Cisco Integrated Threat Defense Investigation and Mitigation v1.0 (SECUR202)

4.6 out of 5 rating

Jump to dates

Duration

2 Days

12 CPD hours

This course is intended for

Network analysts
Network investigators
Cisco integrators and partners

Overview

After taking this course, you should be able to:
Describe the stages of the network attack lifecycle and identify ITD solution platform placement based on a given stage
Detail how to locate and mitigate email malware attacks
Describe email phishing attacks and the steps taken to locate and mitigate them on the network
Identify and mitigate data exfiltration threats on the network
Identify malware threats on the network and mitigate those threats after investigation

Description

The Cisco Integrated Threat Defense Investigation and Mitigation (SECUR202) v1.0 course shows you how to identify, isolate, and mitigate network threats using the Cisco© Integrated Threat Defense solution platform. Through expert instruction and lab-based scenarios, you will be introduced to network threat investigation, and learn how to identify relationships between Cisco products and the stages of the attack lifecycle. This course is the second in a pair of courses (SECUR201) covering the Cisco Integrated Threat Defense (ITD) solution.

Network Threat Investigation Introduction
  • Network Attack Introduction
  • Hunting Network Threats in the Enterprise
Investigation and Mitigation of Email Malware Threats
  • Examining Email Malware Threats
  • Investigating and Verifying Email Malware Threat Mitigation
Investigation and Mitigation of Email Phishing Threats
  • Examining Email Phishing Attacks
  • Configuring Cisco Email Security Appliance (ESA) for URL and Content Filtering
  • Investigating and Verifying Email Phishing Threat Mitigation
Investigation and Mitigation of Data Exfiltration Threats
  • Exploiting Vulnerable Network Servers
  • Investigating Data Exfiltration Threats
  • Mitigating and Verifying Data Exfiltration Threats
nvestigation and Mitigation of Malware Threats
  • Examining Endpoint Malware Protection
  • Investigating and Mitigating Endpoint Malware Threats
Training Insurance Included!

When you organise training, we understand that there is a risk that some people may fall ill, become unavailable. To mitigate the risk we include training insurance for each delegate enrolled on our public schedule, they are welcome to sit on the same Public class within 6 months at no charge, if the case arises.

What people say about us


Find out more about this course

Interested in alternative dates? Would like to book a private session of this course for your company? Or for any other queries please simply fill out the form below.