Filter Keyword to...

Category: IT Professionals

Results Per Page :
OSPF as a link state protocol uses several different packets to exchange information about network topology between routers. These packets are called link-state advertisements and they describe the network...
[READ MORE]
OSPF as a link state protocol uses several different packets to exchange information about network topology between routers. These packets are called link-state advertisements and they describe the network topology in great detail. Each router stores the received LSA packets in the link-state database. After LSDBs are synced between the routers, OSPF uses the shortest path first algorithm to calculate the best routes. The best intra-area routes are calculated individually by each OSPF router. For the best interarea route calculation, the internal router must also rely on the best path information received from the ABRs. Scalability, improved CPU and memory utilization, and the ability to mix small routers with large routers are all the benefits of using proper route summarization techniques. A key feature of the OSPF protocol is the ability to summarize routes at area and AS boundaries. The OSPF protocol defines several special-case area types, including stub areas, totally stubby areas, and NSSAs. The purpose of all three types of stub areas is to inject default routes into an area so that external and summary LSAs are not flooded. Default routes reduce the routing table size, and also reduce the memory and the CPU utilization. OSPF injects a default route unconditionally or based on the presence of a default route inside the routing table. This course explains how OSPF builds the routing table. This course also defines different types of route summarization and describes the configuration commands for each type. the OSPF area types and the benefits of default routes are also described.
OSPF as a link state protocol uses several different packets to exchange information about network topology between routers. These packets are called link-state advertisements and they describe the network topology in great detail. Each router stores the received LSA packets in the link-state database. After LSDBs are synced between the routers, OSPF uses the shortest path first algorithm to calculate the best routes. The best intra-area routes are calculated individually by each OSPF router. For the best interarea route calculation, the internal router must also rely on the best path information received from the ABRs. Scalability, improved CPU and memory utilization, and the ability to mix small routers with large routers are all the benefits of using proper route summarization techniques. A key feature of the OSPF protocol is the ability to summarize routes at area and AS boundaries. The OSPF protocol defines several special-case area types, including stub areas, totally stubby areas, and NSSAs. The purpose of all three types of stub areas is to inject default routes into an area so that external and summary LSAs are not flooded. Default routes reduce the routing table size, and also reduce the memory and the CPU utilization. OSPF injects a default route unconditionally or based on the presence of a default route inside the routing table. This course explains how OSPF builds the routing table. This course also defines different types of route summarization and describes the configuration commands for each type. the OSPF area types and the benefits of default routes are also described.
[READ LESS]
Produced by: SkillSoft
Understanding the purpose of some of the commonly used Layer1 and Layer 2 technologies, as well as network protocols, is central to understanding how hosts communicate with one another. LANs have rapidly...
[READ MORE]
Understanding the purpose of some of the commonly used Layer1 and Layer 2 technologies, as well as network protocols, is central to understanding how hosts communicate with one another. LANs have rapidly evolved into support systems that are critical to communications within an organization and it is important to understand how these systems operate. In this course you will learn about data transport methods, packet flows, and packet management for IPv4 and IPv6. You will also learn about Layer 2 technologies such as the Point-to-Point Protocol (PPP) and Frame Relay and their operations.
Understanding the purpose of some of the commonly used Layer1 and Layer 2 technologies, as well as network protocols, is central to understanding how hosts communicate with one another. LANs have rapidly evolved into support systems that are critical to communications within an organization and it is important to understand how these systems operate. In this course you will learn about data transport methods, packet flows, and packet management for IPv4 and IPv6. You will also learn about Layer 2 technologies such as the Point-to-Point Protocol (PPP) and Frame Relay and their operations.
[READ LESS]
Produced by: SkillSoft
OSPF is a link-state protocol based on the open standard. At a high level, OSPF operation consists of three main elements: neighbor discovery, link-state information exchange, and best-path calculation. To...
[READ MORE]
OSPF is a link-state protocol based on the open standard. At a high level, OSPF operation consists of three main elements: neighbor discovery, link-state information exchange, and best-path calculation. To calculate the best path, OSPF utilizes SPF or Dijkstra's algorithm. The input information for the SPF calculation is link state information, which is exchanged between routers through several different OSPF message types. These message types help improve convergence and scalability in multiarea OSPF deployments. OSPF also supports several different network types, which enables you to configure OSPF over a variety of different underlying network technologies. After completing this course, you will understand OSPF adjacencies.
