Course Name |
Hours |
List Price |
Content |
Implementing and Operating Cisco Security Core Technologies (SCOR) |
35.00 |
$4,295.00 |
|
Description: In this course, Implementing and Operating Cisco Security Core Technologies (SCOR), students will master the skills and technologies needed to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. Students will learn security for networks, cloud and content, endpoint protection, secure network access, visibility and enforcements. They will get extensive hands-on experience deploying Cisco Firepower Next-Generation Firewall and Cisco ASA Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. Students will also get introductory practice on Cisco Stealthwatch Enterprise and Cisco Stealthwatch Cloud threat detection features.
# of Days:
Setting:
|
Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR) |
35.00 |
$4,500.00 |
|
Description: Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR 350-501) is a 5-day course which teaches you how to configure, verify, troubleshoot, and optimize next-generation, Service Provider IP network infrastructures. It provides a deep dive into Service Provider technologies including core architecture, services, networking, automation, quality of services, security, and network assurance.
# of Days:
Setting:
|
Implementing Automation for Cisco Collaboration Solutions (CLAUI) |
21.00 |
$3,000.00 |
|
Description: In this course you will cover how to implement Cisco Collaboration automated, programmable solutions for voice, video, collaboration, and conferencing on-premises or in the cloud. Through a combination of lessons and hands-on labs, you will combine tools and processes to tackle communication challenges using key platforms including Cisco Unified Communications Manager, Cisco IP Phone Services, Cisco Unity Connection, Cisco Finesse, Cisco Collaboration Endpoints, Cisco Webex Teams, and Cisco Webex Meetings. You will also learn how to use Application Programming Interfaces (APIs) interfaces such as Representational State Transfer (REST) and Simple Object Access Protocol (SOAP), parsing data in Extensible Markup Language (XML) and JavaScript Object Notation (JSON) formats, and leverage frameworks such as Python.
This course prepares you for the 300-835 Automating and Programming Cisco Collaboration Solutions (CLAUTO) certification exam.
# of Days:
Setting:
|
Securing the Web with Cisco Web Security Appliance (SWSA) |
14.00 |
$2,195.00 |
|
Description: Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 is a 2-day course which shows you how to implement, use, and maintain Cisco Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, youll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solutions anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more.
# of Days:
Setting:
|
IPS: Implementing Cisco Intrusion Prevention System v7.0 |
35.00 |
$3,395.00 |
|
Description: Implementing Cisco Intrusion Prevention System (IPS) v7.0 aims at providing network security engineers with the knowledge and skills needed to configure Cisco IPS Sensors and Sensor Features.
|
Securing Email with Cisco Email Security Appliance (SESA) |
21.00 |
$2,750.00 |
|
Description: Securing Email with Cisco Email Security Appliance (SESA) combines Parts 1 and 2 (SESA1, SESA2) into a single, three-day course. Students who take this SESA training learn to use Cisco Email Security Appliances (ESAs) to manage and troubleshoot email in their networks. Attendees of this SESA course receive in-depth instruction on popular features, emphasizing topics listed below, learn advanced Internet email concepts and receive an overview of how to customize configurations. SESA also teaches advanced configuration and operation of the Cisco ESA (Formerly Cisco IronPort Email Security Appliance). Extensive lab exercises provide critical hands-on experience with advanced features of the ESA. Learn more about Cisco Security training and recommended prerequisites below.
|
Securing Networks with Cisco Firepower Next Generation Firewall (SSNGFW) |
35.00 |
$4,000.00 |
|
Description: The course begins by introducing the system architecture, the latest major features, and the role of policies in implementing the solution. You learn how to deploy and manage Cisco Firepower Threat Defense devices and perform basic Cisco Firepower discovery. You learn how to use and configure Threat Defense technology, including application control, security intelligence, NGFW, NGIPS, and network-based malware and file controls. Also, you learn how to take advantage of powerful tools, so you can perform more efficient event analysis, including the detection of file types and network-based malware. And youll learn how to properly tune systems for better performance and greater network intelligence. The course concludes with system and user administration tasks and Threat Defense system troubleshooting. This course combines lecture materials and hands-on labs that give you practice in deploying and managing the Cisco Firepower system.
