Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-866-716-6688 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

SSFAMP V3.0-Protecting Against Malware Threats with Cisco AMP for Endpoints

Learn all about the powerful features of Cisco AMP for Endpoints software.

GK# 4179

Course Overview

In this course, you will learn how to build and manage a Cisco AMP for Endpoints deployment, create policies for endpoint groups, and deploy connectors. You also analyze malware detections using powerful tools available in the AMP for Endpoints console.

This course combines lecture materials and hands-on labs to make sure that you are able to successfully deploy and manage an AMP for Endpoints deployment.

Delivery Format Options

  • Virtual Classroom Live

    Virtual Classroom Live

    Experience expert-led online training from the convenience of your home, office or anywhere with an Internet connection.

    From

    $4060 CAD

    3 day

  • Private Group Training

    Private Group Training

    Train your entire team in a private, coordinated professional development session at the location of your choice.

    Receive private training for teams online and in-person.

Request a date or location for this course.

What You'll Learn

  • Malware terminology and categories 
  • Architecture and individual security features of Windows, Apple Mac, and Linux operating systems 
  • What are vulnerabilities 
  • Components and behavior of exploit kits and botnets 
  • Modern attack vectors and trends 
  • Key components and methodologies of Cisco Advanced Malware Protection 
  • Key features and concepts of the AMP for Endpoints product 
  • Navigate the AMP for Endpoints console interface and perform first-use setup tasks 
  • Configure and customize AMP for Endpoints to perform malware detection 
  • Create and configure a policy for AMP-protected endpoints 
  • Plan, deploy, and troubleshoot an AMP for Endpoints installation 
  • Analyze files and events by using the AMP for Endpoints console and be able to produce threat reports 
  • Use the AMP for Endpoints tools to analyze a malware attack 
  • Features of the Accounts menu for both public and private cloud installations

Who Needs To Attend

  • Security administrators 
  • Security consultants 
  • Network administrators 
  • System engineers 
  • Technical support personnel 
  • Channel partners and resellers

Course Outline

Download Course Outline