View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

Security

SEC0383 - Firepower 7.0 URL and Web Category Filtering (Part 3)

The video helps you unlock URL filtering feature on Cisco Firepower 7.0. We will add Access Control rules that permit, warn, and deny user traffic based on URL and web category matching. We will customize user HTTP response and finish off with a demonstration of DNS filtering enhancement.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0383 - Firepower 7.0 URL and Web Category Filtering (Part 2)

The video helps you unlock URL filtering feature on Cisco Firepower 7.0. We will add Access Control rules that permit, warn, and deny user traffic based on URL and web category matching. We will customize user HTTP response and finish off with a demonstration of DNS filtering enhancement.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0383 - Firepower 7.0 URL and Web Category Filtering (Part 1)

The video helps you unlock URL filtering feature on Cisco Firepower 7.0. We will add Access Control rules that permit, warn, and deny user traffic based on URL and web category matching. We will customize user HTTP response and finish off with a demonstration of DNS filtering enhancement.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0382 - Firepower 7.0 Intrusion Custom Rule (Part 2)

The video gets into a task of Snort Rule Customization on Cisco Firepower 7.0. We will create a custom Snort 2 rule by both copying an existing rule and creating a rule from scratch which we later convert into Snort 3 rules. The rules will be tested with a custom application traffic.

Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0382 - Firepower 7.0 Intrusion Custom Rule (Part 1)

The video gets into a task of Snort Rule Customization on Cisco Firepower 7.0. We will create a custom Snort 2 rule by both copying an existing rule and creating a rule from scratch which we later convert into Snort 3 rules. The rules will be tested with a custom application traffic.

Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0381 - Firepower 7.0 Intrusion Advanced (Part 2)

The video looks into additional capabilities available in Intrusion Policies on Cisco Firepower 7.0. We will demonstrate a use of Firepower recommendation that helps you customize intrusion policy to fit your organization traffic pattern. We will perform intrusion rule synchronization from Snort 2 to Snort 3. Metasploit with Kali Linux will be used to test our configuration.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0381 - Firepower 7.0 Intrusion Advanced (Part 1)

The video looks into additional capabilities available in Intrusion Policies on Cisco Firepower 7.0. We will demonstrate a use of Firepower recommendation that helps you customize intrusion policy to fit your organization traffic pattern. We will perform intrusion rule synchronization from Snort 2 to Snort 3. Metasploit with Kali Linux will be used to test our configuration.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0380 - Firepower 7.0 Intrusion Basic (Part 4)

The video introduces you to basic concepts of Intrusion policy on Cisco Firepower 7.0. We will go through necessary configuration to enable IDS/IPS features using Snort 2 and Snort 3. We will perform intrusion testing using ICMP traffic and demonstrate fine-tuning options on an intrusion rule.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0380 - Firepower 7.0 Intrusion Basic (Part 3)

The video introduces you to basic concepts of Intrusion policy on Cisco Firepower 7.0. We will go through necessary configuration to enable IDS/IPS features using Snort 2 and Snort 3. We will perform intrusion testing using ICMP traffic and demonstrate fine-tuning options on an intrusion rule.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0380 - Firepower 7.0 Intrusion Basic (Part 2)

The video introduces you to basic concepts of Intrusion policy on Cisco Firepower 7.0. We will go through necessary configuration to enable IDS/IPS features using Snort 2 and Snort 3. We will perform intrusion testing using ICMP traffic and demonstrate fine-tuning options on an intrusion rule.

Rating: 
0
No votes yet
Difficulty Level: 
3

Pages

Subscribe to RSS - Security

Poll

Vote for the Next Video Series