View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

threat

SEC0460 - Umbrella SecureX Integration (Part 2)

The video walks you through an integration of Cisco Umbrella with SecureX. We will look at how SecureX platform can be used to centrally streamline threat management and response. We will provide a simple demonstration on an investigation of an malware event from Umbrella and initiate a domain block action from SecureX.

Rating: 
0
No votes yet
Difficulty Level: 
2

SEC0460 - Umbrella SecureX Integration (Part 1)

The video walks you through an integration of Cisco Umbrella with SecureX. We will look at how SecureX platform can be used to centrally streamline threat management and response. We will provide a simple demonstration on an investigation of an malware event from Umbrella and initiate a domain block action from SecureX.

Rating: 
0
No votes yet
Difficulty Level: 
2

SEC0389 - Firepower 7.0 SGT (Part 2)

The video walks you through Security Group Tag (SGT) matching in Access Control Policy on Cisco Firepower 7.0. We will leverage an existing ISE integration and perform traffic matching using two methods: Source inline SGT, and Destination SXP mapping. This provides additional flexibility in building access control rule for an environment that has Cisco ISE.

Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0389 - Firepower 7.0 SGT (Part 1)

The video walks you through Security Group Tag (SGT) matching in Access Control Policy on Cisco Firepower 7.0. We will leverage an existing ISE integration and perform traffic matching using two methods: Source inline SGT, and Destination SXP mapping. This provides additional flexibility in building access control rule for an environment that has Cisco ISE.

Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0388 - Firepower 7.0 Threat Intelligence Director (Part 3)

The video looks at how Threat Intelligence Director (TID) can help enhance an ability to detect threats on Cisco Firepower 7.0. We will explain how TID operates and demonstrate its detection capabilities from three supported threat sources: Static File Upload, STIX File and TAXII.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0388 - Firepower 7.0 Threat Intelligence Director (Part 2)

The video looks at how Threat Intelligence Director (TID) can help enhance an ability to detect threats on Cisco Firepower 7.0. We will explain how TID operates and demonstrate its detection capabilities from three supported threat sources: Static File Upload, STIX File and TAXII.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0388 - Firepower 7.0 Threat Intelligence Director (Part 1)

The video looks at how Threat Intelligence Director (TID) can help enhance an ability to detect threats on Cisco Firepower 7.0. We will explain how TID operates and demonstrate its detection capabilities from three supported threat sources: Static File Upload, STIX File and TAXII.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0380 - Firepower 7.0 Intrusion Basic (Part 4)

The video introduces you to basic concepts of Intrusion policy on Cisco Firepower 7.0. We will go through necessary configuration to enable IDS/IPS features using Snort 2 and Snort 3. We will perform intrusion testing using ICMP traffic and demonstrate fine-tuning options on an intrusion rule.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0380 - Firepower 7.0 Intrusion Basic (Part 3)

The video introduces you to basic concepts of Intrusion policy on Cisco Firepower 7.0. We will go through necessary configuration to enable IDS/IPS features using Snort 2 and Snort 3. We will perform intrusion testing using ICMP traffic and demonstrate fine-tuning options on an intrusion rule.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0380 - Firepower 7.0 Intrusion Basic (Part 2)

The video introduces you to basic concepts of Intrusion policy on Cisco Firepower 7.0. We will go through necessary configuration to enable IDS/IPS features using Snort 2 and Snort 3. We will perform intrusion testing using ICMP traffic and demonstrate fine-tuning options on an intrusion rule.

Rating: 
0
No votes yet
Difficulty Level: 
3

Pages

Subscribe to RSS - threat