View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

ips

SEC0382 - Firepower 7.0 Intrusion Custom Rule (Part 2)

The video gets into a task of Snort Rule Customization on Cisco Firepower 7.0. We will create a custom Snort 2 rule by both copying an existing rule and creating a rule from scratch which we later convert into Snort 3 rules. The rules will be tested with a custom application traffic.

Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0382 - Firepower 7.0 Intrusion Custom Rule (Part 1)

The video gets into a task of Snort Rule Customization on Cisco Firepower 7.0. We will create a custom Snort 2 rule by both copying an existing rule and creating a rule from scratch which we later convert into Snort 3 rules. The rules will be tested with a custom application traffic.

Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0381 - Firepower 7.0 Intrusion Advanced (Part 2)

The video looks into additional capabilities available in Intrusion Policies on Cisco Firepower 7.0. We will demonstrate a use of Firepower recommendation that helps you customize intrusion policy to fit your organization traffic pattern. We will perform intrusion rule synchronization from Snort 2 to Snort 3. Metasploit with Kali Linux will be used to test our configuration.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0381 - Firepower 7.0 Intrusion Advanced (Part 1)

The video looks into additional capabilities available in Intrusion Policies on Cisco Firepower 7.0. We will demonstrate a use of Firepower recommendation that helps you customize intrusion policy to fit your organization traffic pattern. We will perform intrusion rule synchronization from Snort 2 to Snort 3. Metasploit with Kali Linux will be used to test our configuration.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0380 - Firepower 7.0 Intrusion Basic (Part 4)

The video introduces you to basic concepts of Intrusion policy on Cisco Firepower 7.0. We will go through necessary configuration to enable IDS/IPS features using Snort 2 and Snort 3. We will perform intrusion testing using ICMP traffic and demonstrate fine-tuning options on an intrusion rule.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0380 - Firepower 7.0 Intrusion Basic (Part 3)

The video introduces you to basic concepts of Intrusion policy on Cisco Firepower 7.0. We will go through necessary configuration to enable IDS/IPS features using Snort 2 and Snort 3. We will perform intrusion testing using ICMP traffic and demonstrate fine-tuning options on an intrusion rule.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0380 - Firepower 7.0 Intrusion Basic (Part 2)

The video introduces you to basic concepts of Intrusion policy on Cisco Firepower 7.0. We will go through necessary configuration to enable IDS/IPS features using Snort 2 and Snort 3. We will perform intrusion testing using ICMP traffic and demonstrate fine-tuning options on an intrusion rule.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0380 - Firepower 7.0 Intrusion Basic (Part 1)

The video introduces you to basic concepts of Intrusion policy on Cisco Firepower 7.0. We will go through necessary configuration to enable IDS/IPS features using Snort 2 and Snort 3. We will perform intrusion testing using ICMP traffic and demonstrate fine-tuning options on an intrusion rule.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0359 - Firepower 6.7 Firewall Mode and Interface Type (Part 4)

The video walks you through different operational mode on Cisco Firepower 6.7. We will use physical and virtual (NGFWv) Firepower devices to demonstrate routed, passive, inline, transparent, and ERSPAN modes. We will focus on interface and zone configuration to get traffic to pass through the device. We will discuss when it is appropriate to use each firewall mode.

Rating: 
0
No votes yet
Difficulty Level: 
2

SEC0359 - Firepower 6.7 Firewall Mode and Interface Type (Part 3)

The video walks you through different operational mode on Cisco Firepower 6.7. We will use physical and virtual (NGFWv) Firepower devices to demonstrate routed, passive, inline, transparent, and ERSPAN modes. We will focus on interface and zone configuration to get traffic to pass through the device. We will discuss when it is appropriate to use each firewall mode.

Rating: 
0
No votes yet
Difficulty Level: 
2

Pages

Subscribe to RSS - ips

Poll

Vote for the Next Video Series