Tags
Language
Tags
April 2024
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4

CBTNuggets - Cisco CCNP Security 300-207 SITCS: Implementing Cisco Threat Control Solutions

Posted By: serpmolot
CBTNuggets - Cisco CCNP Security 300-207 SITCS: Implementing Cisco Threat Control Solutions

CBTNuggets - Cisco CCNP Security 300-207 SITCS: Implementing Cisco Threat Control Solutions
English | 2016 | mp4 | H264 | 1280x720 | AAC 2 ch | 3 hrs 25 min | 832 MB
eLearning | Level: Intermediate

This Implementing Cisco Threat Control Solutions (SITCS, 300-207) course provides training on integration of Intrusion Prevention System (IPS, not SourceFire) context-aware firewall components (not SourceFire), as well as web (Cloud) and email security solutions.

Recommended Experience
- CCNA Route/Switch and CCNA Security certification (or equivalent knowledge and skills)
- Knowledge of Microsoft Windows
- CCNA Security is a pre-requisite for the CCNP Security certification

Recommended Equipment
- Evaluation or test lab licenses for the Email Security Appliance (ESA), Web Security Appliance (WSA)
- ASA Firewall
- IOS Router
- Virtualization Environment, such as VMware

Related Certifications
- CCNP Security. This course (SITCS exam # 300-207) is part of the curriculum in the Cisco Certified Network Professional Security (CCNP© Security) certification

Related Job Functions
- Network Analyst
- Network Engineer
- Network Technician
- Network Designer
- Security Analyst
- Security Auditor
- Penetration Tester
- Security Architect
- Technical Manager

Keith Barker has been a CBT Nuggets trainer since 2012 and holds a variety of networking and security certifications, including CCIE R&S, CCIE Security, (ISC)2 CISSP, Palo Alto CNSE, and Check Point CCSA


1. SITCS Welcome (3 min)
Keith welcomes you to the course and provides tips for getting the most from it. Welcome!
2. WSA Overview (10 min)
Keith introduces the Cisco Web Security Appliance (WSA), along with a few of its functions and features.
3. Bootstrapping the WSA (12 min)
Keith demonstrates how to initially configure the WSA at the CLI, in preparation to manage it from the GUI.
4. Deploy and License a WSA VM (10 min)
Keith demonstrates the deployment of a WSA VM in a VMware environment. using VMware Workstation. The licensing process also is demonstrated.
5. WSA Identities (6 min)
Keith introduces the concept of Identities on the WSA for the purpose of classifying transactions and traffic. This is an important step, so that policies can be applied to the correctly identified traffic. Keith also demonstrates where in the GUI to go to create and/or edit identities on the WSA.
6. WSA Access Policy (13 min)
Keith explains, demonstrates, and verifies access policies on the Web Security Appliance.
7. WSA User Authentication (10 min)
Keith discusses and demonstrates adding an LDAP or AD back end authentication server to the WSA. This allows the administrator to include user authentication as part of WSA identities.
8. Directing Traffic to the WSA (6 min)
Keith describes the major categories, and some details for each, in getting end-user traffic to the WSA for analysis.
9. WCCP Router Configuration (12 min)
Keith describes, demonstrates, and verifies WCCP configuration and redirection to the WSA. IOS configuration commands used on the router (in this Nugget) are available in the NuggetLab files.
10. WCCP ASA Configuration (12 min)
Keith demonstrates and verifies the WCCP configuration on an ASA using ASDM.
11. Cisco Legacy IPS and IDS Concepts (9 min)
Keith describes a few of the concepts and ideas from Cisco's original IPS and IDS solutions.
12. IDM Interface (13 min)
Keith provides a brief overview of the legacy IPS manager interface called IPS Device Manager (IDM).
13. ESA Overview (9 min)
Keith introduces the Email Security Appliance, and provides examples of its features and benefits.
14. Email Terminology (7 min)
Keith discusses several acronyms and terms related to email systems.
15. ESA VM Install (6 min)
Keith demonstrates the installation of the Email Security Appliance (ESA) VM in a VMware environment.
16. Licensing the ESA (2 min)
Keith demonstrates how to apply a license to the Email Security Appliance VM.
17. ESA HATs, RATs, and Listeners (9 min)
Keith describes and demonstrates basic configuration of Host Access Tables, Recipient Access Tables, and listeners on the ESA.
18. Verifying HATs and RATs (5 min)
Keith demonstrates how to verify the Host Access and Recipient Access Tables. Sender groups also are discussed and demonstrated in this Nugget.
19. E-Mail Policies (6 min)
In this Nugget Keith talks with you and demonstrates how to configure inbound and outbound email policies.
20. ESA Message Tracking (5 min)
Keith demonstrates how to enable and use the Message Tracking service on the Email Security Appliance.
21. ESA Trace Tool (1 min)
Keith demonstrates how to find and use the Trace feature on the Email Security Appliance.
22. Cloud Web Security Overview (7 min)
Keith describes the Cloud Web Security (CWS) service and how it can be used to protect users and systems.
23. ASA to CWS Connector (9 min)
Keith demonstrates where to go to configure the ASA to Cloud Web Security (CWS) connector.
24. IOS to CWS Connector (4 min)
Keith discusses the configuration options (both old and new) to implement a connector between an IOS router and the Cloud Web Security (CWS) services.
25. ASA to CX Module Policy (7 min)
Keith introduces a few features provided by the ASA-CX along with an SSP module, along with details on how to redirect traffic from the ASA to the module for processing.

Screenshots:

CBTNuggets - Cisco CCNP Security 300-207 SITCS: Implementing Cisco Threat Control Solutions

CBTNuggets - Cisco CCNP Security 300-207 SITCS: Implementing Cisco Threat Control Solutions

CBTNuggets - Cisco CCNP Security 300-207 SITCS: Implementing Cisco Threat Control Solutions

NO MIRRORS PLEASE

WANT MORE? VISIT MY BLOG!


CBTNuggets - Cisco CCNP Security 300-207 SITCS: Implementing Cisco Threat Control Solutions