Implementing Cisco Threat Control Solutions v1.5 - SITCS (Professional) Course and Training | NetComLearning

Implementing Cisco Threat Control Solutions v1.5 - SITCS (Professional)

Implementing Cisco Threat Control Solutions v1.5 - SITCS (Professional) Course Description

Duration: 5.00 days (40 hours)

Price: $3,795.00

Cisco Career Guide

Implementing Cisco Threat Control Solutions v1.5 - SITCS (Professional) course provides network professional with the knowledge to implement Cisco FirePOWER NGIPS (Next-Generation Intrusion Prevention System) and Cisco AMP (Advanced Malware Protection), as well as Web Security, Email Security and Cloud Web Security. You will gain hands-on experience configuring various advance Cisco security solutions for mitigating outside threats and securing traffic traversing the firewall.

Exam Format
Exam Number: 300-210 SITCS
Associated Certifications: CCNP Security
Duration: 90 minutes (65-75 questions)
Exam Registration: Pearson VUE


Note: E-learning module (Cisco Digital Learning Library) is also available for this course Click here for more details

Next Class Dates

Nov 27, 2017 – Dec 1, 2017
9:00 AM – 5:00 PM CT
Feb 19, 2018 – Feb 23, 2018
9:00 AM – 5:00 PM CT
May 14, 2018 – May 18, 2018
9:00 AM – 5:00 PM CT
Aug 6, 2018 – Aug 10, 2018
9:00 AM – 5:00 PM CT

View More Schedules »

Contact us to customize this class with your own dates, times and location. You can also call 1-888-563-8266 or chat live with a Learning Consultant.

Back to Top

Intended Audience for this Implementing Cisco Threat Control Solutions v1.5 - SITCS (Professional) Course

  • » Channel Partners
  • » Customers
  • » Employees

Back to Top

Course Prerequisites for Implementing Cisco Threat Control Solutions v1.5 - SITCS (Professional)

  • » CCNA Security Certification
  • » Any CCIE certification can act as a prerequisite

Back to Top

This Course is also part of:

Back to Top

Implementing Cisco Threat Control Solutions v1.5 - SITCS (Professional) Course Objectives

  • » Describe and implement Cisco Web Security Appliance
  • » Describe and implement Cloud Web Security
  • » Describe and implement Cisco Email Security Appliance
  • » Describe and implement Advanced Malware Protection
  • » Describe and implement Cisco FirePOWER Next-Generation IPS
  • » Describe and implement Cisco ASA FirePOWER Services Module

Back to Top

Implementing Cisco Threat Control Solutions v1.5 - SITCS (Professional) Course Outline

