SSNGFW v1.0 – Securing Networks with Cisco Firepower Next-Generation Firewall


Ota yhteyttä

Voit olla meihin yhteydessä ja tiedustella koulutuksistamme täydentämällä yhteystietosi ja koulutuksen nimen oheen.

Tilaa uutiskirje

Haluan tarjouksia ja tietoa koulutuksista sähköpostiini.

Tietosuojalauseke ja yksityisyys

Annan Insoft Services Ltd:lle oikeuden olla minuun yhteydessä. Annan Insoft Servicelle oikeuden käsitellä, kerätä ja tallentaa tietojani. Kaikki annetut tiedot käsitellään tietoturvallisesti tietosuojalausekkeen mukaisesti.

Tulevat päivämäärät

Oct 17 - Oct 21, 2022
09:00 - 17:00

Nov 14 - Nov 18, 2022
09:00 - 17:00

Dec 12 - Dec 16, 2022
09:00 - 17:00

Jan 9 - Jan 13, 2023
09:00 - 17:00

Feb 6 - Feb 10, 2023
09:00 - 17:00

Mar 6 - Mar 10, 2023
09:00 - 17:00

  • SSNGFW v1.0 – Securing Networks with Cisco Firepower Next-Generation Firewall
    5 days  (Instructor Led Online)  |  Security (CLS)

    Course Details


    The Securing Networks with Cisco Firepower Next-Generation Firewall (SSNGFW) v1.0 course shows you how to deploy and use Cisco Firepower® Threat Defense system.

    This hands-on course gives you knowledge and skills to use and configure Cisco® Firepower Threat Defense technology, beginning with initial device setup and configuration and including routing, high availability, Cisco Adaptive Security Appliance (ASA) to Cisco Firepower Threat Defense migration, traffic control, and Network Address Translation (NAT).

    You will learn how to implement advanced Next-Generation Firewall (NGFW) and Next-Generation Intrusion Prevention System (NGIPS) features, including network intelligence, file type detection, network-based malware detection, and deep packet inspection. You will also learn how to configure site-to-site VPN, remote-access VPN, and SSL decryption before moving on to detailed analysis, system administration, and troubleshooting.


    After taking this course, you should be able to:

    • Describe key concepts of NGIPS and NGFW technology and the Cisco Firepower Threat Defense system, and identify deployment scenarios
    • Perform initial Cisco Firepower Threat Defense device configuration and setup tasks
    • Describe how to manage traffic and implement quality of service (QoS) using Cisco Firepower Threat Defense
    • Describe how to implement NAT by using Cisco Firepower Threat Defense
    • Perform an initial network discovery, using Cisco Firepower to identify hosts, applications, and services
    • Describe the behaviour, usage, and implementation procedure for access control policies
    • Describe the concepts and procedures for implementing security intelligence features


    • Cisco Firepower Threat Defense Overview
      • Examining Firewall and IPS Technology
      • Firepower Threat Defense Features and Components
      • Examining Firepower Platforms
      • Examining Firepower Threat Defense Licensing
      • Cisco Firepower Implementation Use Cases
    • Cisco Firepower NGFW Device Configuration
      • Firepower Threat Defense Device Registration
      • FXOS and Firepower Device Manager
      • Initial Device Setup
      • Managing NGFW Devices
      • Examining Firepower Management Center Policies
      • Examining Objects
      • Examining System Configuration and Health Monitoring
      • Device Management
      • Examining Firepower High Availability
      • Configuring High Availability
      • Cisco ASA to Firepower Migration
      • Migrating from Cisco ASA to Firepower Threat Defense
    • Cisco Firepower NGFW Traffic Control
      • Firepower Threat Defense Packet Processing
      • Implementing QoS
      • Bypassing Traffic
    • Cisco Firepower NGFW Address Translation
      • NAT Basics
      • Implementing NAT
      • NAT Rule Examples
      • Implementing NAT
    • Cisco Firepower Discovery
      • Examining Network Discovery
      • Configuring Network Discovery
      • Implementing Access Control Policies
      • Examining Access Control Policies
      • Examining Access Control Policy Rules and Default Action
      • Implementing Further Inspection
      • Examining Connection Events
      • Access Control Policy Advanced Settings
      • Access Control Policy Considerations
      • Implementing an Access Control Policy
    • Security Intelligence
      • Examining Security Intelligence
      • Examining Security Intelligence Objects
      • Security Intelligence Deployment and Logging
      • Implementing Security Intelligence
    • File Control and Advanced Malware Protection
      • Examining Malware and File Policy
      • Examining Advanced Malware Protection
    • Next-Generation Intrusion Prevention Systems
      • Examining Intrusion Prevention and Snort Rules
      • Examining Variables and Variable Sets
      • Examining Intrusion Policies
    • Site-to-Site VPN
      • Examining IPsec
      • Site-to-Site VPN Configuration
      • Site-to-Site VPN Troubleshooting
      • Implementing Site-to-Site VPN
    • Remote-Access VPN
      • Examining Remote-Access VPN
      • Examining Public-Key Cryptography and Certificates
      • Examining Certificate Enrollment
      • Remote-Access VPN Configuration
      • Implementing Remote-Access VPN
    • SSL Decryption
      • Examining SSL Decryption
      • Configuring SSL Policies
      • SSL Decryption Best Practices and Monitoring
    • Detailed Analysis Techniques
      • Examining Event Analysis
      • Examining Event Types
      • Examining Contextual Data
      • Examining Analysis Tools
      • Threat Analysis
    • System Administration
      • Managing Updates
      • Examining User Account Management Features
      • Configuring User Accounts
      • System Administration
    • Cisco Firepower Troubleshooting
      • Examining Common Misconfigurations
      • Examining Troubleshooting Commands
      • Firepower Troubleshooting


    • Security administrators
    • Security consultants
    • Network administrators
    • System engineers
    • Technical support personnel
    • Cisco integrators and partners