Course Description
This training gives you the knowledge and skills to use and configure CISCOFirepower Threat Defense technology, beginning with initial device setup and configuration and including routing, high availability, CISCO Adaptive Security Appliance (ASA) to CISCO Firepower Threat Defense migration, traffic control, and Network Address Translation (NAT). You will learn how to implement advanced Next-Generation Firewall (NGFW) and Next-Generation Intrusion Prevention System (NGIPS) features, including network intelligence, file type detection, network-based malware detection, and deep packet inspection. You will also learn how to configure site-to-site VPN, remote-access VPN, and SSL decryption before moving on to detailed analysis, system administration, and troubleshooting.
What Do Participants Learn?
- Describe Key Concepts Of NGIPS And NGFW Technology And The CISCO Firepower Threat Defense System, And Identify Deployment Scenarios
- Perform Initial CISCO Firepower Threat Defense Device Configuration And Setup Tasks
- Describe How To Manage Traffic And Implement Quality Of Service (QOS) Using CISCO Firepower Threat Defense
- Describe How To Implement NAT By Using CISCO Firepower Threat Defense
- Perform An Initial Network Discovery, Using CISCO Firepower To Identify Hosts, Applications, And Services
- Describe The Concepts And Procedures For Implementing Security Intelligence Features
- Implement And Manage Intrusion Policies
- Describe The Components And Configuration Of Site-to-site VPN
- Describe SSL Decryption Capabilities And Usage
Who Should Attend?
- Technical Professionals
- System Administrators
- Network Administrators
- Solution Designers
- System Installers
- Cisco Integrators And Partners
What Will the Learning Experience Include?
Phase: 1
Introduce
- Comprehensive pre-program activities include:
- Web-based information forms & surveys completed by attendee.
- Direct consultation with the attendee about the expectations.
- During the training, participants engage in data, activities, and conversations that lead to insight and knowledge.
- Participants learn from expert trainers who have both academic and business experiences.
- Highly applicable training content & instructive activities for adding depth to training topics.
- **A half-day site visit for integrating the experience & plan next steps. Opportunities to provide connections, ideas & support.
Phase: 2
Explore & Practice
Phase: 3
Apply
- Apply & sustain the learning experience by using this ongoing support:
- To ensure participant has new skills or behavior progress.
- Optional, fee-based mentoring & coaching with the trainer.
- Training materials & additional documents (e-books, pdf files, presentations and articles)
- Evaluate your training experience by giving us feedbacks and help us to reach our organizational goals.
- Participant's Evaluation
- Trainer's Evaluation
Phase: 4
EVALUATE
Section One:
- Introduction
- Installing, Upgrading
- Deploying FTD (Routed/Transparent)
- FTD High Availability
Section Two:
- Application Visibility Control (AVC)
- Object Management
- IPS Policies (NGIPS)
Section Three:
- Advanced Malware Protection (AMP)
- URL Filtering
- Access Control Policies (NGFW)
- Identity Policy (ISE, Active Directory)
- Reporting
Section Four:
- Event Analysis
- Correlation Event
- QoS (Application Rate Limit)
- Application Filtering
- DNS Policy
Section FIve:
- Dynamic Routing
- NAT
- SSL Decryption
- ASA Migration to Firepower
- Backup & Restore
- Troubleshooting