View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

Security

SEC0389 - Firepower 7.0 SGT (Part 2)

The video walks you through Security Group Tag (SGT) matching in Access Control Policy on Cisco Firepower 7.0. We will leverage an existing ISE integration and perform traffic matching using two methods: Source inline SGT, and Destination SXP mapping. This provides additional flexibility in building access control rule for an environment that has Cisco ISE.

Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0389 - Firepower 7.0 SGT (Part 1)

The video walks you through Security Group Tag (SGT) matching in Access Control Policy on Cisco Firepower 7.0. We will leverage an existing ISE integration and perform traffic matching using two methods: Source inline SGT, and Destination SXP mapping. This provides additional flexibility in building access control rule for an environment that has Cisco ISE.

Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0388 - Firepower 7.0 Threat Intelligence Director (Part 3)

The video looks at how Threat Intelligence Director (TID) can help enhance an ability to detect threats on Cisco Firepower 7.0. We will explain how TID operates and demonstrate its detection capabilities from three supported threat sources: Static File Upload, STIX File and TAXII.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0388 - Firepower 7.0 Threat Intelligence Director (Part 2)

The video looks at how Threat Intelligence Director (TID) can help enhance an ability to detect threats on Cisco Firepower 7.0. We will explain how TID operates and demonstrate its detection capabilities from three supported threat sources: Static File Upload, STIX File and TAXII.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0388 - Firepower 7.0 Threat Intelligence Director (Part 1)

The video looks at how Threat Intelligence Director (TID) can help enhance an ability to detect threats on Cisco Firepower 7.0. We will explain how TID operates and demonstrate its detection capabilities from three supported threat sources: Static File Upload, STIX File and TAXII.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0387 - Firepower 7.0 Certificate-Based Access Control and SafeSearch (Part 3)

The video looks at two additional capabilities of Access Control on Cisco Firepower 7.0 using SafeSearch and Certificate attributes. We will demonstrate the effective of inline SafeSearch on popular search engines. We will then spend more time on SSL policy and explore traffic blocking based on certificate attributes and validity. The lab ends with a final note on TLS 1.3.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0387 - Firepower 7.0 Certificate-Based Access Control and SafeSearch (Part 2)

The video looks at two additional capabilities of Access Control on Cisco Firepower 7.0 using SafeSearch and Certificate attributes. We will demonstrate the effective of inline SafeSearch on popular search engines. We will then spend more time on SSL policy and explore traffic blocking based on certificate attributes and validity. The lab ends with a final note on TLS 1.3.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0387 - Firepower 7.0 Certificate-Based Access Control and SafeSearch (Part 1)

The video looks at two additional capabilities of Access Control on Cisco Firepower 7.0 using SafeSearch and Certificate attributes. We will demonstrate the effective of inline SafeSearch on popular search engines. We will then spend more time on SSL policy and explore traffic blocking based on certificate attributes and validity. The lab ends with a final note on TLS 1.3.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0386 - Firepower 7.0 SSL Decryption (Part 3)

The video demonstrates an ability to perform Malware file detection and blocking on Cisco Firepower 7.0. We will look at how an executable file is determined to contain malware. We will attempt to submit a file with unknown disposition for further cloud analysis, explain the meaning of threat score, and review file analysis report. We will introduce you to Clean and Detection list and how they can be used to overwrite the default malware detection behavior.

Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0386 - Firepower 7.0 SSL Decryption (Part 2)

The video demonstrates an ability to perform Malware file detection and blocking on Cisco Firepower 7.0. We will look at how an executable file is determined to contain malware. We will attempt to submit a file with unknown disposition for further cloud analysis, explain the meaning of threat score, and review file analysis report. We will introduce you to Clean and Detection list and how they can be used to overwrite the default malware detection behavior.

Rating: 
0
No votes yet
Difficulty Level: 
4

Pages

Subscribe to RSS - Security

Poll

Vote for the Next Video Series