View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

SEC0381 - Firepower 7.0 Intrusion Advanced (Part 2)

Rating: 
0
No votes yet
Difficulty Level: 
3
Lab Document: 
<Please login to see the content>

The video looks into additional capabilities available in Intrusion Policies on Cisco Firepower 7.0. We will demonstrate a use of Firepower recommendation that helps you customize intrusion policy to fit your organization traffic pattern. We will perform intrusion rule synchronization from Snort 2 to Snort 3. Metasploit with Kali Linux will be used to test our configuration.

Part 2 of this video covers rule validation and intrusion event monitoring

Topic:

  • Firepower Recommendation
  • Snort 2 and 3 Rule Synchronization
  • Intrusion Events
  • Email Alert

About Author

Metha Chiewanichakorn, CCIE#23585 (Ent. Infra, Sec, SP), is a Cisco networking enthusiast with years of experience in the industry. He is currently working as a consulting engineer for a Cisco partner. As a founder of and an instructor at labminutes.com, Metha enjoys learning and challenges himself with new technologies.