Cisco Firepower Fundamentals

Cisco Firepower Fundamentals

.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 2h 17m | 305 MB

Instructor: Martin Brown
The importance of network security has increased substantially in recent years with attacks becoming more sophisticated. To defeat these, you need a specialist product like Cisco Firepower and you need to know how to configure it.

Imagine it's a Friday afternoon and as you are getting ready to leave for the weekend, you discover that an employee within your company has just inadvertently downloaded some malware that is causing untold damage to your organization's network. What you need to prevent such a scenario is a solution that will protect your network against attacks, intrusion, and malware even when the data is encrypted. What you need is Cisco Firepower. In this course, Cisco Firepower Fundamentals, you will get an overview of what makes up a Firepower solution. First, you will learn how to manage Firepower threat defense appliances located in branch offices, and how Firepower can scan downloaded files for malware. Next, you will explore how to configure Firepower to protect your network against intrusion techniques before looking at how to block traffic from specific website categories. Finally, you will discover how Firepower appliances can decrypt SSL encrypted traffic. When you are finished with this course, you will have the skills and knowledge to configure and support a complete Firepower solution on your corporate network.


[Fast Download] Cisco Firepower Fundamentals

Related eBooks:
Malware Analysis: Identifying and Defeating Packing
Offline Application Security Testing Essential Training
Advances in Digital Forensics XV
The New Frontiers of Space: Economic Implications, Security Issues and Evolving Scenarios
Advances in Information and Computer Security
Echtzeit und Sicherheit: Echtzeit 2018
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
Forensic Structural Engineering Handbook
Surviving Security: How to Integrate People, Process, and Technology
Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data
Leveraging Advances in Social Network Thinking for National Security : Proceedings of a Workshop
Zabbix: Enterprise Network Monitoring Made Easy
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.