Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP)

Course Cover
compare button icon

Course Features

icon

Duration

3 days

icon

Delivery Method

Online

icon

Available on

Lifetime Access

icon

Accessibility

Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Teaching Type

Self Paced

Course Description

Protecting Against Malware with Cisco AMP For Endpoints (SSFAMP v5.0) is a 3-day course that teaches you how to deploy CiscoA®, AMP for Endpoints, a next generation endpoint security solution that detects, prevents and responds to advanced threats. This course will provide hands-on exercises and expert guidance. You'll learn how to implement this powerful solution using a variety of attack scenarios. Learn how to deploy connectors, manage Cisco AMP for Endpoints, and create policies for endpoint groups. The tools in the AMP console will allow you to analyze malware detections.

Course Overview

projects-img

Post Course Interactions

projects-img

Instructor-Moderated Discussions

Skills You Will Gain

Prerequisites/Requirements

Technical understanding of TCP/IP networking and network architecture

Technical understanding of security concepts and protocols

What You Will Learn

Identify the key components and methodologies of Cisco Advanced Malware Protection (AMP)

Recognize the key features and concepts of the AMP for Endpoints product

Navigate the AMP for Endpoints console interface and perform first-use setup tasks

Identify and use the primary analysis features of AMP for Endpoints

Use the AMP for Endpoints tools to analyze a compromised host

Describe malware terminology and recognize malware categories

Analyze files and events by using the AMP for Endpoints console and be able to produce threat reports

Use the AMP for Endpoints tools to analyze a malware attack and a ZeroAccess infection

Configure and customize AMP for Endpoints to perform malware detection

Create and configure a policy for AMP-protected endpoints

Plan, deploy, and troubleshoot an AMP for Endpoints installation

Describe the AMP Representational State Transfer (REST) API and the fundamentals of its use

Describe all the features of the Accounts menu for both public and private cloud installation

Target Students

Security administrators

Security consultants

Network administrators

Systems engineers

Technical support personnel

Cisco integrators, resellers, and partners

Course Cover