View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

sig

RS0242 - SD-WAN 20.9 Umbrella (DNS and SIG) (Part 3)

The video shows you two ways to provide security to internet-bound traffic by integrating Cisco Catalyst SD-WAN with Cisco Umbrella using DNS Security and Secure Internet Gateway (SIG). DNS Security is mainly used to intercept request to malicious domain. SIG, on the other hand, can perform traffic inspection to non-dns application. You will see how SIG Tunnel Template can help automate tunnel creation. 

Rating: 
0
No votes yet
Difficulty Level: 
4

RS0242 - SD-WAN 20.9 Umbrella (DNS and SIG) (Part 2)

The video shows you two ways to provide security to internet-bound traffic by integrating Cisco Catalyst SD-WAN with Cisco Umbrella using DNS Security and Secure Internet Gateway (SIG). DNS Security is mainly used to intercept request to malicious domain. SIG, on the other hand, can perform traffic inspection to non-dns application. You will see how SIG Tunnel Template can help automate tunnel creation. 

Rating: 
0
No votes yet
Difficulty Level: 
4

RS0242 - SD-WAN 20.9 Umbrella (DNS and SIG) (Part 1)

The video shows you two ways to provide security to internet-bound traffic by integrating Cisco Catalyst SD-WAN with Cisco Umbrella using DNS Security and Secure Internet Gateway (SIG). DNS Security is mainly used to intercept request to malicious domain. SIG, on the other hand, can perform traffic inspection to non-dns application. You will see how SIG Tunnel Template can help automate tunnel creation. 

Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0461 - Umbrella Administration (Part 2)

The video walks you through a process of creating additional administrative users on Cisco Umbrella. We will go through default admin user roles and create custom roles. We will look at adding MFA to enhance login security using Duo Mobile.

Rating: 
0
No votes yet
Difficulty Level: 
1

SEC0461 - Umbrella Administration (Part 1)

The video walks you through a process of creating additional administrative users on Cisco Umbrella. We will go through default admin user roles and create custom roles. We will look at adding MFA to enhance login security using Duo Mobile.

Rating: 
0
No votes yet
Difficulty Level: 
1

SEC0460 - Umbrella SecureX Integration (Part 2)

The video walks you through an integration of Cisco Umbrella with SecureX. We will look at how SecureX platform can be used to centrally streamline threat management and response. We will provide a simple demonstration on an investigation of an malware event from Umbrella and initiate a domain block action from SecureX.

Rating: 
0
No votes yet
Difficulty Level: 
2

SEC0460 - Umbrella SecureX Integration (Part 1)

The video walks you through an integration of Cisco Umbrella with SecureX. We will look at how SecureX platform can be used to centrally streamline threat management and response. We will provide a simple demonstration on an investigation of an malware event from Umbrella and initiate a domain block action from SecureX.

Rating: 
0
No votes yet
Difficulty Level: 
2

SEC0459 - Umbrella CASB (Part 3)

The video looks into CASB capability of Cisco Umbrella. We starts by going through a list of discovered application and try to understand how they are categorized and what actions are available. We will attempt to control test applications using DNS, protocol, and advanced control function. We will briefly touch upon malware scan feature at the end of the lab.   
 

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0459 - Umbrella CASB (Part 2)

The video looks into CASB capability of Cisco Umbrella. We starts by going through a list of discovered application and try to understand how they are categorized and what actions are available. We will attempt to control test applications using DNS, protocol, and advanced control function. We will briefly touch upon malware scan feature at the end of the lab.   
 

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0459 - Umbrella CASB (Part 1)

The video looks into CASB capability of Cisco Umbrella. We starts by going through a list of discovered application and try to understand how they are categorized and what actions are available. We will attempt to control test applications using DNS, protocol, and advanced control function. We will briefly touch upon malware scan feature at the end of the lab.   
 

Rating: 
0
No votes yet
Difficulty Level: 
3

Pages

Subscribe to RSS - sig