OSPF is a link-state protocol based on the open standard. At a high level, OSPF operation consists of three main elements: neighbor discovery, link-state information exchange, and best-path calculation. To calculate the best path, OSPF utilizes SPF or Dijkstra's algorithm. The input information for the SPF calculation is link state information, which is exchanged between routers through several different OSPF message types. These message types help improve convergence and scalability in multiarea OSPF deployments. OSPF also supports several different network types, which enables you to configure OSPF over a variety of different underlying network technologies. After completing this course, you will understand OSPF adjacencies.
[READ LESS]
Produced by: SkillSoft
Given that bandwidth of modern networks is continually increasing at a steady rate, packet switching efficiency is important. As a network administrator, you must understand packet switching methods and their...
[READ MORE]
Given that bandwidth of modern networks is continually increasing at a steady rate, packet switching efficiency is important. As a network administrator, you must understand packet switching methods and their evolution. Cisco Express Forwarding is the state-of-the-art switching method, and the most commonly used method. Therefore, you must be familiar with its operations so that you can effectively maintain and troubleshoot your network. In IP networks, packets are routed by destination address. Sometimes, especially in a complex, highly redundant network, this approach is not flexible enough. You may want to optimize the traffic path for some specific application, or control the traffic path based on the network performance. You can accomplish all this with PBR and IP SLA features. This course describe how to verify Cisco Express Forwarding operation and implement path control using PBR and IP SLA.
Given that bandwidth of modern networks is continually increasing at a steady rate, packet switching efficiency is important. As a network administrator, you must understand packet switching methods and their evolution. Cisco Express Forwarding is the state-of-the-art switching method, and the most commonly used method. Therefore, you must be familiar with its operations so that you can effectively maintain and troubleshoot your network. In IP networks, packets are routed by destination address. Sometimes, especially in a complex, highly redundant network, this approach is not flexible enough. You may want to optimize the traffic path for some specific application, or control the traffic path based on the network performance. You can accomplish all this with PBR and IP SLA features. This course describe how to verify Cisco Express Forwarding operation and implement path control using PBR and IP SLA.
[READ LESS]
Produced by: SkillSoft
Many IP routing challenges can be solved using route redistribution. Having a method to manipulate the redistribution process increases your options and flexibility. There is no one type of route filter that...
[READ MORE]
Many IP routing challenges can be solved using route redistribution. Having a method to manipulate the redistribution process increases your options and flexibility. There is no one type of route filter that is appropriate for every situation. Therefore, the more techniques that you have at your disposal, the better your chances of solving connectivity challenges. To ensure that the network operates efficiently, you often need to control the redistribution process. By implementing filtering mechanisms, you can influence which information is redistributed between different protocols. Controlling the exchange of routing information and routing metrics manipulation enables you to ensure optimal traffic flow within the network. After completing this course, you will be able to use distribute lists and prefix lists techniques to manipulate redistribution.
Many IP routing challenges can be solved using route redistribution. Having a method to manipulate the redistribution process increases your options and flexibility. There is no one type of route filter that is appropriate for every situation. Therefore, the more techniques that you have at your disposal, the better your chances of solving connectivity challenges. To ensure that the network operates efficiently, you often need to control the redistribution process. By implementing filtering mechanisms, you can influence which information is redistributed between different protocols. Controlling the exchange of routing information and routing metrics manipulation enables you to ensure optimal traffic flow within the network. After completing this course, you will be able to use distribute lists and prefix lists techniques to manipulate redistribution.
[READ LESS]
Produced by: SkillSoft
Many IP routing challenges can be solved using route redistribution. Having a method to manipulate the redistribution process increases your options and flexibility. There is no one type of route filter that...
[READ MORE]
Many IP routing challenges can be solved using route redistribution. Having a method to manipulate the redistribution process increases your options and flexibility. There is no one type of route filter that is appropriate for every situation. Therefore, the more techniques that you have at your disposal, the better your chances of solving connectivity challenges. To ensure that the network operates efficiently, you often need to control the redistribution process. By implementing filtering mechanisms, you can influence which information is redistributed between different protocols. Controlling the exchange of routing information and routing metrics manipulation enables you to ensure optimal traffic flow within the network. After completing this course, you will be able to use route maps, administrative distance, and route tags to manipulate redistribution.