      1. Cisco Web Security Appliance
        1. Describing the Cisco Web Security Appliance Solutions
          1. Cisco Modular Network Architecture and Cisco WSA
          2. Cisco WSA Overview
          3. Cisco WSA Architecture
          4. Cisco WSA Malware Detection and Protection
          5. Cisco Web-Based Reputation Score
          6. Cisco WSA Acceptable Use Policy Enforcement
          7. Cisco WSA GUI Management
          8. Cisco WSA Committing the Configuration Changes
          9. Cisco WSA Policy Types Overview
          10. Cisco WSA Access Policies
          11. Cisco WSA Identity: To Whom Does This Policy Apply?
          12. Cisco WSA Identity Example
          13. Cisco WSA Policy Assignment Using Identity
          14. Cisco WSA Identity and Authentication
          15. Cisco WSA Policy Trace Tool
        2. Integrating the Cisco Web Security Appliance
          1. Explicit vs. Transparent Proxy Mode
          2. Explicit Proxy Mode
          3. PAC Files
          4. PAC File Deployment Options
          5. PAC File Hosting on Cisco WSA
          6. Traffic Redirection In Transparent Mode
          7. Connecting the Cisco WSA to a WCCP Router
          8. Verifying WCCP
        3. Configuring Cisco Web Security Appliance Identities and User Authentication Controls
          1. Configure Identities to Group Client Transactions
          2. Configure Policy Groups
          3. The Need for User Authentication
          4. Authentication Protocols and Schemes
          5. Basic Authentication in Explicit Proxy and Transparent Proxy Mode
          6. Configure Realms and Realm Sequences
          7. Configure NTLM Realm for Active Directory
          8. Join Cisco WSA to Active Directory
          9. Configure Global Authentication Settings
          10. Configure an Identity to Require Authentication (Basic or NTLMSSP)
          11. Configure an Identity to Require Transparent User Identification
          12. Configure LDAP Realm for LDAP Servers
          13. Define How User Information Is Stored in LDAP
          14. Bind Cisco WSA to the LDAP Directory
          15. LDAP Group Authorization
          16. Allowing Guest Access to Users Who Fail Authentication
          17. Testing Authentication Settings
          18. Authenticated Users in Reports
        4. Configuring Cisco Web Security Appliance Acceptable Use Controls
          1. Acceptable Use Controls
          2. URL Categorizing Process
          3. Application Visibility and Control Overview
          4. Streaming Media Bandwidth Control Overview
          5. Enable Acceptable Use Controls
          6. Using the Policies Table
          7. Configure URL Filtering
          8. Enable Safe Search and Site Content Ratings
          9. Configure Custom URL Categories
          10. URL Category Reports
          11. Configuring AVC
          12. Configure Media Bandwidth Limits
          13. AVC Reports
        5. Configuring Cisco Web Security Appliance Anti-Malware Controls
          1. Dynamic Vectoring and Streaming Engine Overview
          2. Contrast Webroot with Sophos or McAfee Malware Scanning
          3. Adaptive Scanning Overview
          4. Web Reputation Filtering Overview
          5. Enable Web Reputation Filtering, Adaptive Scanning and Malware Scanning
          6. Configure Inbound Web Reputation Filtering and Malware Scanning
          7. Configure Outbound Malware Scanning
          8. Malware Reports
        6. Configuring Cisco Web Security Appliance Decryption
          1. HTTPS Proxy Operations Overview
          2. Enable HTTPS Proxy
          3. Invalid Destination Web Server Certificate Handling
          4. Configure Decryption Policies
        7. Configuring Cisco Web Security Appliance Data Security Controls
          1. Cisco WSA Data Security Overview
          2. Data Security Policies
          3. Control Uploaded Content
          4. External Data Loss Prevention
          5. Add an ICAP Server
          6. Challenge
      2. Cisco Cloud Web Security
        1. Describing the Cisco Cloud Web Security Solutions
          1. Cisco Modular Network Architecture and Cisco Cloud Web Security (CWS)
          2. Cisco Cloud Web Security Overview
          3. Cisco Cloud Web Security Traffic Flow Overview
          4. Cisco Cloud Web Security URL Filtering, AVC, and Reporting Features Overview
          5. Cisco Cloud Web Security Scanning Processes and Day Zero Outbreak Intelligence Overview
          6. Cisco ScanCenter Overview
        2. Configuring Cisco Cloud Web Security Connectors
          1. Cisco Cloud Web Security Traffic Redirection Overview
          2. Cisco Cloud Web Security Authentication Key
          3. Authentication Key Generation from the Cisco ScanCenter
          4. Verifying Traffic Redirection to CWS Using Special URL
          5. Cisco ASA Cloud Web Security Overview
          6. Cisco ASA Cloud Web Security Basic Configuration Using ASDM
          7. Cisco ASA Cloud Web Security Basic Configuration Using the CLI
          8. Cisco ASA Cloud Web Security Configuration with the Whitelist and Identity Options Using the CLI
          9. Verifying Cisco ASA Cloud Web Security Operations Using the Cisco ASDM
          10. Verifying Cisco ASA Cloud Web Security Operations Using the CLI
          11. Cisco AnyConnect Web Security Module Overview
