Intro to Cisco Firepower Threat Defense (FTD) Firewall

3 views
0

Intro to Cisco Firepower Threat Defense (FTD) Firewall

Intro to Cisco Firepower Threat Defense (FTD) Firewall  Free Download Latest . It is of  Intro to Cisco Firepower Threat Defense (FTD) Firewall  free download.

Intro to Cisco Firepower Threat Defense (FTD) Firewall Overview

Description
The Cisco Firepower Threat Defense NGFW Implementation Training course shows you how to use and configure Cisco Firepower Threat Defense technology, beginning with initial device setup and configuration and including routing, Network Address Translation (NAT) and Policies.

This course teaches you how to implement advanced Next-Generation Firewall (NGFW) and Next-Generation Intrusion Prevention System (NGIPS) features. Please take a moment and check the Course Sections Outline:

Course Lab Topology. Setting up the environment
Cisco Firepower Device Manager(FDM) – On-Box Management
Cisco Firepower Management Center(FMC) Initial Setup
Firepower Threat Defense(FTD) Firewall Basic Configuration
Connect LAN Users to Internet and Outside World
Configuring URL Filtering Policies
Configure SSL Policy
Configure Malware & File Policy
Configure Intrusion Policy
Configure Platform Settings

Who this course is for:

Students or Security Engineers with no prior knowledge related to Cisco Firepower Threat Defense (FTD).
Students or Security Engineers that want learn how to configure Cisco FTD NGFW in just a couple of hours.

What you’ll learn

Implement initial Setup on Cisco Firepower Device Manager(FDM) with On-Box Management
Deploy Firepower Threat Defense(FTD) Firewall Basic Configuration
Configure Separate Management Machine – Firepower Management Center (FMC)
Register Cisco FTD Firewall to FMC
Connect LAN Users to Internet and Outside World
Deploy your first Access Control Policy
Configuring URL Filtering Policies. Block Facebook. Allow Twitter. Block Gambling.
Implement SSL policy. Inspect HTTPs traffic.
Implement File and Malware Policy. Inside to Outside and Outside to Inside Rules.
Define Intrusion Policy and attach it to Access Control Policy (ACP).

You may Also Like  Masterclass in color grading with John Daro

Your email address will not be published. Required fields are marked *