Many IP routing challenges can be solved using route redistribution. Having a method to manipulate the redistribution process increases your options and flexibility. There is no one type of route filter that is appropriate for every situation. Therefore, the more techniques that you have at your disposal, the better your chances of solving connectivity challenges. To ensure that the network operates efficiently, you often need to control the redistribution process. By implementing filtering mechanisms, you can influence which information is redistributed between different protocols. Controlling the exchange of routing information and routing metrics manipulation enables you to ensure optimal traffic flow within the network. After completing this course, you will be able to use route maps, administrative distance, and route tags to manipulate redistribution.
[READ LESS]
Produced by: SkillSoft
The need for comprehensive remote access security policies is driven by mobility and consumer trends; configuring remote management access in a secure fashion is of paramount importance to ensure the...
[READ MORE]
The need for comprehensive remote access security policies is driven by mobility and consumer trends; configuring remote management access in a secure fashion is of paramount importance to ensure the integrity of networking devices. In this course, you will learn about the AAA security architecture and how to use management access AAA features to secure local and remote access to the network. You will also learn strategies to protect the management plane by limiting access to it, and limiting access to its individual features. How you can use access control lists (ACLs) to filter traffic is also covered.
The need for comprehensive remote access security policies is driven by mobility and consumer trends; configuring remote management access in a secure fashion is of paramount importance to ensure the integrity of networking devices. In this course, you will learn about the AAA security architecture and how to use management access AAA features to secure local and remote access to the network. You will also learn strategies to protect the management plane by limiting access to it, and limiting access to its individual features. How you can use access control lists (ACLs) to filter traffic is also covered.
[READ LESS]
Produced by: SkillSoft
RIP is an interior gateway protocol that is used in smaller networks. It is a distance-vector routing protocol that uses hop count as a routing metric. There are three versions of RIP: RIPv1, RIPv2, and...
[READ MORE]
RIP is an interior gateway protocol that is used in smaller networks. It is a distance-vector routing protocol that uses hop count as a routing metric. There are three versions of RIP: RIPv1, RIPv2, and RIPng. RIPv1 and RIPv2 route in IPv4 networks. RIPng routes in IPv6 networks. EIGRP was developed as an enhanced version of the older IGRP and has many characteristics of the advanced interior gateway protocols, such as high-speed convergence, partial updates, and the possibility to support multiple network-layer protocols. The first step in configuring EIGRP is to establish EIGRP neighbor relationships over the various interface types. It is important to know how to verify these have been properly formed and how parameters like hello and hold timers, and different WAN technologies influence session establishment. The course describes general RIP characteristics as well as how to configure and verify basic RIPng. The course also explains EIGRP operations including EIGRP neighbor relationships and how EIGRP chooses the best path through the network. The course describes the configuration of stub routing, route summarization, and load balancing with EIGRP is detailed. The configuration of basic EIGRP for IPv6 and optimization with route summarization, and configuring EIGRP through named configuration is also covered.
RIP is an interior gateway protocol that is used in smaller networks. It is a distance-vector routing protocol that uses hop count as a routing metric. There are three versions of RIP: RIPv1, RIPv2, and RIPng. RIPv1 and RIPv2 route in IPv4 networks. RIPng routes in IPv6 networks. EIGRP was developed as an enhanced version of the older IGRP and has many characteristics of the advanced interior gateway protocols, such as high-speed convergence, partial updates, and the possibility to support multiple network-layer protocols. The first step in configuring EIGRP is to establish EIGRP neighbor relationships over the various interface types. It is important to know how to verify these have been properly formed and how parameters like hello and hold timers, and different WAN technologies influence session establishment. The course describes general RIP characteristics as well as how to configure and verify basic RIPng. The course also explains EIGRP operations including EIGRP neighbor relationships and how EIGRP chooses the best path through the network. The course describes the configuration of stub routing, route summarization, and load balancing with EIGRP is detailed. The configuration of basic EIGRP for IPv6 and optimization with route summarization, and configuring EIGRP through named configuration is also covered.
[READ LESS]
Produced by: SkillSoft
An IP Security (IPsec) VPN uses the Internet to connect branch offices, remote employees, and business partners to the resources of your company, and VPNs are an integral part of any security architecture....
