View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

metasploit

SEC0381 - Firepower 7.0 Intrusion Advanced (Part 2)

The video looks into additional capabilities available in Intrusion Policies on Cisco Firepower 7.0. We will demonstrate a use of Firepower recommendation that helps you customize intrusion policy to fit your organization traffic pattern. We will perform intrusion rule synchronization from Snort 2 to Snort 3. Metasploit with Kali Linux will be used to test our configuration.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0381 - Firepower 7.0 Intrusion Advanced (Part 1)

The video looks into additional capabilities available in Intrusion Policies on Cisco Firepower 7.0. We will demonstrate a use of Firepower recommendation that helps you customize intrusion policy to fit your organization traffic pattern. We will perform intrusion rule synchronization from Snort 2 to Snort 3. Metasploit with Kali Linux will be used to test our configuration.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0174 - ASA FirePower IPS Advance (Part 2)

The video takes you deeper into Intrusion Policy configuration on Cisco ASA FirePower as we use Policy Layer and FireSight Recommendation. Policy Layer provides configuration flexibility, while FireSight Recommendation assist you in determining appropriate intrusion rules to enable or disable. We will also test our configuration by simulating attacks using Metasploit vulnerability testing tool. The video will close by showing you how to setup intrusion event alert and manage intrusion incidents.

Rating: 
5
Average: 5 (4 votes)
Difficulty Level: 
0

SEC0174 - ASA FirePower IPS Advance (Part 1)

The video takes you deeper into Intrusion Policy configuration on Cisco ASA FirePower as we use Policy Layer and FireSight Recommendation. Policy Layer provides configuration flexibility, while FireSight Recommendation assist you in determining appropriate intrusion rules to enable or disable. We will also test our configuration by simulating attacks using Metasploit vulnerability testing tool. The video will close by showing you how to setup intrusion event alert and manage intrusion incidents.

Rating: 
5
Average: 5 (4 votes)
Difficulty Level: 
0
Subscribe to RSS - metasploit

Poll

Vote for the Next Video Series