757-216-3656 | Monday–Friday 8:30 AM – 4:30 PM | info@itdojo.com

Course Duration

3 Days

Audience

Employees of federal, state and local governments; and businesses working with the government.

Prerequisites

Before taking this course, it would be good to have some understanding of Network Security fundamentals. Exposure to working with any Network firewall will be an advantage.

Course Description

In this 3-day course students will learn to deploy, configure, and manage Cisco Secure Firewall/Firepower Threat Defense. This hands-on course will help develop the skills to use and configure Cisco FTD, starting with the initial device setup and configuration. Students will learn to implement Next-Generation Firewall (NGFW) and Next-Generation Intrusion Prevention System (NGIPS) features. Students will also learn to analyze events, system administration, and basic troubleshooting.

Course Outline

Course Topics
  • Basic firewall and IPS terminologies
  • Understand CSF features
  • Examine different platforms
  • Examine licensing
  • General implementation use cases
  • Device Registration
  • Differentiate between FXOS and FTD image
  • Differentiate between management options FDM and FMC
  • Initial device activation and configuration
  • Examining different policies
  • Define objects
  • Explore system configuration
  • Configure Health Monitoring
  • Discuss device/ platform management options
  • Overview of High Availability
  • Describe packet processing
  • Explain traffic bypassing
  • Discuss pre-filter policy
  • Overview of NAT
  • Different NAT rule types
  • Implementing and configuring NAT
  • Explain Network Discovery
  • Configure Network Discovery
  • Overview of Access Control Policies (ACP)
  • Describe Access Control Policy rules and default action
  • Define further inspection feature in a rule
  • Overview of logging options for a rule
  • Advanced Settings in an ACP
  • Deploying the change in an ACP
  • Overview of Security Intelligence (SI)
  • Configure Security Intelligence objects
  • Deploy SI
  • Overview of malware and file policy
  • Discuss Advanced Malware Protection
  • Overview of Intrusion Prevention and Snort rules
  • Explain variables and variable sets
  • Configure intrusion policies
  • Describe firepower recommendations
  • Discuss different types of events
  • Explore analysis tools
  • Analyze threats
  • Manage device updates
  • Explore user account management features
  • Configuring different user accounts
  • Identify common misconfigurations
  • Basic troubleshooting commands
  • Using packet trace
Get More Information

We cannot work with the general public. We only work with Government Agencies, Military, government contractors, and corporate clients.