View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

nmap

SEC0331 - ISE 3.0 Device Profiling and MAB (Part 5)

The video introduces you to the concept of device profiling and profiling policy on Cisco ISE 3.0. We will explain different type of probes, and how endpoints get classified, build a policy set, allow endpoint to authenticate using MAC Authentication Bypass (MAB), and enforce Downloadable ACL (DACL). You will learn about Logical Device profile and basic policy structure.

Rating: 
0
No votes yet
Difficulty Level: 
2

SEC0331 - ISE 3.0 Device Profiling and MAB (Part 4)

The video introduces you to the concept of device profiling and profiling policy on Cisco ISE 3.0. We will explain different type of probes, and how endpoints get classified, build a policy set, allow endpoint to authenticate using MAC Authentication Bypass (MAB), and enforce Downloadable ACL (DACL). You will learn about Logical Device profile and basic policy structure.

Rating: 
0
No votes yet
Difficulty Level: 
2

SEC0331 - ISE 3.0 Device Profiling and MAB (Part 3)

The video introduces you to the concept of device profiling and profiling policy on Cisco ISE 3.0. We will explain different type of probes, and how endpoints get classified, build a policy set, allow endpoint to authenticate using MAC Authentication Bypass (MAB), and enforce Downloadable ACL (DACL). You will learn about Logical Device profile and basic policy structure.

Rating: 
0
No votes yet
Difficulty Level: 
2

SEC0331 - ISE 3.0 Device Profiling and MAB (Part 2)

The video introduces you to the concept of device profiling and profiling policy on Cisco ISE 3.0. We will explain different type of probes, and how endpoints get classified, build a policy set, allow endpoint to authenticate using MAC Authentication Bypass (MAB), and enforce Downloadable ACL (DACL). You will learn about Logical Device profile and basic policy structure.

Rating: 
0
No votes yet
Difficulty Level: 
2

SEC0331 - ISE 3.0 Device Profiling and MAB (Part 1)

The video introduces you to the concept of device profiling and profiling policy on Cisco ISE 3.0. We will explain different type of probes, and how endpoints get classified, build a policy set, allow endpoint to authenticate using MAC Authentication Bypass (MAB), and enforce Downloadable ACL (DACL). You will learn about Logical Device profile and basic policy structure.

Rating: 
0
No votes yet
Difficulty Level: 
2

SEC0288 - ISE 2.2 Anomalous Endpoint

The video shows how Cisco ISE 2.2 can detect anomalous endpoints and perform endpoint quarantine accordingly. We will go through different methods ISE uses to identify anomalous endpoints by having a Windows computer masquerading as a printer, and wireless device suddenly appear as wired device. 
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0271 - ISE 2.2 Device Profiling and Probing (Part 3)

The video introduces you to the concept of device profiling and probing on Cisco ISE 2.2. We will start by going through different type of probes, and how devices get profiled with Profiling policies. We will also cover the latest type of probe; AD probe, how to increase profiling accuracy and number of profiled devices with manual NMAP scan, and custom profiling policy creation.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0271 - ISE 2.2 Device Profiling and Probing (Part 2)

The video introduces you to the concept of device profiling and probing on Cisco ISE 2.2. We will start by going through different type of probes, and how devices get profiled with Profiling policies. We will also cover the latest type of probe; AD probe, how to increase profiling accuracy and number of profiled devices with manual NMAP scan, and custom profiling policy creation.
Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0178 - ASA FirePower Traffic Profile

The video demonstrates capability of Cisco ASA FirePower to detect anomalous traffic pattern. We will be configuring the FireSight System to monitor HTTP traffic to our servers, create traffic profile, and have it generate alert upon significant traffic pattern deviation. A HTTP packet generation tool will be used to generate HTTP requests at different rate to test our traffic profile.

Rating: 
5
Average: 5 (5 votes)
Difficulty Level: 
0

SEC0177 - ASA FirePower Event Correlation and Remediation (Part 2)

The video demonstrates Cisco ASA FirePower capability to correlate system events and generate appropriate remediation responses. We will go through two example scenarios; one with a basic event matching and responding, and the other continues to track the connection and apply a more complex conditions before issuing response. Specifically, we will configure NMAP scan and IP shun remediations. 

Rating: 
5
Average: 5 (3 votes)
Difficulty Level: 
0

Pages

Subscribe to RSS - nmap