0845 450 6120

SITCS Implementing Cisco Threat Control Solutions

Implementing Cisco Threat Control Solutions (SITCS) v1.0 is a newly created five-day instructor-led training (vILT) course, which is part of the curriculum path leading to the Cisco Certified Network Professional Security (CCNP© Security) certification.

Additionally, this course is designed to prepare security engineers with the knowledge and hands-on experience so that they can deploy Cisco's Next Generation Firewall (NGFW) as well as Web Security, Email Security and Cloud Web Security. The goal of the course is to provide you with foundational knowledge and the capabilities to implement and managed security on Cisco ASA firewalls utilizing Cisco Next Generation product solution which integrates Cisco Prime Security Manager for managing identity policies.

Who should attend

  • The primary audience for this course is as follows:
  • Network Security Engineers
Reset

Learning Objectives

Upon completing this course, the learner will be able to meet these overall objectives:

  • Understand Cisco ASA Next-Generation Firewall (NGFW)
  • Deploy Cisco Web Security appliance to mitigate malware
  • Configure Web Security appliance for acceptable use controls
  • Configure Cisco Cloud Web Security Connectors
  • Describe Cisco Email Security Solution
  • Configure Cisco Email Appliance Incoming and Outgoing Policies
  • Describe IPS Threat Controls
  • Configure and Implement Cisco IPS Sensor into a Network

Pre-Requisites

This section lists the skills and knowledge that you must possess to benefit fully from the course. This section includes recommended Cisco learning offerings that the learners may complete to benefit fully from this course, including the following:

  • Cisco Certified Network Associate (CCNA®) certification
  • Cisco Certified Network Associate (CCNA®) Security certification
  • Knowledge of Microsoft Windows operating system

Course Content

Module 1: Cisco ASA (CX) NGFW
Describing the Cisco (CX) NGFW Services within the Cisco Modular Network Architecture
Describing the Cisco ASA (CX) NGFW Management Architecture
Configuring Cisco ASA (CX) NGFW Policy Objects
Monitoring Cisco ASA (CX) NGFW Operations
Configuring Cisco ASA (CX) NGFW Access Policies
Lab 1-1: Exploring Cisco ASA (CX) NGFW and PRSM
Lab 1-2: Configuring Cisco ASA (CX) NGFW Access Policy Lab
Configuring Cisco ASA (CX) NGFW Identity Policies
Lab 1-3: Configuring Cisco ASA (CX) NGFW Identity Policy Lab
Configuring Cisco ASA (CX) NGFW Decryption Policies
Lab 1-4: Configuring Cisco ASA (CX) NGFW Decryption Policy Lab

Module 2: Cisco Web Security Appliance
Describing the Cisco Web Security Appliance Solutions
Integrating the Cisco Web Security Appliance
Configuring Cisco Web Security Appliance Identities and User Authentication Controls
Configuring Cisco Web Security Appliance Acceptable Use Controls
Configuring Cisco Web Security Appliance Anti-Malware Controls
Lab 2-1: Configuring Cisco Web Security Appliance Lab
Configuring Cisco Web Security Appliance Decryption Configuring Cisco Web Security Appliance Data Security Controls

Module 3 Cisco Cloud Web Security
Describing the Cisco Cloud Web Security Solutions
Configuring Cisco Cloud Web Security Connectors
Describing the Web Filtering Policy in Cisco ScanCenter
Lab 3-1: Configuring Cisco Cloud Web Security Connector on ISR G2 and on AnyConnect Lab

Module 4 Cisco Email Security Appliance
Describing the Cisco Email Security Solutions
Describing the Cisco Email Security Appliance Basic Configuration Concepts
Configuring Cisco Email Security Appliance Incoming and Outgoing Mail Policies
Lab 4-1 Configuring Basic Cisco Email Security Mail Policies Lab
Describing IPS Threat Controls

Module 5 Cisco Intrusion Prevention Systems
Integrating Cisco IPS Sensor into a Network
Configuring Basic Cisco IPS Settings
Lab 5-1: Configuring Basic Cisco IPS Settings Lab
Tuning Cisco IPS Signatures
Configuring Custom Cisco IPS Signatures
Configuring Cisco IPS Anomaly-Detection
Configuring Cisco IPS Reputation-Based Features
Lab 5-2: Tuning Cisco IPS Signatures and Anomaly-Detection Lab

Privacy Notice

In order to provide you with the service requested we will need to retain and use your contact information in accordance with our Privacy Notice. If you choose to provide us with this information you explicitly consent to us using the information as necessary to provide the request service to you. If you do not agree please do not proceed to request the service from us.

Marketing Permissions

Would you like to receive our newsletter and other information on products and services which we think will be of interest to you by email. We will always treat your information with care and in accordance with our Privacy Notice. You are free to withdraw this permission at any time.

 

Online Courses

You may prefer an online course if you are looking for a flexible and cost-effective solution. Online courses allow you to study at your own pace, at a time that suits you.

We have the following eLearning options available:

Virtual Classroom

Virtual classrooms provide all the benefits of attending a classroom course without the need to arrange travel and accomodation. Please note that virtual courses are attended in real-time, commencing on a specified date.

Virtual Course Dates

Our Customers Include