SFWIPF 1.0 – Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention

Categories: Cisco
Wishlist Share
Share Course
Page Link
Share On Social Media

What Will You Learn?

  • In this course, you will learn how to:
  • Describe Cisco Secure Firewall Threat Defense
  • Describe Cisco Secure Firewall Threat Defense Deployment Options
  • Describe management options for Cisco Secure Firewall Threat Defense
  • Configure basic initial settings on Cisco Secure Firewall Threat Defense
  • Configure high availability on Cisco Secure Firewall Threat Defense
  • Configure basic Network Address Translation on Cisco Secure Firewall Threat Defense
  • Describe Cisco Secure Firewall Threat Defense policies and explain how different policies influence packet processing through the device
  • Configure Discovery Policy on Cisco Secure Firewall Threat Defense
  • Configure and explain prefilter and tunnel rules in the prefilter policy
  • Configure an access control policy on Cisco Secure Firewall Threat Defense
  • Configure security intelligence on Cisco Secure Firewall Threat Defense
  • Configure file policy on Cisco Secure Firewall Threat Defense
  • Configure Intrusion Policy on Cisco Secure Firewall Threat Defense
  • Perform basic threat analysis using Cisco Secure Firewall Management Center
  • Perform basic management and system administration tasks on Cisco Secure Firewall Threat Defense
  • Perform basic traffic flow troubleshooting on Cisco Secure Firewall Threat Defense
  • Manage Cisco Secure Firewall Threat Defense with Cisco Secure Firewall Threat Defense Manager
  • Prerequisites
  • Before taking this offering, you should understand:
  • TCP/IP
  • Basic routing protocols
  • Firewall, VPN, and IPS concepts
  • Certification Information
  • 350-701 SCOR: Implementing and Operating Cisco Security Core Technologies is a 120-minute exam associated with the CCNP Security certification. The multiple-choice format tests knowledge and skills related to implementing and operating core security technologies, including:
  • Network security
  • Cloud security
  • Content security
  • Endpoint protection and detection
  • Secure network access
  • Visibility and enforcement