          12. Cisco AnyConnect Web Security Module for Standalone Use Overview
          13. Configure Cisco AnyConnect Web Security Module for Standalone Use
          14. Configure Cisco ASA to Download the Web Security Module to the Client Machine
          15. Verifying Cisco AnyConnect Web Security Module Operations
          16. Cisco ISR G2 Cloud Web Security Overview
          17. Cisco ISR G2 Cloud Web Security Configuration
          18. Cisco ISR G2 Cloud Web Security Verification
          19. Cisco WSA Cloud Web Security Overview
        3. Describing the Web Filtering Policy in Cisco ScanCenter
          1. ScanCenter Web Filtering Policy Overview
          2. ScanCenter Web Filtering Policy Configuration HTTPS Inspection Configuration Overview
          3. ScanCenter Web Filtering Verification
          4. ScanCenter Web Filtering Reporting
      3. Cisco Email Security Appliance
        1. Describing the Cisco Email Security Solutions
          1. Cisco Modular Network Architecture and Cisco ESA
          2. Cisco Hybrid Email Security Solution Overview
          3. SMTP Terminologies
          4. SMTP Flow
          5. SMTP Conversation
          6. Cisco ESA Services Overview
          7. Cisco ESA GUI Management
          8. Cisco ESA Committing the Configuration Changes
          9. Cisco ESA Licensing
          10. Incoming Mail Processing Overview
          11. Outgoing Mail Processing Overview
          12. Cisco ESA LDAP Integration Overview
          13. Cisco Registered Envelope Service (CRES) Overview
        2. Describing the Cisco Email Security Appliance Basic Setup Components
          1. Cisco ESA Listener Overview
          2. Cisco ESA Listener Type: Private and Public
          3. Cisco ESA One Interface/One Listener Deployment Example
          4. Cisco ESA Two Interfaces/Two Listeners Deployment Example
          5. Cisco ESA Listener Major Components: HAT and RAT
          6. Cisco ESA One Listener Deployment Scenario
          7. One Listener Deployment Scenario: Interfaces and Listener
          8. One Listener Deployment Scenario: LDAP Accept Query
          9. One Listener Deployment Scenario: HAT
          10. One Listener Deployment Scenario: HAT > Sender Group
          11. One Listener Deployment Scenario: HAT > Sender Group SBRS
          12. One Listener Deployment Scenario: HAT > BLACKLIST Sender Group
          13. One Listener Deployment Scenario: HAT > RELAYLIST Sender Group
          14. One Listener Deployment Scenario: HAT > Add Sender Group
          15. One Listener Deployment Scenario: HAT > Mail Flow Policy
          16. One Listener Deployment Scenario: HAT > Mail Flow Policy > Anti-Spam and Anti-Virus
          17. One Listener Deployment Scenario: HAT > Mail Flow Policies Summary
          18. One Listener Deployment Scenario: RAT
          19. One Listener Deployment Scenario: SMTP Routes
          20. One Listener Deployment Scenario: Email Relaying on Internal Mail Server
        3. Configuring Cisco Email Security Appliance Basic Incoming and Outgoing Mail Policies
          1. Cisco ESA Incoming and Outgoing Mail Policies Overview
          2. Cisco ESA Mail Policies Matching
          3. Anti-Spam Overview
          4. Anti-Spam Configuration
          5. Spam Quarantine Configuration
          6. Policy, Virus, Outbreak Quarantines Configuration
          7. Anti-Virus Overview
          8. Anti-Virus Configuration
          9. Content Filters Overview
          10. Content Filters Configuration
          11. Outbreak Filters Overview
          12. Outbreak Filters Configuration
          13. Data Loss Prevention Overview
          14. Data Loss Prevention Configuration
          15. Reporting Overview
          16. Message Tracking
          17. Trace
      4. Advanced Malware Protection for Endpoints
        1. AMP for Endpoints Overview and Architecture
          1. Modern Malware
          2. Why Defenses Fail
          3. Introduction to AMP for Endpoints
          4. AMP for Endpoints Architecture
          5. AMP Connector Architecture
          6. Installation Components
          7. How AMP Connector Components Interact
          8. The Role of the AMP Cloud
          9. Transaction Processing
          10. Additional Transaction Processing
          11. Real-time Data Mining
          12. Private Cloud Architecture
          13. Private Cloud Modes
          14. Cloud Proxy Mode Communications
          15. Air Gap Mode
        2. Customizing Detection and AMP Policy
          1. Detection, Application Control, DFC Options, and IOCs
          2. Endpoint Policy
          3. Policy Modes
          4. Simple Custom Detections
          5. Creating A Simple Custom Detection
          6. Application Blocking
          7. Advanced Custom Signatures
          8. Whitelisting
          9. Android Custom Detections
          10. DFC IP Blacklists and Whitelists
          11. DFC IP Blacklists
          12. DFC IP Whitelists
          13. Configuring Exclusions
          14. Custom Exclusion Sets
        3. IOCs and IOC Scanning
          1. Indications of Compromise (IOCs)
          2. IOC Scanning
          3. Customizing IOCs
        4. Deploying AMP Connectors
          1. Groups
          2. Creating Groups
          3. Deploying Windows Connectors
          4. Direct Download Deployment
          5. Creating the Installer (Public Cloud)