[READ MORE]
An IP Security (IPsec) VPN uses the Internet to connect branch offices, remote employees, and business partners to the resources of your company, and VPNs are an integral part of any security architecture. Providing confidentiality, integrity, and endpoint authentication, VPNs are ubiquitous and provide data loss prevention mechanisms for data that is in transit at multiple levels. In this course, you will learn about the benefits of VPN implementation and configuration. GRE is a tunneling protocol that can encapsulate a wide variety of protocol packet types inside IP tunnels, creating a virtual point-to-point link to Cisco routers at remote points over an IP internetwork. By connecting multiprotocol subnet in a single-protocol backbone environment, IP tunneling using GRE enables network expansion across a single-protocol backbone environment. After completing this course you will be able to describe GRE tunneling, as well as how to configure, scale, and verify a GRE tunnel.
An IP Security (IPsec) VPN uses the Internet to connect branch offices, remote employees, and business partners to the resources of your company, and VPNs are an integral part of any security architecture. Providing confidentiality, integrity, and endpoint authentication, VPNs are ubiquitous and provide data loss prevention mechanisms for data that is in transit at multiple levels. In this course, you will learn about the benefits of VPN implementation and configuration. GRE is a tunneling protocol that can encapsulate a wide variety of protocol packet types inside IP tunnels, creating a virtual point-to-point link to Cisco routers at remote points over an IP internetwork. By connecting multiprotocol subnet in a single-protocol backbone environment, IP tunneling using GRE enables network expansion across a single-protocol backbone environment. After completing this course you will be able to describe GRE tunneling, as well as how to configure, scale, and verify a GRE tunnel.
[READ LESS]
Produced by: SkillSoft
This course consists of two parts; The first part explains how to secure Cisco routers using recommended practices. The second part explains the benefits of routing protocol authentication and shows how to...
[READ MORE]
This course consists of two parts; The first part explains how to secure Cisco routers using recommended practices. The second part explains the benefits of routing protocol authentication and shows how to configure routing authentication for different routing protocols. It is important to be aware that router security is critical to network security. This course lists recommended steps for securing a Cisco router. This course then focuses on configuring authentication for the routing protocols: EIGRP, OSPF, and BGP. You can prevent your router from receiving false route updates by configuring routing protocol authentication. Authentication options are examined before going into configuration of authentication options for each routing protocol.
This course consists of two parts; The first part explains how to secure Cisco routers using recommended practices. The second part explains the benefits of routing protocol authentication and shows how to configure routing authentication for different routing protocols. It is important to be aware that router security is critical to network security. This course lists recommended steps for securing a Cisco router. This course then focuses on configuring authentication for the routing protocols: EIGRP, OSPF, and BGP. You can prevent your router from receiving false route updates by configuring routing protocol authentication. Authentication options are examined before going into configuration of authentication options for each routing protocol.
[READ LESS]
Produced by: SkillSoft
Certificate-based client authentication is used in EAP-TLS environments. An advantage of using EAP-TLS is the openness of the standard, wide vendor support, and high security. Authorization is performed after...
[READ MORE]
Certificate-based client authentication is used in EAP-TLS environments. An advantage of using EAP-TLS is the openness of the standard, wide vendor support, and high security. Authorization is performed after authentication, when the identity of the client is already established. The authorization attributes that are sent via RADIUS to the network access devices are first configured in the ISE as authorization profiles. In this course, you will learn about certificate-based client authentication. You will also explore Cisco Identity Services Engine (ISE) authorization including how the Cisco ISE performs authorization to assign privileges to client sessions, the use of downloadable ACLs as authorization policy elements, and how Cisco ISE authorization policy rules are used to match conditions and apply authorization profiles.
Certificate-based client authentication is used in EAP-TLS environments. An advantage of using EAP-TLS is the openness of the standard, wide vendor support, and high security. Authorization is performed after authentication, when the identity of the client is already established. The authorization attributes that are sent via RADIUS to the network access devices are first configured in the ISE as authorization profiles. In this course, you will learn about certificate-based client authentication. You will also explore Cisco Identity Services Engine (ISE) authorization including how the Cisco ISE performs authorization to assign privileges to client sessions, the use of downloadable ACLs as authorization policy elements, and how Cisco ISE authorization policy rules are used to match conditions and apply authorization profiles.
[READ LESS]
Produced by: SkillSoft
The Cisco Identity Services Engine is a next-generation identity and access control policy platform that enables enterprises to enforce compliance, enhance infrastructure security, and streamline their...
