View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

intrusion

SEC0380 - Firepower 7.0 Intrusion Basic (Part 4)

The video introduces you to basic concepts of Intrusion policy on Cisco Firepower 7.0. We will go through necessary configuration to enable IDS/IPS features using Snort 2 and Snort 3. We will perform intrusion testing using ICMP traffic and demonstrate fine-tuning options on an intrusion rule.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0380 - Firepower 7.0 Intrusion Basic (Part 3)

The video introduces you to basic concepts of Intrusion policy on Cisco Firepower 7.0. We will go through necessary configuration to enable IDS/IPS features using Snort 2 and Snort 3. We will perform intrusion testing using ICMP traffic and demonstrate fine-tuning options on an intrusion rule.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0380 - Firepower 7.0 Intrusion Basic (Part 2)

The video introduces you to basic concepts of Intrusion policy on Cisco Firepower 7.0. We will go through necessary configuration to enable IDS/IPS features using Snort 2 and Snort 3. We will perform intrusion testing using ICMP traffic and demonstrate fine-tuning options on an intrusion rule.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0380 - Firepower 7.0 Intrusion Basic (Part 1)

The video introduces you to basic concepts of Intrusion policy on Cisco Firepower 7.0. We will go through necessary configuration to enable IDS/IPS features using Snort 2 and Snort 3. We will perform intrusion testing using ICMP traffic and demonstrate fine-tuning options on an intrusion rule.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0175 - ASA FirePower IPS Custom Rule

The video shows you how to create a custom intrusion rule on Cisco ASA FirePower. We will generate a special HTTP request to simulate malicious traffic and build an intrusion rule to match the content of the request and drop it. You will learn available parameters that you can use on FireSight web interface Rule Editor to define attack signature.

Rating: 
4.666665
Average: 4.7 (3 votes)
Difficulty Level: 
0

SEC0174 - ASA FirePower IPS Advance (Part 2)

The video takes you deeper into Intrusion Policy configuration on Cisco ASA FirePower as we use Policy Layer and FireSight Recommendation. Policy Layer provides configuration flexibility, while FireSight Recommendation assist you in determining appropriate intrusion rules to enable or disable. We will also test our configuration by simulating attacks using Metasploit vulnerability testing tool. The video will close by showing you how to setup intrusion event alert and manage intrusion incidents.

Rating: 
5
Average: 5 (4 votes)
Difficulty Level: 
0

SEC0174 - ASA FirePower IPS Advance (Part 1)

The video takes you deeper into Intrusion Policy configuration on Cisco ASA FirePower as we use Policy Layer and FireSight Recommendation. Policy Layer provides configuration flexibility, while FireSight Recommendation assist you in determining appropriate intrusion rules to enable or disable. We will also test our configuration by simulating attacks using Metasploit vulnerability testing tool. The video will close by showing you how to setup intrusion event alert and manage intrusion incidents.

Rating: 
5
Average: 5 (4 votes)
Difficulty Level: 
0

SEC0173 - ASA FirePower IPS Basic (Part 2)

The video walks you through basic configuration of Intrusion Policy on Cisco ASA FirePower. We begin by explaining significance of the use of Variable Set, the concept of Base Policy, and various settings in an Intrusion Rule. We will adjust some of an Intrusion Rule settings including, Threshold, Suppression, and Dynamic State, and observe how they effect the rule behavior using ICMP Reply Undefined Code rule as our example.

Rating: 
5
Average: 5 (3 votes)
Difficulty Level: 
0

SEC0173 - ASA FirePower IPS Basic (Part 1)

The video walks you through basic configuration of Intrusion Policy on Cisco ASA FirePower. We begin by explaining significance of the use of Variable Set, the concept of Base Policy, and various settings in an Intrusion Rule. We will adjust some of an Intrusion Rule settings including, Threshold, Suppression, and Dynamic State, and observe how they effect the rule behavior using ICMP Reply Undefined Code rule as our example.

Rating: 
5
Average: 5 (3 votes)
Difficulty Level: 
0
Subscribe to RSS - intrusion

Poll

Vote for the Next Video Series