View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

Security

SEC0230 - FTD 6.1 ASA Device Installation (Part 2)

The video walks you through Cisco ASA 5500X to FTD conversion process. Rommon is used to erase ASA image and configuration and replace with FTD. We will demonstrate device initialization for local device management as well as preparing it to connect to Firepower Management Center (FMC). You will also get the first look at Firepower Device Manager (FDM).
Rating: 
5
Average: 5 (3 votes)
Difficulty Level: 
0

SEC0230 - FTD 6.1 ASA Device Installation (Part 1)

The video walks you through Cisco ASA 5500X to FTD conversion process. Rommon is used to erase ASA image and configuration and replace with FTD. We will demonstrate device initialization for local device management as well as preparing it to connect to Firepower Management Center (FMC). You will also get the first look at Firepower Device Manager (FDM).
Rating: 
5
Average: 5 (3 votes)
Difficulty Level: 
0

Cisco ISE 2.2 Video Bundle

This video bundle features a complete video download set for Cisco ISE 2.2. With over 25 hours of lab video tutorial, you will be able to get up to speed and become more familiar with the technologies. Buy this video bundle and view them locally on your computer at your own pace without internet connection, and also save over 41%. 

Cisco FlexVPN Video Bundle

This video bundle features a complete video download set for Cisco FlexVPN. With almost 15 hours of lab video tutorial, you will be able to get up to speed and become more familiar with the technologies. Buy this video bundle and view them locally on your computer at your own pace without internet connection, and also save over 18%. 

SEC0229 - ASA Firepower 6.0 Certificate-Based Access Control (Part 2)

The video looks at additional features on Cisco Firepower 6.0 SSL policy that can be used to implement access control. We will explore various way to perform traffic matching based on certificate attributed including self-signed certificate, expired certificate, certificate common name, and allowed cipher suites. We will also validate our configuration with some testing.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0229 - ASA Firepower 6.0 Certificate-Based Access Control (Part 1)

The video looks at additional features on Cisco Firepower 6.0 SSL policy that can be used to implement access control. We will explore various way to perform traffic matching based on certificate attributed including self-signed certificate, expired certificate, certificate common name, and allowed cipher suites. We will also validate our configuration with some testing.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0228 - ASA Firepower 6.0 SSL Decryption (Part 2)

The video walks you through configuration on Cisco ASA FirePower 6.0 for traffic decryption. We will look at decrypting traffic for both inbound and outbound. Any certificate generation, public and private key import will be shown. We will test our configuration using executable file inspection and compare the results when Firepower is configured with and without SSL policy.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0228 - ASA Firepower 6.0 SSL Decryption (Part 1)

The video walks you through configuration on Cisco ASA FirePower 6.0 for traffic decryption. We will look at decrypting traffic for both inbound and outbound. Any certificate generation, public and private key import will be shown. We will test our configuration using executable file inspection and compare the results when Firepower is configured with and without SSL policy.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0227 - ASA Firepower 6.0 Passive and Active Authentication (Part 3)

The video walks you through two available methods of obtaining user identity on ASA Firepower 6.0; Passive and Active authentication. We will configure Passive authentication using Firepower User Agent to obtain User-to-IP mapping and enforce differentiated network access based on AD user group membership. We will also configure Active authentication as a backup method to obtain user identity from a non-domain computer.
Rating: 
5
Average: 5 (3 votes)
Difficulty Level: 
0

SEC0227 - ASA Firepower 6.0 Passive and Active Authentication (Part 2)

The video walks you through two available methods of obtaining user identity on ASA Firepower 6.0; Passive and Active authentication. We will configure Passive authentication using Firepower User Agent to obtain User-to-IP mapping and enforce differentiated network access based on AD user group membership. We will also configure Active authentication as a backup method to obtain user identity from a non-domain computer.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

Pages

Subscribe to RSS - Security