View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

Security

SEC0173 - ASA FirePower IPS Basic (Part 1)

The video walks you through basic configuration of Intrusion Policy on Cisco ASA FirePower. We begin by explaining significance of the use of Variable Set, the concept of Base Policy, and various settings in an Intrusion Rule. We will adjust some of an Intrusion Rule settings including, Threshold, Suppression, and Dynamic State, and observe how they effect the rule behavior using ICMP Reply Undefined Code rule as our example.

Rating: 
5
Average: 5 (3 votes)
Difficulty Level: 
0

SEC0185 - ISE 1.3 Wired 802.1X with EAP-TLS and PEAP (Part 2)

The video walks you through configuration of wired 802.1X using EAP-TLS and PEAP on Cisco ISE 1.3. By leveraging AD integration from the previous video, we will configure authentication and authorization policies to support both user and machine authentications and enforce Machine Access Restriction (MAR). Here we assume user and machine certificate are already installed. We will perform testing on both domain, and non-domain computers and observe authentication results.

Rating: 
0
No votes yet
Difficulty Level: 
2

SEC0185 - ISE 1.3 Wired 802.1X with EAP-TLS and PEAP (Part 1)

The video walks you through configuration of wired 802.1X using EAP-TLS and PEAP on Cisco ISE 1.3. By leveraging AD integration from the previous video, we will configure authentication and authorization policies to support both user and machine authentications and enforce Machine Access Restriction (MAR). Here we assume user and machine certificate are already installed. We will perform testing on both domain, and non-domain computers and observe authentication results.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0184 - ISE 1.3 Multi-Domain AD Integration (Part 2)

The video demonstrates Cisco ISE 1.3 capability to integrate with multiple Active Directory forest/domains. We will be joining our ISE deployment to three domains: two participate in two-way trust, and one being untrusted, and try to understand how a user is searched through different domains, and how search scope can be limited. We will also look at feature enhancements such as identity rewrite, user test authentication, diagnostic tool, and scope mode. At the end, we will see how an AD join point appear under Identity Source Sequence.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0184 - ISE 1.3 Multi-Domain AD Integration (Part 1)

The video demonstrates Cisco ISE 1.3 capability to integrate with multiple Active Directory forest/domains. We will be joining our ISE deployment to three domains: two participate in two-way trust, and one being untrusted, and try to understand how a user is searched through different domains, and how search scope can be limited. We will also look at feature enhancements such as identity rewrite, user test authentication, diagnostic tool, and scope mode. At the end, we will see how an AD join point appear under Identity Source Sequence.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0183 - ISE 1.3 Certificate and Node Registration (Part 2)

The video demonstrates wildcard certificate generation on the new Cisco ISE 1.3 web interface and builds a two-node distributed deployment. We will go through CSR generation on ISE, have it signed by Windows 2008 CA, and use it to register a secondary node to a primary. The concept of Certificate Usage and Group Tag will be introduced as well ass an ability to centrally manage node certificates. 

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0183 - ISE 1.3 Certificate and Node Registration (Part 1)

The video demonstrates wildcard certificate generation on the new Cisco ISE 1.3 web interface and builds a two-node distributed deployment. We will go through CSR generation on ISE, have it signed by Windows 2008 CA, and use it to register a secondary node to a primary. The concept of Certificate Usage and Group Tag will be introduced as well ass an ability to centrally manage node certificates. 

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0172 - ASA FirePower Malware Detection (Part 2)

The video demonstrates Cisco ASA FirePower ability to perform Malware file detection and blocking. We will look at how a file is determined to contain malware, specifically executable files. We will attempt to submit a file with unknown disposition for further cloud analysis, explain the meaning of threat score, and review file analysis report. Finally, we will introduce you to Clean and Detection list and how they can be used to overwrite the default malware detection behavior. 

Rating: 
5
Average: 5 (5 votes)
Difficulty Level: 
0

SEC0172 - ASA FirePower Malware Detection (Part 1)

The video demonstrates Cisco ASA FirePower ability to perform Malware file detection and blocking. We will look at how a file is determined to contain malware, specifically executable files. We will attempt to submit a file with unknown disposition for further cloud analysis, explain the meaning of threat score, and review file analysis report. Finally, we will introduce you to Clean and Detection list and how they can be used to overwrite the default malware detection behavior. 

Rating: 
5
Average: 5 (4 votes)
Difficulty Level: 
0

SEC0171 - ASA FirePower File Type Filtering (Part 2)

The video introduces you to file policy used to perform file type filtering, and detection on Cisco ASA FirePower. Our lab scenarios include blocking and detecting file upload and download through Sharepoint web application and FTP protocol, as well as the ability to capture files. A caveat of having a file transfer in a HTTPS session is also demonstrated.

Rating: 
5
Average: 5 (5 votes)
Difficulty Level: 
0

Pages

Subscribe to RSS - Security

Poll

Vote for the Next Video Series