Securing Networks with Cisco Firepower Next Generation Firewall Bootcamp
You will learn how to implement advanced Next-Generation Firewall (NGFW) and Next-Generation Intrusion Prevention System (NGIPS) features, including network intelligence, file type detection, network-based malware detection, and deep packet inspection.
- Training Duration:
- 5 days
- Delivery:
- Online
Engineers that require an in-depth knowledge of Cisco FirePower solution.
Attendees will learn how to deploy and use Cisco Firepower Threat Defense system, starting with initial device setup and configuration and including routing, high availability, Cisco Adaptive Security Appliance (ASA) to Cisco Firepower Threat Defense migration, traffic control, and Network Address Translation (NAT).
You will learn how to implement advanced Next-Generation Firewall (NGFW) and Next-Generation Intrusion Prevention System (NGIPS) features, including network intelligence, file type detection, network-based malware detection, and deep packet inspection.
Cisco Firepower Threat Defense Overview
-
- Examining Firewall and IPS Technology
- Firepower Threat Defense Features and Components
- Examining Firepower Platforms
- Examining Firepower Threat Defense Licensing
- Cisco Firepower Implementation Use Cases
Cisco Firepower NGFW Device Configuration
-
- Firepower Threat Defense Device Registration
- FXOS and Firepower Device Manager
- Initial Device Setup
- Managing NGFW Devices
- Examining Firepower Management Center Policies
- Examining Objects
- Examining System Configuration and Health Monitoring
- Device Management
- Examining Firepower High Availability
- Configuring High Availability
- Cisco ASA to Firepower Migration
- Migrating from Cisco ASA to Firepower Threat Defense
Cisco Firepower NGFW Traffic Control
-
- Firepower Threat Defense Packet Processing
- Implementing QoS
- Bypassing Traffic
Cisco Firepower NGFW Address Translation
-
- NAT Basics
- Implementing NAT
- NAT Rule Examples
- Implementing NAT
Cisco Firepower Discovery
-
- Examining Network Discovery
- Configuring Network Discovery
Implementing Access Control Policies
-
- Examining Access Control Policies
- Examining Access Control Policy Rules and Default Action
- Implementing Further Inspection
- Examining Connection Events
- Access Control Policy Advanced Settings
- Access Control Policy Considerations
- Implementing an Access Control Policy
Security Intelligence
-
- Examining Security Intelligence
- Examining Security Intelligence Objects
- Security Intelligence Deployment and Logging
- Implementing Security Intelligence
File Control and Advanced Malware Protection
-
- Examining Malware and File Policy
- Examining Advanced Malware Protection
Next-Generation Intrusion Prevention Systems
-
- Examining Intrusion Prevention and Snort Rules
- Examining Variables and Variable Sets
- Examining Intrusion Policies
Site-to-Site VPN
-
- Examining IPsec
- Site-to-Site VPN Configuration
- Site-to-Site VPN Troubleshooting
- Implementing Site-to-Site VPN
Remote-Access VPN
-
- Examining Remote-Access VPN
- Examining Public-Key Cryptography and Certificates
- Examining Certificate Enrollment
- Remote-Access VPN Configuration
- Implementing Remote-Access VPN
SSL Decryption
-
- Examining SSL Decryption
- Configuring SSL Policies
- SSL Decryption Best Practices and Monitoring
Detailed Analysis Techniques
-
- Examining Event Analysis
- Examining Event Types
- Examining Contextual Data
- Examining Analysis Tools
- Threat Analysis
System Administration
-
- Managing Updates
- Examining User Account Management Features
- Configuring User Accounts
- System Administration
Cisco Firepower Troubleshooting
-
- Examining Common Misconfigurations
- Examining Troubleshooting Commands
- Firepower Troubleshooting
CCNA level of networking skills is highly recommended.