Firepower Threat Defense Workshop![]() | ||
| Langue : UK | Durée : 5 jours | |
| Lieu : Bertrange | Prix : 3 750.00 € (Euro) | |
WORKSHOP CONTENT
Day 1
Overview of technology
- Next Generation Firewall Security
- Types of Firewalls
- Routing in FTD
- Next Generation IPS
- IDS vs IPS
Firepower Components and Features
- Firepower System
- Firepower Features
- Firepower Automation
- Firepower Components
- Firepower Management Center
- Firepower Device
- Firepower Naming Conventions
- Firepower Platforms
- Firepower Stacking
- Firepower Threat Defense
- Unified Access Control Policies
- High-level Feature Comparison
- Firepower 9300 and 4100 Details
- Firepower Management Center
Firepower Management Center
- FMC Basics
- How FMC works
- FMC Management
- FMC Limits
- FMC GUI
- FMC GUI Menus
- FMC Analysis Menu
- FMC Policies Menu
- FMC Devices Menu
- FMC Domain Management
- How to Create FMC Domains
- Firepower Licensing
- Smart Licensing
Cisco Firepower System Configurations
- FTD Device Registration
- FTD Device Configuration
- FMC Configuration
- FTD Device Properties
- FTD Interfaces
- FTD Modes
- FMC Policies Basics
- Firepower Policy Flow
- Deployment
Labs:
- Lab 1 - Introduction to Lab Topology
- Lab 2 - Navigating Firepower Management Center
- Lab 3 - Device Management
Day 2
Firepower High Availability
- Firepower Management Center HA
- 7000 and 8000 HA
- Firepower Threat Defense HA
- NAT Policy Configuration
- NAT Policy Configuration
- NAT Works
- NAT Types
- Configuring NAT with FMC
- NAT Rules
- NAT Auto NAT Rules
- PAT pool
- NAT
- NAT Verification
- NAT Examples
QoS Policy Configuration
- How QoS Works
- How to Create QoS Policy
- QoS Policy Rules
- QoS Examples
FlexConfig Policies
- FlexConfig Policy Overview
- Scripts
- Customizing Device Configuration
Firepower Discovery
- Network Discovery Components
- Fingerprinting Hosts
- How it works
- Discovery Modes
- Passive Detection
- Active Detection for Hosts
- Host Identity
- Identity Workflow
- Conflict Workflow
- Discovery Policies
- Network Discovery Policy
- Network Discovery Rules
- Rule Actions
- Host Limits
- Discovery of Users
- User Limits
- Identity Sources
- Portal
- User Identity Configuration
- Identity Policy
Objects
- Objects
- Object Basics
- Object Groups
- Overrides
- ACP Object Relationship
- General Objects
- Advanced Objects
- Variables
Labs:
- Lab 4 - NAT Policy Configuration
- Lab 5 - QoS Policy Configuration
- Lab 6 – FlexConfig Policies
- Lab 7 - Network Discovery Policy
- Lab 8 - Object Management
Day 3
Prefilter Policies
- Introduction to Prefiltering
- Prefiltering vs Access Control
- Configuring Prefiltering
Access Control Policy
- ACP Components
- ACP Rules
- ACP Default Action
- Rule Action - Block
- Rule Action - Monitor
- Rule Action - Trust
- Rule Action - Allow
- ACP Inspection Options
- Logging Options
- Advanced Settings
- ACP Inheritance
Security Intelligence
- Security Intelligence Overview
- SI Whitelists and Blacklists
- SI Objects
- SI Feeds
- Feed Categories
- List Objects
- SI Deployment
File and Malware Policy
- File Identification SHA-256
- File-Type Detection
- File Policy Rules
- File Policy Basics
- File Types
- Advanced Options
- Advanced Malware Protection
- File Dispositions
- AMP Cloud
- AMP Architecture
- AMP Advanced Options
- AMP Integration
Next Generation Intrusion Prevention
- Intrusion Prevention Basics
- Rules
- Rule Examples
- Snort
- Talos
- Variables
- Intrusion Policy
- Network Analysis Policy
- Traffic Flow for Intrusion Policy
- Components
- Policy Layers
- Shared Policy Layers
- Creating New Intrusion Policy
- Intrusion Policy Configuration
- Intrusion Policy Rules
- Rule Options
- Firepower Recommendations
Labs:
- Lab 9: Prefilter Policies
- Lab 10: Access Control Policy
- Lab 11: Security Intelligence
- Lab 12: File and Malware Policy
- Lab 13: Intrusion Policy
Day 4
Network Analysis Policy
- Preprocessor Technology
- Preprocessor Flow
- Preprocessor Rules
- Network Policy Settings
- Adaptive Profiles
- Adaptive Profile Configuration
SSL Policy
- Anatomy of SSL Sessions
- Firepower SSL Decryption
- Firepower SSL Architecture
- Decrypt Resign
- Decrypt Known Key
- SSL Policy
- SSL Policy Settings
- SSL Policy Rules
- SSL Policy Default Action
- Applying SSL Policy
VPN Deployments
- VPN Overview
- VPN Types
- VPN Basics
- Licensing
- Firepower Threat Defense Site-to-Site VPN
- Firepower Threat Defense Remote Access VPNs
Labs:
- Lab 14: Network Analysis Policy
- Lab 15: SSL Policy
- Lab 16: Site to Site VPN
- Lab 17: Remote VPN
Day 5
Correlation Policies
- Responses
- Remediation
- Custom Remediation Modules
- Correlation Policy Rules
- How to Create Policy Rules
- Whitelists
- Traffic Profiles
- Correlation Policy
Analysis
- Event Basics
- FMC Analysis
- FMC Database
- eStreamer
- Analysis Search
- Workflows
- Security Intelligent Events
- File and Malware Events
- Impact Flags
- Indication of Compromise
- Analysis Tools
- Reporting
System Administration
- System Configuration
- FMC Configuration Settings
- Health Monitoring
- Health Policy
- Firepower Updates
- User Account Management
- Multidomain Deployments
Labs:
- Lab 18: Correlation Policy
- Lab 19: Analysis of events
- Lab 20 - System Administration

