CISCO Iron Port Email Security AppliancesCourse Duration: 25 Hr

Selfpaced Tech is the leader in CISCO Iron Port Email Security Appliances online training courses. We provide quality of online training and corporate training courses by real time faculty and well trained software specialists. Our CISCO Iron Port Email Security Appliances online training is regarded as the best training by students who attended CISCO Iron Port Email Security Appliances online training with us. All our students were happy and able to find Jobs quickly in India, Singapore, Japan, Europe, Canada, Australia, USA and UK. We provide CISCO Iron Port Email Security Appliances online training in India, UK, USA, Singapore and Canada etc..


Rating: 4/5

Course Description

In this hands-on course, you will learn to install, configure, operate, and maintain the C-Series. You will receive in-depth instruction on the most commonly used product features with an emphasis on administration best practices for configuration and operation including clustering, management of email through Cisco Email Security Appliances, configuration of access control policies to eliminate threats at the perimeter, as well as the creation and application of Data Loss Prevention (DLP) polices. You will see how Advanced Malware Protection (AMP) integrates with Email Security Appliance and you will learn how to configure Cisco Email Security Appliances to detect and handle unwanted spam and viruses. You will cover message tracking and reporting to document email traffic trends on the C-Series. You will also learn the fundamental concepts of tracking, reporting, and quarantining on the M-Series. This is formally an Iron Port email and web security gateway and management products, currently referred to as Cisco Email Security and Cisco Web Security.

Course Price: $ 600 $ 530

Features

Live online instructor led sessions by industry veterans. Industry renowed training to boost your resume.
Incredible practicals, workshops, labs, quiz and assignments. Personalized one to one career discussion with the trainer.
Real life case studies and live project to solve real problem Mock interview & resume preparation to excel in interviews
Lifetime access to course, recorded sessions and study materials Premium job assistance and support to step ahead in career

Prerequisites

  • Valid Centralized Management feature key on each ESA that you wish to join into a cluster.
  • Starting with AsyncOS 8.5.6, the feature key is no longer required to enable Centralized Management feature. By default, Centralized Management feature is enabled on your appliance.

Curriculum

  • Customer Use Cases
  • Cisco Web Security Appliance Models and Architecture
  • Review the Cisco Security Management Appliance
  • Install and Verify Cisco Web Security Appliance Hardware
  • Install and Verify the Cisco Web Security Virtual Appliance for VMware
  • Run the system set-up Wizard
  • Configure L4TM
  • Review Cisco Cloud Web Security
  • Connect to Cisco Cloud Web Security Using the Cloud Web Security Connector
  • Contrast Proxy Modes
  • Review PAC Files
  • Configure and Manage Proxy Services
  • Deploy Native FTP Proxy
  • Read Proxy Access Log and HTTP Headers
  • Configure NTLM and Proxy Authentication
  • Identify Authentication Settings and Realms
  • Describe LDAP Authentication and Authorization
  • Troubleshoot Joining Domains and Test Authentication
  • Configure Access Policies and Identities
  • Configure Authentication Exemptions
  • Review Access Log Tag
  • Enable URL Categories and Filters
  • Configure Application Visibility and Control
  • Describe SAAS Access Control
  • Use HTTPS Inspection
  • Configure HTTPS Proxy Settings
  • Configure Application Visibility and Control - Advanced Topics
  • Describe SAAS Access Control - Advanced Topics
  • Configure Web Usage Controls and URL Categories
  • View Logging and Reporting
  • Describe and Configure WBRS
  • Describe and Configure Anti-Malware Scanning
  • Describe and Configure Advanced Malware Protection
  • Interpret ACL Tags Relevant to Anti-Malware
  • Configure Data Security
  • Configure Data Loss Prevention(DLP)
  • Describe Access and Data Security Logs
  • Cisco Cloud Web Security Features and Benefits
  • Explain Cisco Cloud Attach Model
  • Describe Cisco Any Connect Web Security
  • Integrate the Cisco Any Connect Secure Mobility Client
  • Describe Report Administration
  • Monitor the Cisco Web Security Appliance
  • Configure W3C Logging
  • Perform Other Administrative Tasks
  • Describe Hardware Redundancy
  • Troubleshooting the Cisco Web Security Appliance
  • Hardware Challenge Lab 1: Access the Cisco Remote Lab
  • Hardware Challenge Lab 2: Installing and Verifying the Cisco Web Security Appliance
  • Hardware Challenge Lab 3: Deploying Proxy Services
  • Hardware Challenge Lab 4: Utilizing Authentication
  • Hardware Challenge Lab 5: Configuring Cisco WSA Policies
  • Hardware Challenge Lab 6: Enforcing Acceptable Use
  • Hardware Challenge Lab 7: Enforcing Acceptable Use Advanced Topics
  • Hardware Challenge Lab 8: Defending Against Malware
  • Hardware Challenge Lab 9: Configuring Data Security
  • Hardware Challenge Lab 10: Describing Cisco Cloud Web Security
  • Hardware Challenge Lab 11: Performing Administration and Troubleshooting

FAQs

The tools you’ll need to attend training are:
  • Windows: Windows XP SP3 or higher
  • Mac: OSX 10.6 or higher
  • Internet speed: Preferably 512 Kbps or higher
  • Headset, speakers and microphone: You’ll need headphones or speakers to hear instruction clearly, as well as a microphone to talk to others. You can use a headset with a built-in microphone, or separate speakers and microphone.
The trainings are delivered by highly qualified and certified instructors with relevant industry experience.

People from various domains with no prior knowledge of this technology have got successfully trained with us and are now working in the this industry. Though, knowledge of basics is an added advantage.

Get your batch scheduled at your convenient time. Schedule Now