View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

firepower

SEC0387 - Firepower 7.0 Certificate-Based Access Control and SafeSearch (Part 3)

The video looks at two additional capabilities of Access Control on Cisco Firepower 7.0 using SafeSearch and Certificate attributes. We will demonstrate the effective of inline SafeSearch on popular search engines. We will then spend more time on SSL policy and explore traffic blocking based on certificate attributes and validity. The lab ends with a final note on TLS 1.3.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0387 - Firepower 7.0 Certificate-Based Access Control and SafeSearch (Part 2)

The video looks at two additional capabilities of Access Control on Cisco Firepower 7.0 using SafeSearch and Certificate attributes. We will demonstrate the effective of inline SafeSearch on popular search engines. We will then spend more time on SSL policy and explore traffic blocking based on certificate attributes and validity. The lab ends with a final note on TLS 1.3.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0387 - Firepower 7.0 Certificate-Based Access Control and SafeSearch (Part 1)

The video looks at two additional capabilities of Access Control on Cisco Firepower 7.0 using SafeSearch and Certificate attributes. We will demonstrate the effective of inline SafeSearch on popular search engines. We will then spend more time on SSL policy and explore traffic blocking based on certificate attributes and validity. The lab ends with a final note on TLS 1.3.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0386 - Firepower 7.0 SSL Decryption (Part 3)

The video demonstrates an ability to perform Malware file detection and blocking on Cisco Firepower 7.0. We will look at how an executable file is determined to contain malware. We will attempt to submit a file with unknown disposition for further cloud analysis, explain the meaning of threat score, and review file analysis report. We will introduce you to Clean and Detection list and how they can be used to overwrite the default malware detection behavior.

Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0386 - Firepower 7.0 SSL Decryption (Part 2)

The video demonstrates an ability to perform Malware file detection and blocking on Cisco Firepower 7.0. We will look at how an executable file is determined to contain malware. We will attempt to submit a file with unknown disposition for further cloud analysis, explain the meaning of threat score, and review file analysis report. We will introduce you to Clean and Detection list and how they can be used to overwrite the default malware detection behavior.

Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0386 - Firepower 7.0 SSL Decryption (Part 1)

The video demonstrates an ability to perform Malware file detection and blocking on Cisco Firepower 7.0. We will look at how an executable file is determined to contain malware. We will attempt to submit a file with unknown disposition for further cloud analysis, explain the meaning of threat score, and review file analysis report. We will introduce you to Clean and Detection list and how they can be used to overwrite the default malware detection behavior.

Rating: 
0
No votes yet
Difficulty Level: 
4

SEC0385 - Firepower 7.0 Malware Detection (Part 2)

The video demonstrates an ability to perform Malware file detection and blocking on Cisco Firepower 7.0. We will look at how an executable file is determined to contain malware. We will attempt to submit a file with unknown disposition for further cloud analysis, explain the meaning of threat score, and review file analysis report. We will introduce you to Clean and Detection list and how they can be used to overwrite the default malware detection behavior.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0385 - Firepower 7.0 Malware Detection (Part 1)

The video demonstrates an ability to perform Malware file detection and blocking on Cisco Firepower 7.0. We will look at how an executable file is determined to contain malware. We will attempt to submit a file with unknown disposition for further cloud analysis, explain the meaning of threat score, and review file analysis report. We will introduce you to Clean and Detection list and how they can be used to overwrite the default malware detection behavior.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0384 - Firepower 7.0 File Type Filtering (Part 2)

The video demonstrates the basic of file type filtering feature on Cisco Firepower 7.0. We will create Access Control rules that detect and block file transfer based on file type and category. We will be testing HTTP and FTP protocols. At the end of the lab, we will show an impact that HTTPS has on the system detection capability

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0384 - Firepower 7.0 File Type Filtering (Part 1)

The video demonstrates the basic of file type filtering feature on Cisco Firepower 7.0. We will create Access Control rules that detect and block file transfer based on file type and category. We will be testing HTTP and FTP protocols. At the end of the lab, we will show an impact that HTTPS has on the system detection capability

Rating: 
0
No votes yet
Difficulty Level: 
3

Pages

Subscribe to RSS - firepower

Poll

Vote for the Next Video Series