CYBERSECURITY NEWS

Securing Networks with Cisco Firepower Next Generation Firewall (SSNGFW)

  • Cisco Firepower Threat Defense Overview
    • Examining Firewall and IPS Technology
    • Firepower Threat Defense Features and Components
    • Examining Firepower Platforms
    • Examining Firepower Threat Defense Licensing
    • Cisco Firepower Implementation Use Cases
  • Cisco Firepower NGFW Device Configuration
    • Firepower Threat Defense Device Registration
    • FXOS and Firepower Device Manager
    • Initial Device Setup
    • Managing NGFW Devices
    • Examining Firepower Management Center Policies
    • Examining Objects
    • Examining System Configuration and Health Monitoring
    • Device Management
    • Examining Firepower High Availability
    • Configuring High Availability
    • Cisco ASA to Firepower Migration
    • Migrating from Cisco ASA to Firepower Threat Defense
  • Cisco Firepower NGFW Traffic Control
    • Firepower Threat Defense Packet Processing
    • Implementing QoS
    • Bypassing Traffic
  • Cisco Firepower NGFW Address Translation
    • NAT Basics
    • Implementing NAT
    • NAT Rule Examples
    • Implementing NAT
  • Cisco Firepower Discovery
    • Examining Network Discovery
    • Configuring Network Discovery
  • Implementing Access Control Policies
    • Examining Access Control Policies
    • Examining Access Control Policy Rules and Default Action
    • Implementing Further Inspection
    • Examining Connection Events
    • Access Control Policy Advanced Settings
    • Access Control Policy Considerations
    • Implementing an Access Control Policy
  • Security Intelligence
    • Examining Security Intelligence
    • Examining Security Intelligence Objects
    • Security Intelligence Deployment and Logging
    • Implementing Security Intelligence
  • File Control and Advanced Malware Protection
    • Examining Malware and File Policy
    • Examining Advanced Malware Protection
  • Next-Generation Intrusion Prevention Systems
    • Examining Intrusion Prevention and Snort Rules
    • Examining Variables and Variable Sets
    • Examining Intrusion Policies
  • Site-to-Site VPN
    • Examining IPsec
    • Site-to-Site VPN Configuration
    • Site-to-Site VPN Troubleshooting
    • Implementing Site-to-Site VPN
  • Remote-Access VPN
    • Examining Remote-Access VPN
    • Examining Public-Key Cryptography and Certificates
    • Examining Certificate Enrollment
    • Remote-Access VPN Configuration
    • Implementing Remote-Access VPN
  • SSL Decryption
    • Examining SSL Decryption
    • Configuring SSL Policies
    • SSL Decryption Best Practices and Monitoring
  • Detailed Analysis Techniques
    • Examining Event Analysis
    • Examining Event Types
    • Examining Contextual Data
    • Examining Analysis Tools
    • Threat Analysis
  • System Administration
    • Managing Updates
    • Examining User Account Management Features
    • Configuring User Accounts
    • System Administration
  • Cisco Firepower Troubleshooting
    • Examining Common Misconfigurations
    • Examining Troubleshooting Commands
    • Firepower Troubleshooting