Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Cisco Core Security: Secure Network Access, Visibility, and Enforcement

Course Cover
compare button icon

Course Features

icon

Duration

94 minutes

icon

Delivery Method

Online

icon

Available on

Downloadable Courses

icon

Accessibility

Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Teaching Type

Self Paced

icon

Video Content

94 minutes

Course Description

It can be difficult to get your security products to work together in order to protect your company from the latest threats. This course, Cisco Core Security, Secure Network Access, Visibility and Enforcement will teach you the fundamental knowledge necessary to identify exfiltration techniques, as well as how to make Cisco security products work together to prevent threats. You will first learn about the various data exfiltration methods that attackers could use. Next, you'll learn how Cisco products can use pxGrid and network telemetry to communicate with one another. You will also learn how to control and visibility applications. This course will equip you with the knowledge and skills to ensure that your Cisco security products are working together to prevent the latest security threats.

Course Overview

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Instructor-Moderated Discussions

projects-img

Case Studies, Captstone Projects

Skills You Will Gain

What You Will Learn

Finally, you will explore how to implement application visibility and control

First, you will learn about various data exfiltration techniques that attackers can use

Then, you will discover how Cisco products can use network telemetry and pxGrid to communicate with each other

When you are finished with this course, you will have the skills and knowledge to get your Cisco security products working together to stop the latest security threats

You will learn the foundational knowledge needed to identify exfiltration techniques and how to have Cisco security products work together to block threats

Course Cover