Deploying Cisco ASA Firewall Solutions v1.0
Standard Price: $ 3395.00
Course Length: 5 days
Cisco Unified Intelligence Center 8.0.4 is a comprehensive, end-to-end reporting solution, designed to simplify the task of creating and modifying reports. It also can manage disparate data sources and, at the same time, to present a consistent user interface and a common tool to access varied data across multiple Cisco product families.
To participate in the hands-on labs in this class, you need to bring a laptop computer with the following:
This course is part of the curriculum path leading to the Cisco Certified Network Professional Security (CCNP Security) certification. Additionally, it is designed to prepare security engineers with the knowledge and hands-on experience to prepare them to configure Cisco perimeter edge security solutions utilizing Cisco switches, Cisco routers, and Cisco Adaptive Security Appliance (ASA) firewalls. You will acquire the foundational knowledge and capabilities to implement and manage security on Cisco ASA firewalls, Cisco routers with the firewall feature set, and Cisco switches. You will gain hands-on experience with configuring various perimeter security solutions for mitigating outside threats and securing network zones. At the end of the course, you will be able to reduce the risk to your IT infrastructures and applications using Cisco switches, Cisco ASA, and router security appliance feature, as well as provide detailed operations support for these products.
In this comprehensive two-day course containing hands-on labs, demos, and presentations, you will learn to install, configure, operate, and maintain the S-Series web security appliances. You will focus on HTTP and HTTPS proxy services, L4 traffic monitoring, authentication and web access control, URL filtering, anti-malware filtering, troubleshooting S-Series configuration issues, and S-Series deployment. You will also see how the WSA is used in a SAAS scenario (Security-As-A-Service) and how Cisco WSA can inspect HTTPS traffic. Hands-on labs provide you with a safe environment to experiment with malware and attempt configurations that might not be appropriate for a production network.