Integrated Threat Defense Investigation and Mitigation Training (SECUR202)
Integrated Threat Defense Investigation and Mitigation Training (SECUR202) Course with Hands-On Exercises (Online, Onsite and Classroom Live)
- Cisco Learning Credits: 20 CLC
The Integrated Threat Defense Investigation and Mitigation Training (SECUR202) course is an instructor-led, lab-based, hands-on course offered by Cisco® Learning Services. The overall course goal is to enable students to identify, isolate, and mitigate network threats using the Cisco Integrated Threat Defense solution platforms. This course is the second in a pair of courses covering the Cisco Integrated Threat Defense solution.
This course will introduce students to network threat investigation and then reinforce student learning through a series of lab scenarios designed to identify relationships between the Cisco products and the stages of the attack lifecycle.
Duration: 2 days
RESOURCES
- Integrated Threat Defense Investigation and Mitigation Training (SECUR202) – https://www.wiley.com/
- Integrated Threat Defense Investigation and Mitigation (SECUR202) – https://www.packtpub.com/
- Integrated Threat Defense Investigation and Mitigation (SECUR202) – https://store.logicaloperations.com/
- Integrated Threat Defense Investigation and Mitigation (SECUR202) – https://us.artechhouse.com/
- Integrated Threat Defense Investigation and Mitigation (SECUR202) – https://www.amazon.com/
RELATED COURSES
- Cisco Stealthwatch Network (SNO)
- Cisco Stealthwatch for System Administrators Training (SSA)
- Cisco Stealthwatch Tuning Training (SWAT)
- Implementing an Integrated Threat Defense Solution Training (SECUR201)
CUSTOMIZE It
- We can adapt this Integrated Threat Defense Investigation and Mitigation (SECUR202) course to your group’s background and work requirements at little to no added cost.
- If you are familiar with some aspects of this Integrated Threat Defense Investigation and Mitigation (SECUR202) course, we can omit or shorten their discussion
- We can adjust the emphasis placed on the various topics or build the Integrated Threat Defense Investigation and Mitigation (SECUR202) Course around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Integrated Threat Defense Investigation and Mitigation (SECUR202) course in manner understandable to lay audiences.
AUDIENCE/TARGET GROUP
This course is designed for technical professionals who need to know how to use a deployed Integrated Threat Defense (ITD) network solution to identify, isolate, and mitigate network threats. The primary audience for this course includes:
- Network analysts
- Network investigators
CLASS PREREQUISITES
The knowledge and skills that a student must have before attending this course are as follows:
- Technical understanding of TCP/IP networking and network architecture
- Technical understanding of security concepts and protocols
- Familiarity with Cisco Identity Services Engine, Cisco Stealthwatch®, Cisco Firepower®, and Cisco AMP for Endpoints is an advantage
Integrated Threat Defense Investigation and Mitigation Training (SECUR202) - OBJECTIVES
Upon completing this Integrated Threat Defense Investigation and Mitigation (SECUR202) course, learners will be able to meet these objectives:
- Describe the stages of the network attack lifecycle and identify ITD solution platform placement based on a given stage
- Detail how to locate and mitigate email malware attacks
- Describe email phishing attacks and the steps taken to locate and mitigate them on the network
- Identify and mitigate data exfiltration threats on the network
- Identify malware threats on the network and mitigate those threats after investigation
Integrated Threat Defense Investigation and Mitigation Training (SECUR202) - COURSE SYLLABUS
Module 1: Network Threat Investigation Introduction
- Network Attack Introduction
- Hunting Network Threats in the Enterprise
Module 2: Investigation and Mitigation of Email Malware Threats
- Examining Email Malware Threats
- Investigating and Verifying Email Malware Threat Mitigation
Module 3: Investigation and Mitigation of Email Phishing Threats
- Examining Email Phishing Attacks
- Configuring Cisco ESA for URL and Content Filtering
- Investigating and Verifying Email Phishing Threat Mitigation
Module 4: Investigation and Mitigation of Data Exfiltration Threats
- Exploiting Vulnerable Network Servers
- Investigating Data Exfiltration Threats
- Mitigating and Verifying Data Exfiltration Threats
Module 5: Investigation and Mitigation of Malware Threats
- Examining Endpoint Malware Protection
- Investigating and Mitigating Endpoint Malware Threats
Integrated Threat Defense Investigation and Mitigation (SECUR202) Course Wrap-Up
Whether you are looking for general information or have a specific question, we want to help.
Request More Information