|
Securing Networks with Cisco Firepower Next-Generation Intrusion Prevention System (SSFIPS) |
35.00 |
$4,000.00 |
|
Description: Securing Networks with Cisco Firepower Next-Generation IPS (SSFIPS) v4.0 is a 5-day course which shows you how to deploy and use Cisco Firepower Next-Generation Intrusion Prevention System (NGIPS). This hands-on course gives you the knowledge and skills to use the platform features and includes firewall security concepts, platform architecture and key features; in-depth event analysis including detection of network-based malware and file type, NGIPS tuning and configuration including application control, security intelligence, firewall, and network-based malware and file controls; Snort rules language; file and malware inspection, security intelligence, and network analysis policy configuration designed to detect traffic patterns; configuration and deployment of correlation policies to take action based on events detected; troubleshooting; system and user administration tasks, and more
|
Securing Networks with Cisco Firepower Threat Defense NGFW (Firepower200) |
35.00 |
$4,000.00 |
|
Description: Securing Networks with Cisco Firepower Threat Defense NGFW (FIREPOWER200) is an instructor-led, lab-based, hands-on course offered by Cisco Learning Services. This course is part of a portfolio of security courses designed to help businesses support and maintain their Cisco Firepower Threat Defense systems. This lab-intensive course introduces you to the basic next-generation intrusion prevention system (NGIPS) and next-generation firewall (NGFW) security concepts. The course then leads you through the Cisco Firepower system. Among other powerful features, you become familiar with: ? Firepower Threat Defense configuration ? In-depth event analysis ? NGIPS tuning and configuration You also become familiar with the latest platform features: file and malware inspection, security intelligence, domain awareness, and more. The course begins by introducing the system architecture, the latest major features, and the role of policies in implementing the solution. You learn how to deploy and manage Cisco Firepower Threat Defense devices and perform basic Cisco Firepower discovery. You learn how to use and configure Threat Defense technology, including application control, security intelligence, NGFW, NGIPS, and network-based malware and file controls. Also, you learn how to take advantage of powerful tools, so you can perform more efficient event analysis, including the detection of file types and network-based malware. And youll learn how to properly tune systems for better performance and greater network intelligence. The course concludes with system and user administration tasks and Threat Defense system troubleshooting. This course combines lecture materials and hands-on labs that give you practice in deploying and managing the Cisco Firepower system.
|
TSHOOT: Troubleshooting and Maintaining Cisco IP Networks v2.0 |
35.00 |
$3,600.00 |
|
Description: In this course, you will learn and practice techniques to monitor and troubleshoot routed and switched networks through extensive hands-on lab exercises. Troubleshooting methods, approaches, procedures, and tools are explored. A series of different organizations are introduced for each a set of troubleshooting scenarios that are presented. You will attempt to solve as many of the troubleshooting tickets as you can; the debrief includes review information that will help you further understand the specific issues raised in the scenarios.
|
Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) |
35.00 |
$4,295.00 |
|
Description: Defining the Security Operations Center Understanding Network Infrastructure and Network Security Monitoring Tools Exploring Data Type Categories Understanding Basic Cryptography Concepts Understanding Common TCP/IP Attacks Understanding Endpoint Security Technologies Understanding Incident Analysis in a Threat-Centric SOC Identifying Resources for Hunting Cyber Threats Understanding Event Correlation and Normalization Identifying Common Attack Vectors Identifying Malicious Activity Identifying Patterns of Suspicious Behavior Conducting Security Incident Investigations Using a Playbook Model to Organize Security Monitoring Understanding SOC Metrics Understanding SOC Workflow and Automation Describing Incident Response Understanding the Use of VERIS Understanding Windows Operating System Basics Understanding Linux Operating System Basics Lab outline Use NSM Tools to Analyze Data Categories Explore Cryptographic Technologies Explore TCP/IP Attacks Explore Endpoint Security Investigate Hacker Methodology Hunt Malicious Traffic Correlate Event Logs, Packet Captures (PCAPs), and Alerts of an Attack Investigate Browser-Based Attacks Analyze Suspicious Domain Name System (DNS) Activity Explore Security Data for Analysis Investigate Suspicious Activity Using Security Onion Investigate Advanced Persistent Threats Explore SOC Playbooks Explore the Windows Operating System Explore the Linux Operating System.
|