Syllabus
Securing Networks with Cisco Firepower Next Generation Firewall (SSNGFW) v1.0 Training Course Singapore.
Securing Networks with Cisco Firepower Next Generation Firewall (SSNGFW) v1.0 Course Overview
Today’s corporate environment relies heavily on technology to enable success and hold a competitive advantage. With this dependency, organizations need to fortify their systems and information. Businesses recruit professionals with certificates and accreditations to avoid taking risks in an age of constant cybersecurity and hacking threats.
The Securing Networks with Cisco Firepower Next Generation Firewall (SSNGFW) v1.0 training course offers a credential in the cybersecurity field that is recognized worldwide. The course teaches professionals how to customize the Cisco security system based on an organization’s unique security requirements. This SSNGFW online course is highly recommended for professionals looking to establish their expertise with Cisco systems and security protocols. Check out the dates below to enroll for this Securing Networks with Cisco Firepower Next Generation Firewall course today.
Module 1: Cisco Firepower Threat Defense Overview
Examining Firewall and IPS Technology
Firepower Threat Defense Features and Components
Examining Firepower Platforms
Examining Firepower Threat Defense Licensing
Cisco Firepower Implementation Use Cases
Module 2: Cisco Firepower NGFW Device Configuration
Firepower Threat Defense Device Registration
FXOS and Firepower Device Manager
Initial Device Setup
Managing NGFW Devices
Examining Firepower Management Center Policies
Examining Objects
Examining System Configuration and Health Monitoring
Device Management
Examining Firepower High Availability
Configuring High Availability
Cisco ASA to Firepower Migration
Migrating from Cisco ASA to Firepower Threat Defense
Module 3: Cisco Firepower NGFW Traffic Control
Firepower Threat Defense Packet Processing
Implementing QoS
Bypassing Traffic
Module 4: Cisco Firepower NGFW Address Translation
NAT Basics
Implementing NAT
NAT Rule Examples
Implementing NAT
Module 5: Cisco Firepower Discovery
Examining Network Discovery
Configuring Network Discovery
Module 6: Implementing Access Control Policies
Examining Access Control Policies
Examining Access Control Policy Rules and Default Action
Implementing Further Inspection
Examining Connection Events
Access Control Policy Advanced Settings
Access Control Policy Considerations
Implementing an Access Control Policy
Module 7: Security Intelligence
Examining Security Intelligence
Examining Security Intelligence Objects
Security Intelligence Deployment and Logging
Implementing Security Intelligence
Module 8: File Control and Advanced Malware Protection
Examining Malware and File Policy
Examining Advanced Malware Protection
Module 9: Next-Generation Intrusion Prevention Systems
Examining Intrusion Prevention and Snort Rules
Examining Variables and Variable Sets
Examining Intrusion Policies
Module 10: Site-to-Site VPN
Examining IPsec
Site-to-Site VPN Configuration
Site-to-Site VPN Troubleshooting
Implementing Site-to-Site VPN
Module 11: Remote-Access VPN
Examining Remote-Access VPN
Examining Public-Key Cryptography and Certificates
Examining Certificate Enrollment
Remote-Access VPN Configuration
Implementing Remote-Access VPN
Module 12: SSL Decryption
Examining SSL Decryption
Configuring SSL Policies
SSL Decryption Best Practices and Monitoring
Module 13: Detailed Analysis Techniques
Examining Event Analysis
Examining Event Types
Examining Contextual Data
Examining Analysis Tools
Threat Analysis
Module 14: System Administration
Managing Updates
Examining User Account Management Features
Configuring User Accounts
System Administration
Module 15: Cisco Firepower Troubleshooting
Examining Common Misconfigurations
Examining Troubleshooting Commands
Firepower Troubleshooting
Module 16: Lab outline
Initial Device Setup
Device Management
Configuring High Availability
Migrating from Cisco ASA to Cisco Firepower Threat Defense
Implementing QoS
Implementing NAT
Configuring Network Discovery
Implementing an Access Control Policy
Implementing Security Intelligence
Implementing Site-to-Site VPN
Implementing Remote Access VPN
Threat Analysis
System Administration
Firepower Troubleshooting