[READ MORE]
The Cisco Identity Services Engine is a next-generation identity and access control policy platform that enables enterprises to enforce compliance, enhance infrastructure security, and streamline their service operations. The unique architecture of Cisco ISE allows enterprises to gather real-time contextual information from networks, users, and devices. In this course, you will learn about the key components of the Cisco ISE architecture and its function in the network access control solution.
The Cisco Identity Services Engine is a next-generation identity and access control policy platform that enables enterprises to enforce compliance, enhance infrastructure security, and streamline their service operations. The unique architecture of Cisco ISE allows enterprises to gather real-time contextual information from networks, users, and devices. In this course, you will learn about the key components of the Cisco ISE architecture and its function in the network access control solution.
[READ LESS]
Produced by: SkillSoft
The Cisco Identity Services Engine (ISE) has support for features that provide enhanced access control capabilities in the Cisco ISE solution such as authorization, Security Group Access (SGA), MAC Security...
[READ MORE]
The Cisco Identity Services Engine (ISE) has support for features that provide enhanced access control capabilities in the Cisco ISE solution such as authorization, Security Group Access (SGA), MAC Security (MACsec), web authentication, as well as guest services. In this course, you will learn about certificate-based client authentication, Security Group Access (SGA) and MAC Security (MACsec) features that provide enhanced access control capabilities in the Cisco ISE solution. You will also learn about Cisco ISE WebAuth and the guest service features of the Cisco ISE. This course is one of a series in the Skillsoft learning path that covers the objectives for the Implementing Cisco Secure Access Solutions (SISAS) v1.0 (300-208 SISAS) exam.
The Cisco Identity Services Engine (ISE) has support for features that provide enhanced access control capabilities in the Cisco ISE solution such as authorization, Security Group Access (SGA), MAC Security (MACsec), web authentication, as well as guest services. In this course, you will learn about certificate-based client authentication, Security Group Access (SGA) and MAC Security (MACsec) features that provide enhanced access control capabilities in the Cisco ISE solution. You will also learn about Cisco ISE WebAuth and the guest service features of the Cisco ISE. This course is one of a series in the Skillsoft learning path that covers the objectives for the Implementing Cisco Secure Access Solutions (SISAS) v1.0 (300-208 SISAS) exam.
[READ LESS]
Produced by: SkillSoft
To protect against unauthorized access to controlled or confidential information, enterprise networks require an effective network access control embedded within the network infrastructure. The Cisco Identity...
[READ MORE]
To protect against unauthorized access to controlled or confidential information, enterprise networks require an effective network access control embedded within the network infrastructure. The Cisco Identity Services Engine (ISE) is a next-generation identity and access control policy platform that enables enterprises to enforce compliance, enhance infrastructure security, and streamline their service operations. In this course, you will learn about commonly used EAP variants used with 802.1X authentication. You will learn how to configure a Cisco switch for AAA, RADIUS and 802.1X. In addition you will explore the main components of the Cisco ISE architecture, and its role in the network access control solution.
To protect against unauthorized access to controlled or confidential information, enterprise networks require an effective network access control embedded within the network infrastructure. The Cisco Identity Services Engine (ISE) is a next-generation identity and access control policy platform that enables enterprises to enforce compliance, enhance infrastructure security, and streamline their service operations. In this course, you will learn about commonly used EAP variants used with 802.1X authentication. You will learn how to configure a Cisco switch for AAA, RADIUS and 802.1X. In addition you will explore the main components of the Cisco ISE architecture, and its role in the network access control solution.
[READ LESS]
Produced by: SkillSoft
The Cisco Identity Services Engine offers a range of advanced endpoint access control features. You can use them to enforce compliance and enhance infrastructure security. This course discusses the posture,...
[READ MORE]
The Cisco Identity Services Engine offers a range of advanced endpoint access control features. You can use them to enforce compliance and enhance infrastructure security. This course discusses the posture, profiler, and Bring Your Own Device (BYOD) solutions. In this course, you will learn about the posture assessment and the use of NAC agents. You will also learn about the Cisco ISE profiler and the endpoint identity groups as well as the BYOD solution elements and device onboarding.
The Cisco Identity Services Engine offers a range of advanced endpoint access control features. You can use them to enforce compliance and enhance infrastructure security. This course discusses the posture, profiler, and Bring Your Own Device (BYOD) solutions. In this course, you will learn about the posture assessment and the use of NAC agents. You will also learn about the Cisco ISE profiler and the endpoint identity groups as well as the BYOD solution elements and device onboarding.
