View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

threat score

SEC0385 - Firepower 7.0 Malware Detection (Part 2)

The video demonstrates an ability to perform Malware file detection and blocking on Cisco Firepower 7.0. We will look at how an executable file is determined to contain malware. We will attempt to submit a file with unknown disposition for further cloud analysis, explain the meaning of threat score, and review file analysis report. We will introduce you to Clean and Detection list and how they can be used to overwrite the default malware detection behavior.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0385 - Firepower 7.0 Malware Detection (Part 1)

The video demonstrates an ability to perform Malware file detection and blocking on Cisco Firepower 7.0. We will look at how an executable file is determined to contain malware. We will attempt to submit a file with unknown disposition for further cloud analysis, explain the meaning of threat score, and review file analysis report. We will introduce you to Clean and Detection list and how they can be used to overwrite the default malware detection behavior.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0172 - ASA FirePower Malware Detection (Part 2)

The video demonstrates Cisco ASA FirePower ability to perform Malware file detection and blocking. We will look at how a file is determined to contain malware, specifically executable files. We will attempt to submit a file with unknown disposition for further cloud analysis, explain the meaning of threat score, and review file analysis report. Finally, we will introduce you to Clean and Detection list and how they can be used to overwrite the default malware detection behavior. 

Rating: 
5
Average: 5 (5 votes)
Difficulty Level: 
0

SEC0172 - ASA FirePower Malware Detection (Part 1)

The video demonstrates Cisco ASA FirePower ability to perform Malware file detection and blocking. We will look at how a file is determined to contain malware, specifically executable files. We will attempt to submit a file with unknown disposition for further cloud analysis, explain the meaning of threat score, and review file analysis report. Finally, we will introduce you to Clean and Detection list and how they can be used to overwrite the default malware detection behavior. 

Rating: 
5
Average: 5 (4 votes)
Difficulty Level: 
0
Subscribe to RSS - threat score

Poll

Vote for the Next Video Series