View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

threat

SEC0389 - Firepower 7.0 SGT (Part 2)

The video walks you through Security Group Tag (SGT) matching in Access Control Policy on Cisco Firepower 7.0. We will leverage an existing ISE integration and perform traffic matching using two methods: Source inline SGT, and Destination SXP mapping. This provides additional flexibility in building access control rule for an environment that has Cisco ISE.

Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0389 - Firepower 7.0 SGT (Part 1)

The video walks you through Security Group Tag (SGT) matching in Access Control Policy on Cisco Firepower 7.0. We will leverage an existing ISE integration and perform traffic matching using two methods: Source inline SGT, and Destination SXP mapping. This provides additional flexibility in building access control rule for an environment that has Cisco ISE.

Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0388 - Firepower 7.0 Threat Intelligence Director (Part 3)

The video looks at how Threat Intelligence Director (TID) can help enhance an ability to detect threats on Cisco Firepower 7.0. We will explain how TID operates and demonstrate its detection capabilities from three supported threat sources: Static File Upload, STIX File and TAXII.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0388 - Firepower 7.0 Threat Intelligence Director (Part 2)

The video looks at how Threat Intelligence Director (TID) can help enhance an ability to detect threats on Cisco Firepower 7.0. We will explain how TID operates and demonstrate its detection capabilities from three supported threat sources: Static File Upload, STIX File and TAXII.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0388 - Firepower 7.0 Threat Intelligence Director (Part 1)

The video looks at how Threat Intelligence Director (TID) can help enhance an ability to detect threats on Cisco Firepower 7.0. We will explain how TID operates and demonstrate its detection capabilities from three supported threat sources: Static File Upload, STIX File and TAXII.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0380 - Firepower 7.0 Intrusion Basic (Part 4)

The video introduces you to basic concepts of Intrusion policy on Cisco Firepower 7.0. We will go through necessary configuration to enable IDS/IPS features using Snort 2 and Snort 3. We will perform intrusion testing using ICMP traffic and demonstrate fine-tuning options on an intrusion rule.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0380 - Firepower 7.0 Intrusion Basic (Part 3)

The video introduces you to basic concepts of Intrusion policy on Cisco Firepower 7.0. We will go through necessary configuration to enable IDS/IPS features using Snort 2 and Snort 3. We will perform intrusion testing using ICMP traffic and demonstrate fine-tuning options on an intrusion rule.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0380 - Firepower 7.0 Intrusion Basic (Part 2)

The video introduces you to basic concepts of Intrusion policy on Cisco Firepower 7.0. We will go through necessary configuration to enable IDS/IPS features using Snort 2 and Snort 3. We will perform intrusion testing using ICMP traffic and demonstrate fine-tuning options on an intrusion rule.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0380 - Firepower 7.0 Intrusion Basic (Part 1)

The video introduces you to basic concepts of Intrusion policy on Cisco Firepower 7.0. We will go through necessary configuration to enable IDS/IPS features using Snort 2 and Snort 3. We will perform intrusion testing using ICMP traffic and demonstrate fine-tuning options on an intrusion rule.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0312 - PAN 9.0 Threat Prevention (Part 2)

The video walks you through Threat Prevention feature on Palo Alto firewall. We will look at three key components of Threat Prevention; AntiVirus profile, AntiSpyware profile, and Vulnerability Protection profile. We will leverage Security Profile Group to apply profiles to security rules and demonstrate the effectiveness of the profiles using various methods and tools.

Rating: 
0
No votes yet
Difficulty Level: 
3

Pages

Subscribe to RSS - threat

Poll

Vote for the Next Video Series