powerful features, you become familiar with:
Firepower Threat Defense configuration,
In-depth event analysis and
NGIPS tuning and configuration.
You also become familiar with the latest platform features: file and malware inspection, security intelligence, domain awareness, and more.
The course begins by introducing the system architecture, the latest major features, and the role of policies in implementing the solution. You learn how to deploy and manage Cisco Firepower Threat Defense devices and perform basic Cisco Firepower discovery. You learn how to use and configure Threat Defense technology, including application control, security intelligence, NGFW, NGIPS, and network-based malware and file controls. Also, you learn how to take advantage of powerful tools, so you can perform more efficient event analysis, including the detection of file types and network-based malware. And you’ll learn how to properly tune systems for better performance and greater network intelligence. The course concludes with system and user administration tasks and Threat Defense system troubleshooting. This course combines lecture materials and hands-on labs that give you practice in deploying and managing the Cisco Firepower system.
Course Objectives
Describe the Cisco Firepower Threat Defense system and key concepts of NGIPS and NGFW technology
Describe how to perform the configurations tasks required for implementing a Cisco Firepower Threat Defense device
Describe how to implement quality of service (QoS) and Network Address Translation (NAT) by using Cisco Firepower Threat Defense
Perform an initial network discovery using Cisco Firepower to identify hosts, applications, and services
Identify and create the objects required as prerequisites to implementing access control policies
Describe the behavior, usage, and implementation procedure for access control policies
Describe the concepts and implementation procedure of security intelligence features
Describe Cisco Advanced Malware Protection (AMP) for Networks and the implementation procedure of file control and advanced malware protection
Implement and manage intrusion policies
Explain the use of network analysis policies and the role of preprocessor technology in processing network traffic for NGIPS inspection
Describe and demonstrate the detailed analysis techniques and reporting features provided by the Cisco Firepower Management Center
Describe key Cisco Firepower Management Center system administration and user account management features
Describe the processes that can be used to troubleshoot Cisco Firepower Threat Defense systems
- Top-rated instructors: Our crew of subject matter experts have an average instructor rating of 4.8 out of 5 across thousands of reviews.
- Authorized content: We maintain more than 35 Authorized Training Partnerships with the top players in tech, ensuring your course materials contain the most relevant and up-to date information.
- Interactive classroom participation: Our virtual training includes live lectures, demonstrations and virtual labs that allow you to participate in discussions with your instructor and fellow classmates to get real-time feedback.
- Post Class Resources: Review your class content, catch up on any material you may have missed or perfect your new skills with access to resources after your course is complete.
- Private Group Training: Let our world-class instructors deliver exclusive training courses just for your employees. Our private group training is designed to promote your team’s shared growth and skill development.
- Tailored Training Solutions: Our subject matter experts can customize the class to specifically address the unique goals of your team.
Agenda
1 - Cisco Firepower Threat Defense Overview
2 - Cisco Firepower System Setup
3 - QoS and NAT Implementation
4 - Cisco Firepower Discovery
5 - Access Control Policy Prerequisites
6 - Implementing Access Control Policies
7 - Security Intelligence
8 - AMP for Networks Malware Protection
9 - Next-Generation Intrusion Prevention Systems
10 - Network Analysis Policies
11 - Detailed Analysis Techniques
12 - System Administration
13 - Cisco Firepower Threat Defense Troubleshooting