Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-866-716-6688 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

SECUR202 - Cisco Integrated Threat Defense Investigation and Mitigation

New – Identify, isolate, and mitigate network threats using the Cisco Integrated Threat Defense solution platforms.

GK# 9896

Course Overview

TOP

This course will introduce students to network threat investigation and then reinforce student learning through a series of lab scenarios designed to identify relationships between the Cisco products and the stages of the attack lifecycle. This course is the second in a pair of courses covering the Cisco Integrated Threat Defense (ITD) solution.

Schedule

TOP
  • Delivery Format:
  • Date:
  • Location:
  • Access Period:

$

What You'll Learn

TOP

Upon completion of this course, you should be able to:

  • Describe the stages of the network attack lifecycle and identify ITD solution platform placement based on a given stage
  • Detail how to locate and mitigate email malware attacks
  • Describe email phishing attacks and the steps taken to locate and mitigate them on the network
  • Identify and mitigate data exfiltration threats on the network
  • Identify malware threats on the network and mitigate those threats after investigation

Outline

TOP
Viewing outline for:

Virtual Classroom Live Outline

Module 1: Network Threat Investigation Introduction
  • Network Attack Introduction
  • Hunting Network Threats in the Enterprise
Module 2: Investigation and Mitigation of Email Malware Threats
  • Examining Email Malware Threats
  • Investigating and Verifying Email Malware Threat Mitigation
Module 3: Investigation and Mitigation of Email Phishing Threats
  • Examining Email Phishing Attacks
  • Configuring Cisco ESA for URL and Content Filtering
  • Investigating and Verifying Email Phishing Threat Mitigation
Module 4: Investigation and Mitigation of Data Exfiltration Threats
  • Exploiting Vulnerable Network Servers
  • Investigating Data Exfiltration Threats
  • Mitigating and Verifying Data Exfiltration Threats
Module 5: Investigation and Mitigation of Malware Threats
  • Examining Endpoint Malware Protection
  • Investigating and Mitigating Endpoint Malware Threats

Labs

TOP
Viewing labs for:

Virtual Classroom Live Labs

Lab 1: Connecting to the Lab Environment
Lab 2: Threat Scenario 1: Email Malware Attachments
Lab 3: Threat Scenario 2: Email-Based Phishing
Lab 4: Threat Scenario 3: Targeted Network Server Threats and Data Exfiltration
Lab 5: Threat Scenario 4: Endpoint Malware Investigation and Mitigation

Prerequisites

TOP

The knowledge and skills that a student must have before attending this course include:

  • Technical understanding of TCP/IP networking and network architecture
  • Technical understanding of security concepts and protocols
  • Familiarity with Cisco Identity Services Engine, Cisco Stealthwatch, Cisco Firepower, and Cisco AMP for Endpoints

Who Should Attend

TOP

This course is designed for technical professionals who need to know how to use a deployed Integrated Threat Defense (ITD) network solution to identify, isolate, and mitigate network threats.

The primary audience for this course includes:

  • Network analysts
  • Network investigators

Vendor Credits

TOP

This course can be purchased using Cisco Learning Credits (CLCs).

Course Delivery

This course is available in the following formats:

Virtual Classroom Live

Experience expert-led online training from the convenience of your home, office or anywhere with an internet connection.

Duration: 2 day

Request this course in a different delivery format.
Enroll