          6. Email Deployment
          7. Microsoft Windows Installation and Interface
          8. Connectivity Considerations
          9. Command-Line Installation
        5. AMP Analysis Tools
          1. Event View Filters
          2. Events List
          3. Event Detail: File Detection
          4. Event Detail: Connector Info
          5. Event Detail: Comments
          6. File Analysis
          7. The File Analysis Page
          8. File Analysis Results
          9. File Repository
          10. Trajectory
          11. File Trajectory Page
          12. Device Trajectory
          13. Device Trajectory Filters and Search
          14. Prevalence
          15. Vulnerable Software
          16. Reporting
          17. Creating a Report
      5. Cisco FirePOWER Next-Generation IPS
        1. Describing the Cisco FireSIGHT System
          1. Cisco FireSIGHT System Overview
          2. Cisco FirePOWER NGIPS and NGFW
          3. Cisco FireSIGHT System Detection and Architecture
          4. Cisco FireSIGHT System Components
          5. Cisco FireSIGHT System Device Configuration
          6. Traffic Flows
        2. Configuring and Managing Cisco FirePOWER Devices
          1. Introduction to Device Management
          2. Interfaces Tab
          3. Virtual Device Configuration
          4. Static Route Configuration
          5. Object Management
        3. Implementing an Access Control Policy
          1. Access Control Policy Overview
          2. Access Control Policy Configuration
          3. Default Action
          4. Targets Tab
          5. Security Intelligence
          6. HTTP Responses
          7. Advanced Tab
          8. Access Control Policy Rules
          9. Rule Constraints Overview
          10. Save and Apply the Access Control Policy
        4. Understanding Discovery Technology
          1. Introduction to Host Discovery
          2. Network Discovery Policy
          3. Discovery Overview
        5. Configuring File-Type and Network Malware Detection
          1. Introduction to Network-Based Malware Detection
          2. Network-Based Malware Detection Overview
          3. File Dispositions
          4. Important Network-Based Malware Detection Concepts
          5. Retrospective Event Overview
          6. Cisco FireSIGHT File-Type Detection Architecture
          7. Cisco FireSIGHT Malware Detection Architecture
          8. File Disposition Caching
          9. File Lists
          10. File Policy
        6. Managing SSL Traffic with Cisco FireSIGHT
          1. SSL Traffic Management Overview
          2. SSL Inspection Architecture
          3. Cisco FireSIGHT SSL Inspection
          4. SSL Policy
        7. Describing IPS Policy and Configuration Concepts
          1. Introduction to IPS Policy
          2. Policy Layering Model
          3. Rule Management
          4. Cisco FireSIGHT Rule Recommendations
          5. IPS Policy Layering
        8. Describing the Network Analysis Policy
          1. Network Analysis Policy Introduction
          2. Network Analysis Policy Customization
          3. Preprocessors
          4. Network Analysis Policy Configuration
          5. Network Analysis Policy Creation
          6. Preprocessor Configuration
        9. Creating Reports
          1. Reporting System Overview
          2. Report Templates
          3. Report Sections
          4. Advanced Settings
        10. Describing Correlation Rules and Policies
          1. Correlation Policies Overview
          2. Correlation Policy Responses
          3. Remediations Configuration
          4. Remediation Module Configuration
          5. Correlation Policy Rules
          6. Correlation Policies Overview
          7. Correlation Events
          8. Whitelists Overview
          9. Whitelist Events and Violations
          10. Traffic Profiles Overview
          11. Traffic Profiles in Correlation Policies
        11. Understanding Basic Rule Syntax and Usage
          1. Basic Snort Rule Structure
          2. Snort Rule Headers
          3. Snort Rule Bodies
      6. Cisco ASA FirePOWER Services Module
        1. Installing Cisco ASA 5500-X Series FirePOWER Services (SFR) Module
          1. Cisco ASA FirePOWER Services (SFR) Module Overview
          2. Cisco FireSIGHT Management Center Overview
          3. Cisco ASA FirePOWER Services Software Module Management Interface
          4. Cisco ASA FirePOWER Services Module Package Installation
          5. Cisco ASA FirePOWER Services Module Verification
          6. Redirect Traffic to Cisco ASA FirePOWER Services Module
      7. Lab
        1. Configure Cisco Web Security Appliance Explicit Proxy and User Authentication Web-related connectivity.
        2. Configure Cisco Web Security Appliance Acceptable Use Controls
        3. Configure Cisco Email Security Appliance Basic Policies
        4. Accessing the AMP Public Cloud Console
        5. Customizing Detection and AMP Policy
        6. IOCs and IOC Scanning
        7. Deploying AMP Connectors
        8. AMP Analysis Tools
        9. Configure Inline Interfaces and Create Objects
        10. Create Access Control Policy Rules
        11. Configure Network Discovery Detection
        12. Create a File Policy
        13. Create an Intrusion Policy
        14. Create a Network Analysis Policy
        15. Compare Trends
        16. Create Correlation Policies

