View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

fmc

SEC0380 - Firepower 7.0 Intrusion Basic (Part 4)

The video introduces you to basic concepts of Intrusion policy on Cisco Firepower 7.0. We will go through necessary configuration to enable IDS/IPS features using Snort 2 and Snort 3. We will perform intrusion testing using ICMP traffic and demonstrate fine-tuning options on an intrusion rule.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0380 - Firepower 7.0 Intrusion Basic (Part 3)

The video introduces you to basic concepts of Intrusion policy on Cisco Firepower 7.0. We will go through necessary configuration to enable IDS/IPS features using Snort 2 and Snort 3. We will perform intrusion testing using ICMP traffic and demonstrate fine-tuning options on an intrusion rule.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0380 - Firepower 7.0 Intrusion Basic (Part 2)

The video introduces you to basic concepts of Intrusion policy on Cisco Firepower 7.0. We will go through necessary configuration to enable IDS/IPS features using Snort 2 and Snort 3. We will perform intrusion testing using ICMP traffic and demonstrate fine-tuning options on an intrusion rule.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0380 - Firepower 7.0 Intrusion Basic (Part 1)

The video introduces you to basic concepts of Intrusion policy on Cisco Firepower 7.0. We will go through necessary configuration to enable IDS/IPS features using Snort 2 and Snort 3. We will perform intrusion testing using ICMP traffic and demonstrate fine-tuning options on an intrusion rule.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0379 - Firepower 7.0 User Identity (Part 3)

The video walks you through how to incorporate user identity information in Access Control Rules on Cisco Firepower 7.0. We will look at both Passive authentication with ISE integration for internal corporate users, and Active authentication in a guest internet access scenario.

Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0379 - Firepower 7.0 User Identity (Part 2)

The video walks you through how to incorporate user identity information in Access Control Rules on Cisco Firepower 7.0. We will look at both Passive authentication with ISE integration for internal corporate users, and Active authentication in a guest internet access scenario.

Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0379 - Firepower 7.0 User Identity (Part 1)

The video walks you through how to incorporate user identity information in Access Control Rules on Cisco Firepower 7.0. We will look at both Passive authentication with ISE integration for internal corporate users, and Active authentication in a guest internet access scenario.

Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0378 - Firepower 7.0 Custom Application Detector (Part 2)

The video shows you how to discover, match and deny custom application using an Application Detector on Cisco Firepower 7.0. We will perform packet capture on a custom application and QUIC protocol and use them to build app detector policy that later can be referenced in an app-based access control rules. This provides great flexibility to match application traffic unknown to Firepower.

Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0378 - Firepower 7.0 Custom Application Detector (Part 1)

The video shows you how to discover, match and deny custom application using an Application Detector on Cisco Firepower 7.0. We will perform packet capture on a custom application and QUIC protocol and use them to build app detector policy that later can be referenced in an app-based access control rules. This provides great flexibility to match application traffic unknown to Firepower.

Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0377 - Firepower 7.0 Application Filtering (Part 2)

The video demonstrates Cisco Secure Firewall capability to perform traffic filtering based on application and application categories on Firepower 7.0. We will compare packet matching in network and application-based access control rules. We will construct firewall policy to handle different applications, some of which are RDP, Bit Torrent, Facebook, and Social Networking.

Rating: 
0
No votes yet
Difficulty Level: 
3

Pages

Subscribe to RSS - fmc