course

Home / Courses / Cisco® Securing Networks with Cisco Firepower® Next Generation Firewall v1.0 (SSNGFW)

Course Objectives

After taking this course, you should be able to:

  • Describe key concepts of NGIPS and NGFW technology and the Cisco Firepower Threat Defense system, and identify deployment scenarios Perform initial Cisco Firepower Threat Defense device configuration and setup tasks Describe how to manage traffic and implement Quality of Service (QoS) using Cisco Firepower Threat Defense Describe how to implement NAT by using Cisco Firepower Threat Defense Perform an initial network discovery, using Cisco Firepower to identify hosts, applications, and services Describe the behavior, usage, and implementation procedure for access control policies Describe the concepts and procedures for implementing security intelligence features

Agenda

  • Examining Firewall and IPS Technology
  • Firepower Threat Defense Features and Components
  • Examining Firepower Platforms
  • Examining Firepower Threat Defense Licensing
  • Cisco Firepower Implementation Use Cases

  • Firepower Threat Defense Device Registration
  • FXOS and Firepower Device Manager
  • Initial Device Setup
  • Managing NGFW Devices
  • Examining Firepower Management Center Policies
  • Examining Objects
  • Examining System Configuration and Health Monitoring
  • Device Management
  • Examining Firepower High Availability
  • Configuring High Availability
  • Cisco ASA to Firepower Migration
  • Migrating from Cisco ASA to Firepower Threat Defense

  • Firepower Threat Defense Packet Processing
  • Implementing QoS
  • Bypassing Traffic

  • NAT Basics
  • Implementing NAT
  • NAT Rule Examples
  • Implementing NAT

  • Examining Network Discovery
  • Configuring Network Discovery
  • Implementing Access Control Policies
  • Examining Access Control Policies
  • Examining Access Control Policy Rules and Default Action
  • Implementing Further Inspection
  • Examining Connection Events
  • Access Control Policy Advanced Settings
  • Access Control Policy Considerations
  • Implementing an Access Control Policy

  • Examining Security Intelligence
  • Examining Security Intelligence Objects
  • Security Intelligence Deployment and Logging
  • Implementing Security Intelligence

  • Examining Malware and File Policy
  • Examining Advanced Malware Protection

  • Examining Intrusion Prevention and Snort Rules
  • Examining Variables and Variable Sets
  • Examining Intrusion Policies

  • Examining IPsec
  • Site-to-Site VPN Configuration
  • Site-to-Site VPN Troubleshooting
  • Implementing Site-to-Site VPN

  • Examining Remote-Access VPN
  • Examining Public-Key Cryptography and Certificates
  • Examining Certificate Enrollment
  • Remote-Access VPN Configuration
  • Implementing Remote-Access VPN

  • Examining SSL Decryption
  • Configuring SSL Policies
  • SSL Decryption Best Practices and Monitoring

  • Examining Event Analysis
  • Examining Event Types
  • Examining Contextual Data
  • Examining Analysis Tools
  • Threat Analysis

  • Managing Updates
  • Examining User Account Management Features
  • Configuring User Accounts
  • System Administration

  • Examining Common Misconfigurations
  • Examining Troubleshooting Commands
  • Firepower Troubleshooting
Tags
Technical Core Type: Core 4 Product Line: Cisco Vendor: Cisco HTD
FREE

Interested in course?


Course Type: Instructor Led