Back to Top

This training prepares students for the following exam(s):

  • » 300-210 : Implementing Cisco Threat Control Solutions v1.5 - SITCS

Back to Top

Do you have the right background for Implementing Cisco Threat Control Solutions v1.5 - SITCS (Professional)?

Skills Assessment

We ensure your success by asking all students to take a FREE Skill Assessment test. These short, instructor-written tests are an objective measure of your current skills that help us determine whether or not you will be able to meet your goals by attending this course at your current skill level. If we determine that you need additional preparation or training in order to gain the most value from this course, we will recommend cost-effective solutions that you can use to get ready for the course.

Our required skill-assessments ensure that:

  1. All students in the class are at a comparable skill level, so the class can run smoothly without beginners slowing down the class for everyone else.
  2. NetCom students enjoy one of the industry's highest success rates, and pass rates when a certification exam is involved.
  3. We stay committed to providing you real value. Again, your success is paramount; we will register you only if you have the skills to succeed.
This assessment is for your benefit and best taken without any preparation or reference materials, so your skills can be objectively measured.

Take your FREE Skill Assessment test »

Back to Top

Award winning, world-class Instructors

David M.
- Networking expert with several Cisco certifications, including CCENT, CCNA, CCDA, CCSI, and CCVP. - Has taught over 90 courses at NetCom Learning. - Average rating of 8.75 out of 9 on student evaluation reports.

Bio:

David has been in the Networking field for the past eleven years and holds several Cisco certifications. He has been an instructor since 2005 and has taught over 90 courses at NetCom Learning.

David is an extremely enthusiastic trainer with a raw passion towards teaching and delivering Cisco information and takes great pride in his career as an instructor, which has lead him to develop and deliver the class in his own unique way; very professional and knowledgeable, yet pleasant and enjoyable. His classes have a high passing rate for students taking certification exams, and averages 8.75 out of 9 on evaluation reports.
Michael G.
- Over 22 years of professional experience in the IT field, including more than a decade as a Certified Trainer.
- An expert in Cisco's Routing, Switching, Security, Voice and Wireless areas, as well as select Microsoft, Novell, CompTIA, Sun and CWNP courses.
- High-skilled and acclaimed instructor. Has trained over 900 students at Netcom Learning.

Bio:

Michael has over 22 years of professional experience in the IT field, including more than a decade as a Certified Trainer. An expert in Cisco's Routing, Switching, Security, Voice and Wireless areas, Michael also teaches select Microsoft, Novell, CompTIA, Sun and CWNP courses.

Michael's dedication and passion for teaching is unmatched. He has trained over 900 students at Netcom Learning since 2006 and his evaluation scores average 8.7 out of 9.
William D.
- Bachelors and Masters in Mathematics from University of Pennsylvania, in addition to several IT certifications.
- Over 20 years of experience in the IT industry; background ranges from engineering, administration and escalation support in networks.

Bio:

William is a highly-skilled IT professional with Bachelors and Masters Degree in Mathematics from University of Pennsylvania. He has been working in the IT industry for over 20 years, with experience in engineering, administration and escalation support in networks ranging from small to large scale complex enterprise environments.

As a Cisco and CompTIA Subject Matter Expert, he holds several certifications, including Cisco CCNA, CCNP, and CCIE. William is one of NetCom's top trainers, consistently scoring high marks in student evaluations.

See more...   See more instructors...

Back to Top

Recent Client Testimonials & Reviews

Keep the training content the same way.

- Mandeep S.
Course(s) Taken

» Interconnecting Cisco Networking Devices, Part 1 v 3.0 - ICND1 (Entry)

Great caring professor and he offered to stay late always, truly cares for students.

- Jose T.
Course(s) Taken

» Interconnecting Cisco Networking Devices, Part 1 v 3.0 - ICND1 (Entry)

  More testimonials »  

Back to Top

Ways to contact us

Back to Top