Master the deployment and configuration of Cisco Secure Firewall and enhance your network security skills with our comprehensive three-day, hands-on course tailored for network security professionals.
Deploy and configure Cisco Secure Firewall solutions effectively.
Implement Next-Generation Firewall and Intrusion Prevention System features.
Analyze network security events and perform basic troubleshooting.
Understand system administration for Cisco Secure Firewall management.
In this 3-day course students will learn to deploy, configure, and manage Cisco Secure Firewall/Firepower Threat Defense. This hands-on course will help develop the skills to use and configure Cisco FTD, starting with the initial device setup and configuration. Students will learn to implement Next-Generation Firewall (NGFW) and Next-Generation Intrusion Prevention System (NGIPS) features. Students will also learn to analyze events, system administration, and basic troubleshooting.
No upcoming dates. Please check back later.
Basic firewall and IPS terminologies
Understand CSF features
Examine different platforms
Examine licensing
General implementation use cases
Device Registration
Differentiate between FXOS and FTD image
Differentiate between management options FDM and FMC
Initial device activation and configuration
Examining different policies
Define objects
Explore system configuration
Configure Health Monitoring
Discuss device/platform management options
Overview of High Availability
Describe packet processing
Explain traffic bypassing
Discuss pre-filter policy
Overview of NAT
Different NAT rule types
Implementing and configuring NAT
Explain Network Discovery
Configure Network Discovery
Overview of Access Control Policies (ACP)
Describe Access Control Policy rules and default action
Define further inspection feature in a rule
Overview of logging options for a rule
Advanced Settings in an ACP
Deploying the change in an ACP
Overview of Security Intelligence (SI)
Configure Security Intelligence objects
Deploy SI
Overview of malware and file policy
Discuss Advanced Malware Protection
Overview of Intrusion Prevention and Snort rules
Explain variables and variable sets
Configure intrusion policies
Describe firepower recommendations
Discuss different types of events
Explore analysis tools
Analyze threats
Manage device updates
Explore user account management features
Configuring different user accounts
Identify common misconfigurations
Basic troubleshooting commands
Using packet trace
Initial Device Setup
Basic Configuration and Verification
Configure Security Intelligence
Configure Intrusion Policy
Configure/ Modify the Access Control Policy
Configure NAT Policies
Configure/ Modify Network Discovery Policy
Deploy Changes
Test/ Analyze the NGFW Traffic
System Administration Overview
Your team deserves training as unique as they are.
Let us tailor the course to your needs at no extra cost.
Trusted by Engineers at:
and more...
Aaron Steele
Casey Pense
Chris Tsantiris
Javier Martin
Justin Gilley
Kathy Le
Kelson Smith
Oussama Azzam
Pascal Rodmacq
Randall Granier
Aaron Steele
Casey Pense
Chris Tsantiris
Javier Martin
Justin Gilley
Kathy Le
Kelson Smith
Oussama Azzam
Pascal Rodmacq
Randall Granier