> > > SSFIPS Detailed outline

Securing Networks with Cisco Firepower Next-Generation IPS (SSFIPS)

Course Description Schedule Course Outline

Detailed Course Outline

  • Module 1: Sourcefire System Overview and Classroom Setup
  • Module 2: Device Management
  • Module 3: Object Management
  • Module 4: Access Control Policy
  • Module 5: Network-based Malware Detection
  • Module 6: FireSIGH Technology
  • Module 7: Correlation Policies
  • Module 8: IPS Policy Basics
  • Module 9: Advanced IPS Polcity Configurations
  • Module 10: User Account Management
  • Module 11: Event Anlaysis
  • Module 12: Reporting
  • Module 13: Basic Rule Syntax and Usage
  • Module 14: Case Studies in Rule Writing and Packet Analysis

Lab Outline

  • Lab 1: Verifying the License
  • Lab 2: Testing the Environment by Running Attack PCAPs
  • Lab 3: Viewing Events
  • Lab 4: Layer 2 and 3 Simulation
  • Lab 5: Inline Interface Configuration
  • Lab 6: Creating Objects
  • Lab 7: Creating an Access Control Policy (Port Inspection)
  • Lab 8: Creating an Access Control Policy (Application Awareness)
  • Lab 9: URL Filtering
  • Lab 10: Including an IPS Policy in Access Control Rules
  • Lab 11: Creating a File Policy
  • Lab 12: Tunning the Network Discovery Policy
  • Lab 13: Viewing FireSIGHT Data
  • Lab 14: User Discovery
  • Lab 15: Creating a Correlation Policy Based on Connection Data
  • Lab 16: White Lists
  • Lab 17: Working with Connection Data and Traffic Profiles
  • Lab 18: Creating an Intrusion Policy
  • Lab 19: Including FireSIGHT Recommendations in an Intrusion Policy
  • Lab 20: Tunning Your HTTP_Inspect Preprocessor
  • Lab 21: Apply and Test Your Policy and Varriable Set
  • Lab 22: Create User Accounts and Configure the UI Timeout Value
  • Lab 23: Testing Exempt and Non Exempt Users
  • Lab 24: Permission Escalation
  • Lab 25: Working with External Accounts
  • Lab 26: Analysis Lab
  • Lab 27: Tunning Events
  • Lab 28: Context Explorer
  • Lab 29: Comparing Trends with Reports
  • Lab 30: Writing Custom Rules
  • Lab 31: Research and Packet Analysis
  • Lab 32: Revisiting the Kaminsky Vulnerability
 

Accessing our website tells us you are happy to receive all our cookies. However you can change your cookie settings at any time. Find out more.   Got it!