View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

decryption

SEC0353 - Firepower 6.7 FDM Identity and SSL Decryption (Part 2)

The video shows you how to configure Identity and SSL Decrypt Policies on Cisco Firepower 6.7 using Firepower Device Manager. We will enable passive authentication with Cisco ISE to allow our Access Control policy to leverage AD user group. SSL decrypt will be used to detect and block encrypted malware traffic.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0353 - Firepower 6.7 FDM Identity and SSL Decryption (Part 1)

The video shows you how to configure Identity and SSL Decrypt Policies on Cisco Firepower 6.7 using Firepower Device Manager. We will enable passive authentication with Cisco ISE to allow our Access Control policy to leverage AD user group. SSL decrypt will be used to detect and block encrypted malware traffic.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0315 - PAN 9.0 SSL Decryption (Part 3)

The video looks at various aspects around traffic decryption on Palo Alto Firewall. We will be focusing on two commonly-used SSL decryption features namely SSL Forward Proxy and SSL Inbound Inspection to inspect user outbound internet, and inbound to our public-facing server. We will look at a way to prevent FW evasion with SSH tunneling using SSH Proxy. The lab finishes with a discussion around QUIC protocol.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0315 - PAN 9.0 SSL Decryption (Part 2)

The video looks at various aspects around traffic decryption on Palo Alto Firewall. We will be focusing on two commonly-used SSL decryption features namely SSL Forward Proxy and SSL Inbound Inspection to inspect user outbound internet, and inbound to our public-facing server. We will look at a way to prevent FW evasion with SSH tunneling using SSH Proxy. The lab finishes with a discussion around QUIC protocol.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0315 - PAN 9.0 SSL Decryption (Part 1)

The video looks at various aspects around traffic decryption on Palo Alto Firewall. We will be focusing on two commonly-used SSL decryption features namely SSL Forward Proxy and SSL Inbound Inspection to inspect user outbound internet, and inbound to our public-facing server. We will look at a way to prevent FW evasion with SSH tunneling using SSH Proxy. The lab finishes with a discussion around QUIC protocol.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0228 - ASA Firepower 6.0 SSL Decryption (Part 2)

The video walks you through configuration on Cisco ASA FirePower 6.0 for traffic decryption. We will look at decrypting traffic for both inbound and outbound. Any certificate generation, public and private key import will be shown. We will test our configuration using executable file inspection and compare the results when Firepower is configured with and without SSL policy.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0228 - ASA Firepower 6.0 SSL Decryption (Part 1)

The video walks you through configuration on Cisco ASA FirePower 6.0 for traffic decryption. We will look at decrypting traffic for both inbound and outbound. Any certificate generation, public and private key import will be shown. We will test our configuration using executable file inspection and compare the results when Firepower is configured with and without SSL policy.
Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0152 - ASA CX Malware Protection and Safe Search (Part 2)

The video goes over two security features of Cisco ASA CX; Malware Protection, and Safe Search. You will be introduced to the concept of web reputation score and how it is used to help CX identify websites that potentially contain malware. We will demonstrate the use of reputation profile on both access and decryption policies. The second half of this lab covers Safe Search and how and why you might want to consider enabling this feature in your user environment along with its caveats.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0152 - ASA CX Malware Protection and Safe Search (Part 1)

The video goes over two security features of Cisco ASA CX; Malware Protection, and Safe Search. You will be introduced to the concept of web reputation score and how it is used to help CX identify websites that potentially contain malware. We will demonstrate the use of reputation profile on both access and decryption policies. The second half of this lab covers Safe Search and how and why you might want to consider enabling this feature in your user environment along with its caveats.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0151 - ASA CX URL and Web Category Filtering (Part 2)

The video shows you how to configure Cisco ASA CX to perform web filtering. We will be creating a whitelist and blacklist of website URL that we want to enforce on our users. We will then take one step further and leverage website category that is built into the CX. In addition to a deny action, we will explore a warn option and try to explore its behavior. To show you the flexibility of web category, we will apply it to decryption policy to get better control of the type of traffic that will or will not get decrypted. The video finishes by showing you the customization of user notification pages.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

Pages

Subscribe to RSS - decryption