[READ LESS]
Produced by: SkillSoft
The most secure solution at the access edge is to leverage the intelligence of the network. Cisco offers a host of services designed to enable secure user and host access to enterprise networks. It provides...
[READ MORE]
The most secure solution at the access edge is to leverage the intelligence of the network. Cisco offers a host of services designed to enable secure user and host access to enterprise networks. It provides standards-based network access control at the access layer by using the 802.1X protocol to secure the physical ports where end users connect. 802.1X is an IEEE standard for media-level access control, offering the capability to permit or deny network connectivity, control VLAN access and apply traffic policy, based on user or machine identity. In this course, you will learn about the secure access solution and its key components, such as authentication, authorization, accounting, the identity stores, as well as the main authentication proxy protocols: RADIUS and TACACS+. Additionally, you will explore the 802.1X framework. This course is one of a series in the Skillsoft learning path that covers the objectives for the Implementing Cisco Secure Access Solutions (SISAS) v1.0 (300-208 SISAS) exam.
The most secure solution at the access edge is to leverage the intelligence of the network. Cisco offers a host of services designed to enable secure user and host access to enterprise networks. It provides standards-based network access control at the access layer by using the 802.1X protocol to secure the physical ports where end users connect. 802.1X is an IEEE standard for media-level access control, offering the capability to permit or deny network connectivity, control VLAN access and apply traffic policy, based on user or machine identity. In this course, you will learn about the secure access solution and its key components, such as authentication, authorization, accounting, the identity stores, as well as the main authentication proxy protocols: RADIUS and TACACS+. Additionally, you will explore the 802.1X framework. This course is one of a series in the Skillsoft learning path that covers the objectives for the Implementing Cisco Secure Access Solutions (SISAS) v1.0 (300-208 SISAS) exam.
[READ LESS]
Produced by: SkillSoft
Cisco Adaptive Security Appliance Context Aware Next-Generation Firewalls, or ASA (CX) NGFW provide context-aware security functionality on the Cisco ASA adaptive security appliance platform....
[READ MORE]
Cisco Adaptive Security Appliance Context Aware Next-Generation Firewalls, or ASA (CX) NGFW provide context-aware security functionality on the Cisco ASA adaptive security appliance platform. Context-awareness implies knowledge and control that are based on application (what), location (where), user-device type (how), and user identity (who). In this course you will learn key Cisco ASA (CX) NGFW functions, management architecture, and protocols as well as the basic Cisco Prime Security Manager (PRSM) GUI functions and Cisco ASA (CX) NGFW CLI operations. In addition, you'll learn the caveats of the Cisco (CX) NGFW management interface, and the Cisco (CX) NGFW and Cisco PRSM licensing requirements, as well as how to how to configure Cisco ASA (CX) NGFW policy objects. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
Cisco Adaptive Security Appliance Context Aware Next-Generation Firewalls, or ASA (CX) NGFW provide context-aware security functionality on the Cisco ASA adaptive security appliance platform. Context-awareness implies knowledge and control that are based on application (what), location (where), user-device type (how), and user identity (who). In this course you will learn key Cisco ASA (CX) NGFW functions, management architecture, and protocols as well as the basic Cisco Prime Security Manager (PRSM) GUI functions and Cisco ASA (CX) NGFW CLI operations. In addition, you'll learn the caveats of the Cisco (CX) NGFW management interface, and the Cisco (CX) NGFW and Cisco PRSM licensing requirements, as well as how to how to configure Cisco ASA (CX) NGFW policy objects. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
[READ LESS]
Produced by: SkillSoft
The Cisco Prime Security Manager (PRSM) includes a variety of dashboards with different reports to provide Cisco Adaptive Security Appliance Context Aware Next Generation Firewall, or ASA (CX) NGFW...
