- Course
Operationalizing Cisco Firepower
As threats become more and more complicated, security tools need to be customized for the environment they are in. Understanding how to operationalize Firepower will enable you to maximize its efficiency and your ability to protect your network.
- Course
Operationalizing Cisco Firepower
As threats become more and more complicated, security tools need to be customized for the environment they are in. Understanding how to operationalize Firepower will enable you to maximize its efficiency and your ability to protect your network.
Get started today
Access this course and other top-rated tech content with one of our business plans.
Try this course for free
Access this course and other top-rated tech content with one of our individual plans.
This course is included in the libraries shown below:
- Core Tech
What you'll learn
Imagine that you have Firepower deployment in your environment and you've been tasked to tune your deployment. In this course, Operationalizing Cisco Firepower, you will learn how to optimize your Firepower deployment. First, you will learn how to tune Firepower's IPS rules and policy layers. Next, you will discover how to use Firepower's Application Visibility and Control (AVC) as well as custom application creation. Then, you will figure out how to use correlation policies to take actions based on certain triggers and traffic profile changes. Finally, you will explore how to operationalize Firepower using custom dashboards, reports, and troubleshooting tools both in the GUI and the command line. When you're finished with this course, you will have the skills and knowledge of Cisco Firepower to operationalize your deployment.
Operationalizing Cisco Firepower
-
Describe the Anatomy of a SNORT Rule | 5m 39s
-
Demo: Custom SNORT Rule Creation | 3m 9s
-
Describe Intrusion Rule Tuning | 1m 35s
-
Demo: Tuning Individual Intrusion Rules | 10m 24s
-
Describe the Network Analysis Policy | 5m 32s
-
Demo: Network Analysis Policy | 3m 54s
-
Describe Intrusion Policy Layers | 2m 47s
-
Demo: Intrusion Policy Layers | 13m 23s