After completing this course you should be able to:
Attendees should meet the following prerequisites:
Recommended prerequisites:
Describing Information Security Concepts (Self-Study)
Describing Common TCP/IP Attacks (Self-Study)
Describing Common Network Application Attacks (Self-Study)
Describing Common Endpoint Attacks (Self-Study)
Describing Network Security Technologies
Deploying Cisco ASA Firewall
Deploying Cisco Firepower Next-Generation Firewall
Deploying Email Content Security
Deploying Web Content Security
Deploying Cisco Umbrella (Self-Study)
Explaining VPN Technologies and Cryptography
Introducing Cisco Secure Site-to-Site VPN Solutions
Deploying Cisco IOS VTI-Based Point-to-Point
Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW
Introducing Cisco Secure Remote Access VPN Solutions
Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW
Explaining Cisco Secure Network Access Solutions
Describing 802.1X Authentication
Configuring 802.1X Authentication
Describing Endpoint Security Technologies (Self-Study)
Deploying Cisco AMP for Endpoints (Self-study)
Introducing Network Infrastructure Protection (Self-Study)
Deploying Control Plane Security Controls (Self-Study)
Deploying Layer 2 Data Plane Security Controls (Self-Study)
Deploying Layer 3 Data Plane Security Controls (Self-Study)
Labs