Securing Networks with Cisco Firepower Threat Defense (FIREPOWER200)
  • Overview of technology
  • Next Generation Firewall Security
  • Types of Firewalls
  • Routing in FTD
  • Next Generation IPS
  • IDS vs IPS
  • Firepower Components and Features
  • Firepower System
  • Firepower Features
  • Firepower Automation
  • Firepower Components
  • Firepower Management Center
  • Firepower Device
  • Firepower Naming Conventions
  • Firepower Platforms
  • Firepower Stacking
  • Firepower Threat Defense
  • Unified Access Control Policies
  • High-level Feature Comparison
  • Firepower 9300 and 4100 Details
  • Firepower Management Center
  • Firepower Management Center
  • FMC Basics
  • How FMC works
  • FMC Management
  • FMC Limits
  • FMC GUI
  • FMC GUI Menus
  • FMC Analysis Menu
  • FMC Policies Menu
  • FMC Devices Menu
  • FMC Domain Management
  • How to Create FMC Domains
  • Firepower Licensing
  • Smart Licensing
  • Cisco Firepower System Configurations
  • FTD Device Registration
  • FTD Device Configuration
  • FMC Configuration
  • FTD Device Properties
  • FTD Interfaces
  • FTD Modes
  • FMC Policies Basics
  • Firepower Policy Flow
  • Deployment
  • Firepower High Availability
  • Firepower Management Center HA
  • 7000 and 8000 HA
  • Firepower Threat Defense HA
  • NAT Policy Configuration
  • NAT Policy Configuration
  • How NAT Works
  • NAT Types
  • Configuring NAT with FMC
  • NAT Rules
  • NAT Auto NAT Rules
  • NAT PAT pool
  • Advanced NAT
  • NAT Verification
  • NAT Examples
  • QoS Policy Configuration
  • How QoS Works
  • How to Create QoS Policy
  • QoS Policy Rules
  • QoS Examples
  • FlexConfig Policies
  • FlexConfig Policy Overview
  • Template Scripts
  • Customizing Device Configuration
  • Firepower Discovery
  • Network Discovery Components
  • Fingerprinting Hosts
  • How it works
  • Discovery Modes
  • Passive Detection
  • Active Detection for Hosts
  • Host Identity
  • Identity Workflow
  • Conflict Workflow
  • Discovery Policies
  • Network Discovery Policy
  • Network Discovery Rules
  • Rule Actions
  • Host Limits
  • Discovery of Users
  • User Limits
  • Identity Sources
  • Captive Portal
  • User Identity Configuration
  • Identity Policy
  • Objects
  • Object Basics
  • Object Groups
  • Overrides
  • ACP Object Relationship
  • General Objects
  • Advanced Objects
  • Variables
  • Prefilter Policies
  • Introduction to Prefiltering
  • Prefiltering vs Access Control
  • Configuring Prefiltering
  • Access Control Policy
  • ACP Components
  • ACP Rules
  • ACP Default Action
  • Rule Action – Block
  • Rule Action – Monitor
  • Rule Action – Trust
  • Rule Action – Allow
  • ACP Inspection Options
  • Logging Options
  • ACP Advanced Settings
  • ACP Inheritance
  • Security Intelligence
  • Security Intelligence Overview
  • SI Whitelists and Blacklists
  • SI Objects
  • SI Feeds
  • Feed Categories
  • List Objects
  • SI Deployment
  • File and Malware Policy
  • File Identification SHA-256
  • File-Type Detection
  • File Policy Rules
  • File Policy Basics
  • File Types
  • Advanced Options
  • Advanced Malware Protection
  • File Dispositions
  • AMP Cloud
  • AMP Architecture
  • AMP Advanced Options
  • AMP Integration
  • Next Generation Intrusion Prevention
  • Intrusion Prevention Basics
  • Rules
  • Rule Examples
  • Snort
  • Talos
  • Variables
  • Intrusion Policy
  • Network Analysis Policy
  • Traffic Flow for Intrusion Policy
  • Components
  • Policy Layers
  • Shared Policy Layers
  • Creating New Intrusion Policy
  • Intrusion Policy Configuration
  • Intrusion Policy Rules
  • Rule Options
  • Firepower Recommendations
  • Network Analysis Policy
  • Preprocessor Technology
  • Preprocessor Flow
  • Preprocessor Rules
  • Network Policy Settings
  • Adaptive Profiles
  • Adaptive Profile Configuration
  • SSL Policy
  • Anatomy of SSL Sessions
  • Firepower SSL Decryption
  • Firepower SSL Architecture
  • Decrypt Resign
  • Decrypt Known Key
  • SSL Policy
  • SSL Policy Settings
  • SSL Policy Rules
  • SSL Policy Default Action
  • Applying SSL Policy
  • VPN Deployments
  • VPN Overview
  • VPN Types
  • VPN Basics
  • Licensing
  • Firepower Threat Defense Site-to-Site VPN
  • Firepower Threat Defense Remote Access
  • VPNs
  • Correlation Policies
  • Responses
  • Remediation
  • Custom Remediation Modules
  • Correlation Policy Rules
  • How to Create Policy Rules
  • Whitelists
  • Traffic Profiles
  • Correlation Policy
  • Analysis
  • Event Basics
  • FMC Analysis
  • FMC Database
  • eStreamer
  • Analysis Search
  • Workflows
  • Security Intelligent Events
  • File and Malware Events
  • Impact Flags
  • Indication of Compromise
  • Analysis Tools
  • Reporting
  • System Administration
  • System Configuration
  • FMC Configuration Settings
  • Health Monitoring
  • Health Policy
  • Firepower Updates
  • User Account Management
  • Multidomain Deployments
Başvurunuz kayıt numarası ile alınmıştır.

Talep Formu

Adınız ve Soyadınız
E-Posta Adresiniz
Telefon Numarası
Çalıştığınız Yer
Okuduğunuz Okul
Mesajınız

Aktarılıyor...Dosya hazırlanıyor

X

Giriş Yap

Şifremi Unuttum

Şifremi Unuttum

Geri