View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

Security

SEC0385 - Firepower 7.0 Malware Detection (Part 2)

The video demonstrates an ability to perform Malware file detection and blocking on Cisco Firepower 7.0. We will look at how an executable file is determined to contain malware. We will attempt to submit a file with unknown disposition for further cloud analysis, explain the meaning of threat score, and review file analysis report. We will introduce you to Clean and Detection list and how they can be used to overwrite the default malware detection behavior.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0385 - Firepower 7.0 Malware Detection (Part 1)

The video demonstrates an ability to perform Malware file detection and blocking on Cisco Firepower 7.0. We will look at how an executable file is determined to contain malware. We will attempt to submit a file with unknown disposition for further cloud analysis, explain the meaning of threat score, and review file analysis report. We will introduce you to Clean and Detection list and how they can be used to overwrite the default malware detection behavior.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0384 - Firepower 7.0 File Type Filtering (Part 2)

The video demonstrates the basic of file type filtering feature on Cisco Firepower 7.0. We will create Access Control rules that detect and block file transfer based on file type and category. We will be testing HTTP and FTP protocols. At the end of the lab, we will show an impact that HTTPS has on the system detection capability

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0384 - Firepower 7.0 File Type Filtering (Part 1)

The video demonstrates the basic of file type filtering feature on Cisco Firepower 7.0. We will create Access Control rules that detect and block file transfer based on file type and category. We will be testing HTTP and FTP protocols. At the end of the lab, we will show an impact that HTTPS has on the system detection capability

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0383 - Firepower 7.0 URL and Web Category Filtering (Part 3)

The video helps you unlock URL filtering feature on Cisco Firepower 7.0. We will add Access Control rules that permit, warn, and deny user traffic based on URL and web category matching. We will customize user HTTP response and finish off with a demonstration of DNS filtering enhancement.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0383 - Firepower 7.0 URL and Web Category Filtering (Part 2)

The video helps you unlock URL filtering feature on Cisco Firepower 7.0. We will add Access Control rules that permit, warn, and deny user traffic based on URL and web category matching. We will customize user HTTP response and finish off with a demonstration of DNS filtering enhancement.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0383 - Firepower 7.0 URL and Web Category Filtering (Part 1)

The video helps you unlock URL filtering feature on Cisco Firepower 7.0. We will add Access Control rules that permit, warn, and deny user traffic based on URL and web category matching. We will customize user HTTP response and finish off with a demonstration of DNS filtering enhancement.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0382 - Firepower 7.0 Intrusion Custom Rule (Part 2)

The video gets into a task of Snort Rule Customization on Cisco Firepower 7.0. We will create a custom Snort 2 rule by both copying an existing rule and creating a rule from scratch which we later convert into Snort 3 rules. The rules will be tested with a custom application traffic.

Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0382 - Firepower 7.0 Intrusion Custom Rule (Part 1)

The video gets into a task of Snort Rule Customization on Cisco Firepower 7.0. We will create a custom Snort 2 rule by both copying an existing rule and creating a rule from scratch which we later convert into Snort 3 rules. The rules will be tested with a custom application traffic.

Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0381 - Firepower 7.0 Intrusion Advanced (Part 2)

The video looks into additional capabilities available in Intrusion Policies on Cisco Firepower 7.0. We will demonstrate a use of Firepower recommendation that helps you customize intrusion policy to fit your organization traffic pattern. We will perform intrusion rule synchronization from Snort 2 to Snort 3. Metasploit with Kali Linux will be used to test our configuration.

Rating: 
0
No votes yet
Difficulty Level: 
3

Pages

Subscribe to RSS - Security