View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

Security

SEC0188 - ISE 1.3 BYOD Wired 802.1X Onboarding (Internal CA) (Part 1)

The video demonstrates wired device onboarding with Cisco ISE 1.3 Internal CA. With the internal CA configured in the previous video, we continues to complete the remaining configuration to provide wired BYOD solution including; login web portal, required authentication, authorization, and client provisioning policies, blacklist and MyDevices portals. We will step through the entire onboarding process and test device management via MyDevices portal on a non-domain Windows computer. We will also touch on the concept of device purging towards the end of the video.

Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0187 - ISE 1.3 Internal Certificate Authority (CA) Setup (Part 2)

The video discusses and demonstrates different deployment models of Cisco ISE 1.3 Internal Certificate Authority. We will be setting up ISE internal CA, both as a standalone and intermediate CA, and creating certificate template to issue client certificate for our next BYOD labs. We will also touch on the significance of, and demonstrate certificate keypair export and import to other ISE nodes in the deployment.

Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0187 - ISE 1.3 Internal Certificate Authority (CA) Setup (Part 1)

The video discusses and demonstrates different deployment models of Cisco ISE 1.3 Internal Certificate Authority. We will be setting up ISE internal CA, both as a standalone and intermediate CA, and creating certificate template to issue client certificate for our next BYOD labs. We will also touch on the significance of, and demonstrate certificate keypair export and import to other ISE nodes in the deployment.

Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0186 - ISE 1.3 Wireless 802.1X with EAP-TLS and PEAP (Part 2)

The video walks you through configuration of wireless 802.1X using EAP-TLS and PEAP on Cisco ISE 1.3. By leveraging AD integration from the previous video, we will configure authentication and authorization policies to support both user and machine authentications and enforce Machine Access Restriction (MAR). Here we assume user and machine certificate are already installed. We will perform testing on both domain computer, and iPad, and observe authentication results.

Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0186 - ISE 1.3 Wireless 802.1X with EAP-TLS and PEAP (Part 1)

The video walks you through configuration of wireless 802.1X using EAP-TLS and PEAP on Cisco ISE 1.3. By leveraging AD integration from the previous video, we will configure authentication and authorization policies to support both user and machine authentications and enforce Machine Access Restriction (MAR). Here we assume user and machine certificate are already installed. We will perform testing on both domain computer, and iPad, and observe authentication results.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0176 - ASA FirePower Compliance Enforcement with Whitelist

The video demonstrates the use of Whitelist feature on Cisco ASA FirePower to enforce application compliancy on end-host. We will look at two ways of creating a host profile; manual and from host discovery, and apply them to a network to have the FireSight System monitor and generate alert when any unapproved network protocols or application services are detected.

Rating: 
5
Average: 5 (2 votes)
Difficulty Level: 
0

SEC0175 - ASA FirePower IPS Custom Rule

The video shows you how to create a custom intrusion rule on Cisco ASA FirePower. We will generate a special HTTP request to simulate malicious traffic and build an intrusion rule to match the content of the request and drop it. You will learn available parameters that you can use on FireSight web interface Rule Editor to define attack signature.

Rating: 
4.666665
Average: 4.7 (3 votes)
Difficulty Level: 
0

SEC0174 - ASA FirePower IPS Advance (Part 2)

The video takes you deeper into Intrusion Policy configuration on Cisco ASA FirePower as we use Policy Layer and FireSight Recommendation. Policy Layer provides configuration flexibility, while FireSight Recommendation assist you in determining appropriate intrusion rules to enable or disable. We will also test our configuration by simulating attacks using Metasploit vulnerability testing tool. The video will close by showing you how to setup intrusion event alert and manage intrusion incidents.

Rating: 
5
Average: 5 (4 votes)
Difficulty Level: 
0

SEC0174 - ASA FirePower IPS Advance (Part 1)

The video takes you deeper into Intrusion Policy configuration on Cisco ASA FirePower as we use Policy Layer and FireSight Recommendation. Policy Layer provides configuration flexibility, while FireSight Recommendation assist you in determining appropriate intrusion rules to enable or disable. We will also test our configuration by simulating attacks using Metasploit vulnerability testing tool. The video will close by showing you how to setup intrusion event alert and manage intrusion incidents.

Rating: 
5
Average: 5 (4 votes)
Difficulty Level: 
0

SEC0173 - ASA FirePower IPS Basic (Part 2)

The video walks you through basic configuration of Intrusion Policy on Cisco ASA FirePower. We begin by explaining significance of the use of Variable Set, the concept of Base Policy, and various settings in an Intrusion Rule. We will adjust some of an Intrusion Rule settings including, Threshold, Suppression, and Dynamic State, and observe how they effect the rule behavior using ICMP Reply Undefined Code rule as our example.

Rating: 
5
Average: 5 (3 votes)
Difficulty Level: 
0

Pages

Subscribe to RSS - Security

Poll

Vote for the Next Video Series