[READ MORE]
The Cisco Prime Security Manager (PRSM) includes a variety of dashboards with different reports to provide Cisco Adaptive Security Appliance Context Aware Next Generation Firewall, or ASA (CX) NGFW information about device health, performance, and network usage. In this course you will learn how to monitor the Cisco ASA (CX) NGFW, using the Cisco PRSM dashboards, reports, and event viewer and how to configure Cisco ASA (CX) NGFW access and identity policies. You'll also learn how to configure Cisco ASA (CX) NGFW decryption policies in order to detect and control what users are doing on the network. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
The Cisco Prime Security Manager (PRSM) includes a variety of dashboards with different reports to provide Cisco Adaptive Security Appliance Context Aware Next Generation Firewall, or ASA (CX) NGFW information about device health, performance, and network usage. In this course you will learn how to monitor the Cisco ASA (CX) NGFW, using the Cisco PRSM dashboards, reports, and event viewer and how to configure Cisco ASA (CX) NGFW access and identity policies. You'll also learn how to configure Cisco ASA (CX) NGFW decryption policies in order to detect and control what users are doing on the network. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
[READ LESS]
Produced by: SkillSoft
Web security threats have become more sophisticated, targeted, and harder to avoid, yet the use of personal devices and cloud-delivered services limit your visibility and control. Cisco Cloud Web Security...
[READ MORE]
Web security threats have become more sophisticated, targeted, and harder to avoid, yet the use of personal devices and cloud-delivered services limit your visibility and control. Cisco Cloud Web Security (CWS), formerly known as ScanSafe, delivers web security and control for organizations of all sizes, with multiple deployment options and tight integration into your Cisco data center, network, or branch office. In this course, you will learn how to deploy Cloud Web Security and redirect traffic to the cloud. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
Web security threats have become more sophisticated, targeted, and harder to avoid, yet the use of personal devices and cloud-delivered services limit your visibility and control. Cisco Cloud Web Security (CWS), formerly known as ScanSafe, delivers web security and control for organizations of all sizes, with multiple deployment options and tight integration into your Cisco data center, network, or branch office. In this course, you will learn how to deploy Cloud Web Security and redirect traffic to the cloud. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
[READ LESS]
Produced by: SkillSoft
Cisco E-mail Security Appliance (ESA) protects the e-mail infrastructure and employees who use e-mail at work by providing high-availability e-mail protection against the constant, dynamic, and rapidly...
[READ MORE]
Cisco E-mail Security Appliance (ESA) protects the e-mail infrastructure and employees who use e-mail at work by providing high-availability e-mail protection against the constant, dynamic, and rapidly changing threats affecting e-mail today. The appliance combines best-in-class technologies to prevent and respond to multilevel threats and integrates into existing e-mail infrastructures with a high degree of flexibility. In this course, you will learn about Cisco ESA services and the basic configuration components required to set up the Cisco ESA. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
Cisco E-mail Security Appliance (ESA) protects the e-mail infrastructure and employees who use e-mail at work by providing high-availability e-mail protection against the constant, dynamic, and rapidly changing threats affecting e-mail today. The appliance combines best-in-class technologies to prevent and respond to multilevel threats and integrates into existing e-mail infrastructures with a high degree of flexibility. In this course, you will learn about Cisco ESA services and the basic configuration components required to set up the Cisco ESA. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
[READ LESS]
Produced by: SkillSoft
Protecting your business assets is becoming more complicated as applications become more dynamic and as more users access enterprise and cloud-based resources from mobile devices. Cisco traditional and next...
[READ MORE]
Protecting your business assets is becoming more complicated as applications become more dynamic and as more users access enterprise and cloud-based resources from mobile devices. Cisco traditional and next generation Intrusion Prevention System (IPS) solutions can identify and mitigate attacks with market-leading, context-aware threat prevention that augments your firewall and VPN deployments. Cisco IPS devices intelligently determine the best response by looking at multiple factors, including the network reputation of an incoming flow's source, the target's value to the organization, the target's operating system, and the user identity associated with the flow. In this course you'll learn basic definitions and approaches to traditional intrusion prevention/detection systems and next generation IPS, including learning how to configure different Cisco IPS sensor interface modes and Cisco IPS. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
Protecting your business assets is becoming more complicated as applications become more dynamic and as more users access enterprise and cloud-based resources from mobile devices. Cisco traditional and next generation Intrusion Prevention System (IPS) solutions can identify and mitigate attacks with market-leading, context-aware threat prevention that augments your firewall and VPN deployments. Cisco IPS devices intelligently determine the best response by looking at multiple factors, including the network reputation of an incoming flow's source, the target's value to the organization, the target's operating system, and the user identity associated with the flow. In this course you'll learn basic definitions and approaches to traditional intrusion prevention/detection systems and next generation IPS, including learning how to configure different Cisco IPS sensor interface modes and Cisco IPS. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
[READ LESS]
Produced by: SkillSoft
The Cisco SensorBase correlates real-time data from more than 1.5 million devices around the world to create network reputation scores that enable Cisco IPS devices to block threats from known malicious hosts...
