25,000+ Courses Nationwide
0203 908 2376

Integrated Threat Defense Investigation and Mitigation

The Cisco Integrated Threat Defense Investigation and Mitigation course shows you how to identify, isolate, and mitigate network threats using the Cisco® Integrated Threat Defense solution platform. Through expert instruction and lab-based scenarios, you will be introduced to network threat investigation, and learn how to identify relationships between Cisco products and the stages of the attack lifecycle. This course is the second in a pair of courses (Implementing an Integrated Threat Defense Solution) covering the Cisco Integrated Threat Defense (ITD) solution.

Target Audience

Technical professionals who need to know how to use a deployed Integrated Threat Defense (ITD) network solution to identify, isolate and mitigate network threats.

Select specific date to see price, venue and full details.

Learning Objectives

After completing this course you should be able to:

  • Describe the stages of the network attack lifecycle and identify ITD solution platform placement based on a given stage
  • Detail how to locate and mitigate email malware attacks
  • Describe email phishing attacks and the steps taken to locate and mitigate them on the network
  • Identify and mitigate data exfiltration threats on the network
  • Identify malware threats on the network and mitigate those threats after investigation


Attendees should meet the following prerequisites:

  • Technical understanding of TCP/IP networking and network architecture
  • Technical understanding of security concepts and protocols
  • Familiarity with Cisco Identity Services Engine, Cisco Stealthwatch, Cisco Firepower, and Cisco AMP for Endpoints is an advantage

Course Content

Network Threat Investigation Introduction

  • Network Attack Introduction
  • Hunting Network Threats in the Enterprise

Investigation and Mitigation of Email Malware Threats

  • Examining Email Malware Threats
  • Investigating and Verifying Email Malware Threat Mitigation

Investigation and Mitigation of Email Phishing Threats

  • Examining Email Phishing Attacks
  • Configuring Cisco Email Security Applicance (ESA) for URL and Content Filtering
  • Investigating and Verifying Email Phishing Threat Mitigation

Investigation and Mitigation of Data Exfiltration Threats

  • Exploiting Vulnerable Network Servers
  • Investigating Data Exfiltration Threats
  • Mitigating and Verifying Data Exfiltration Threats

Investigation and Mitigation of Malware Threats

  • Examining Endpoint Malware Protection
  • Investigating and Mitigating Endpoint Malware Threats


  • Connecting to the Lab Environment
  • Threat Scenario 1—Email Malware Attachments
  • Threat Scenario 2—Email-Based Phishing
  • Threat Scenario 3—Targeted Network Server Threats and Data Exfiltration
  • Threat Scenario 4—Endpoint Malware Investigation and Mitigation

Exams & Certification

There are no exams currently aligned to this course.

Related Courses

Privacy Notice

In order to provide you with the service requested we will need to retain and use your contact information in accordance with our Privacy Notice. If you choose to provide us with this information you explicitly consent to us using the information as necessary to provide the requested service to you. If you do not agree please do not proceed to request the service from us.

Marketing Permissions

Would you like to receive our newsletter and other information on products and services which we think will be of interest to you by email. We will always treat your information with care and in accordance with our Privacy Notice. You are free to withdraw this permission at any time.


We work with the best