> > > SITCS Detailed outline

Implementing Cisco Threat Control Solutions (SITCS)

Course Description Schedule Course Outline

Detailed Course Outline

Module 1: Cisco ASA (CX) NGFW
  • Describing the Cisco (CX) NGFW Services within the Cisco Modular Network Architecture
  • Describing the Cisco ASA (CX) NGFW Management Architecture
  • Configuring Cisco ASA (CX) NGFW Policy Objects
  • Monitoring Cisco ASA (CX) NGFW Operations
  • Configuring Cisco ASA (CX) NGFW Access Policies
  • Lab 1-1: Exploring Cisco ASA (CX) NGFW and PRSM
  • Lab 1-2: Configuring Cisco ASA (CX) NGFW Access Policy Lab
  • Configuring Cisco ASA (CX) NGFW Identity Policies
  • Lab 1-3: Configuring Cisco ASA (CX) NGFW Identity Policy Lab
  • Configuring Cisco ASA (CX) NGFW Decryption Policies
  • Lab 1-4: Configuring Cisco ASA (CX) NGFW Decryption Policy Lab

Module 2: Cisco Web Security Appliance
  • Describing the Cisco Web Security Appliance Solutions
  • Integrating the Cisco Web Security Appliance
  • Configuring Cisco Web Security Appliance Identities and User Authentication Controls
  • Configuring Cisco Web Security Appliance Acceptable Use Controls
  • Configuring Cisco Web Security Appliance Anti-Malware Controls
  • Lab 2-1: Configuring Cisco Web Security Appliance Lab
  • Configuring Cisco Web Security Appliance Decryption Configuring Cisco Web Security Appliance Data Security Controls

Module 3 Cisco Cloud Web Security
  • Describing the Cisco Cloud Web Security Solutions
  • Configuring Cisco Cloud Web Security Connectors
  • Describing the Web Filtering Policy in Cisco ScanCenter
  • Lab 3-1: Configuring Cisco Cloud Web Security Connector on ISR G2 and on AnyConnect Lab

Module 4 Cisco Email Security Appliance
  • Describing the Cisco Email Security Solutions
  • Describing the Cisco Email Security Appliance Basic Configuration Concepts
  • Configuring Cisco Email Security Appliance Incoming and Outgoing Mail Policies
  • Lab 4-1 Configuring Basic Cisco Email Security Mail Policies Lab
  • Describing IPS Threat Controls

Module 5 Cisco Intrusion Prevention Systems
  • Integrating Cisco IPS Sensor into a Network
  • Configuring Basic Cisco IPS Settings
  • Lab 5-1: Configuring Basic Cisco IPS Settings Lab
  • Tuning Cisco IPS Signatures
  • Configuring Custom Cisco IPS Signatures
  • Configuring Cisco IPS Anomaly-Detection
  • Configuring Cisco IPS Reputation-Based Features
  • Lab 5-2: Tuning Cisco IPS Signatures and Anomaly-Detection Lab

 

Accessing our website tells us you are happy to receive all our cookies. However you can change your cookie settings at any time. Find out more.   Got it!