[READ MORE]
The Cisco SensorBase correlates real-time data from more than 1.5 million devices around the world to create network reputation scores that enable Cisco IPS devices to block threats from known malicious hosts before they pass through the IPS inspection process. In this course, you'll learn how to describe some methodologies for tuning a Cisco IPS sensor to properly manage false positive and negative events, including the methods and configuration procedures to create custom signatures on a Cisco IPS sensor. In addition, you'll learn how to enable the anomaly detection functionality and the reputation-based feature on the Cisco IPS sensor. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
The Cisco SensorBase correlates real-time data from more than 1.5 million devices around the world to create network reputation scores that enable Cisco IPS devices to block threats from known malicious hosts before they pass through the IPS inspection process. In this course, you'll learn how to describe some methodologies for tuning a Cisco IPS sensor to properly manage false positive and negative events, including the methods and configuration procedures to create custom signatures on a Cisco IPS sensor. In addition, you'll learn how to enable the anomaly detection functionality and the reputation-based feature on the Cisco IPS sensor. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
[READ LESS]
Produced by: SkillSoft
Determining how web traffic will be sent to the Cisco Web Security Appliance (WSA) is often perceived as the most challenging portion of the Cisco WSA integration, since it involves devices outside the WSA....
[READ MORE]
Determining how web traffic will be sent to the Cisco Web Security Appliance (WSA) is often perceived as the most challenging portion of the Cisco WSA integration, since it involves devices outside the WSA. In this course, you will learn Cisco WSA deployment approaches while exploring Cisco WSA key features and supported policies. You'll also learn how to configure identities and user authentication on the Cisco WSA. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
Determining how web traffic will be sent to the Cisco Web Security Appliance (WSA) is often perceived as the most challenging portion of the Cisco WSA integration, since it involves devices outside the WSA. In this course, you will learn Cisco WSA deployment approaches while exploring Cisco WSA key features and supported policies. You'll also learn how to configure identities and user authentication on the Cisco WSA. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
[READ LESS]
Produced by: SkillSoft
The Cisco ESA uses two different sets of mail policies for message content security allowing different security rules to be defined for messages sent to your users and messages sent from your users. In this...
[READ MORE]
The Cisco ESA uses two different sets of mail policies for message content security allowing different security rules to be defined for messages sent to your users and messages sent from your users. In this course, you will learn how to configure the different features within the incoming and outgoing mail policies; anti-spam, anti-virus, content filters, outbreak filters, and data loss prevention. You will also be able to describe the reporting functions and the tools used for troubleshooting the mail processing flows. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
The Cisco ESA uses two different sets of mail policies for message content security allowing different security rules to be defined for messages sent to your users and messages sent from your users. In this course, you will learn how to configure the different features within the incoming and outgoing mail policies; anti-spam, anti-virus, content filters, outbreak filters, and data loss prevention. You will also be able to describe the reporting functions and the tools used for troubleshooting the mail processing flows. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
[READ LESS]
Produced by: SkillSoft
Cisco Web Security Appliance (WSA) enables you to control user access based on the web server category of a particular HTTP or HTTPS request. Using access policy groups, you can create access policies that...
[READ MORE]
Cisco Web Security Appliance (WSA) enables you to control user access based on the web server category of a particular HTTP or HTTPS request. Using access policy groups, you can create access policies that control access to websites containing objectionable or questionable content. The sites that are blocked, allowed, or decrypted depend on the categories that you select when you set up URL category filtering within each policy group. In this course, you will learn acceptable use controls provided by the Cisco WSA and the anti-malware feature and its implementation on the Cisco WSA. You will also learn how to configure decryption policies on Cisco Web Security Appliance and the data security controls available on the Cisco WSA. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
Cisco Web Security Appliance (WSA) enables you to control user access based on the web server category of a particular HTTP or HTTPS request. Using access policy groups, you can create access policies that control access to websites containing objectionable or questionable content. The sites that are blocked, allowed, or decrypted depend on the categories that you select when you set up URL category filtering within each policy group. In this course, you will learn acceptable use controls provided by the Cisco WSA and the anti-malware feature and its implementation on the Cisco WSA. You will also learn how to configure decryption policies on Cisco Web Security Appliance and the data security controls available on the Cisco WSA. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
[READ LESS]
Produced by: SkillSoft