We may earn an affiliate commission when you visit our partners.
Craig Stansbury

There are a lot of ways attackers can gain data from your network, but Cisco’s security products can work together to identify attacks and prevent them. This course will teach you the concepts needed to get your security products working together.

Read more

There are a lot of ways attackers can gain data from your network, but Cisco’s security products can work together to identify attacks and prevent them. This course will teach you the concepts needed to get your security products working together.

Having your organization’s security products work together to properly mitigate the latest threats can be challenging. In this course, Cisco Core Security: Secure Network Access, Visibility, and Enforcement, you will learn the foundational knowledge needed to identify exfiltration techniques and how to have Cisco security products work together to block threats. First, you will learn about various data exfiltration techniques that attackers can use. Then, you will discover how Cisco products can use network telemetry and pxGrid to communicate with each other. Finally, you will explore how to implement application visibility and control. When you are finished with this course, you will have the skills and knowledge to get your Cisco security products working together to stop the latest security threats.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Course Overview
Explaining Exfiltration Techniques
Describing the Benefits of Network Telemetry
Benefitting from Additional Cisco® Security Products
Read more
Implementing Cisco® Application Visibility and Control (AVC)

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches network security concepts relevant to working professionals
Applies to network security administrators
Taught by Craig Stansbury, an industry expert in network security
Covers essential techniques for identifying data exfiltration
Emphasizes practical implementation of security measures

Save this course

Save Cisco Core Security: Secure Network Access, Visibility, and Enforcement to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Cisco Core Security: Secure Network Access, Visibility, and Enforcement with these activities:
Review network security basics
Refresh your knowledge of essential network security principles and technologies to build a stronger foundation for the course.
Show steps
  • Read an introductory article or online resource on network security concepts
  • Review materials from previous coursework or certifications related to network security
  • Complete online quizzes or practice exercises to test your understanding
Review Fundamentals of Network Security
Renew your understanding of core network security principles to prepare for the course topics.
Show steps
  • Read about network security models and architectures.
  • Review the concepts of firewalls, intrusion detection, and access control.
  • Revisit encryption techniques and their applications in network security.
Host a Discussion Group on Secure Network Design with Cisco Products
Host a discussion group to share knowledge and best practices on secure network design with Cisco products.
Browse courses on Secure Network Design
Show steps
  • Choose a platform for the discussion group (e.g., online forum, video conferencing).
  • Create a schedule and topics for discussion.
  • Invite other students, professionals, or experts to join the group.
  • Facilitate discussions and encourage active participation.
11 other activities
Expand to see all activities and additional details
Show all 14 activities
Analyze network traffic using Wireshark
Gain hands-on experience capturing and analyzing network traffic to develop your troubleshooting skills and identify potential security threats.
Browse courses on Wireshark
Show steps
  • Download and install Wireshark on your computer
  • Capture network traffic using Wireshark
  • Use Wireshark to inspect packet headers and analyze traffic patterns
  • Identify suspicious or malicious traffic based on protocol, source, or destination
Cisco CLI Exercises
Gain proficiency in using the Cisco CLI to configure and manage network devices.
Show steps
  • Set up a lab environment with Cisco devices.
  • Practice configuring basic router and switch settings.
  • Execute commands for network monitoring and troubleshooting.
  • Simulate and resolve common network issues using the CLI.
Practice Network Traffic Monitoring with Cisco pxGrid
Practice using Cisco pxGrid to monitor network traffic and identify potential security threats.
Show steps
  • Set up a lab environment with Cisco pxGrid.
  • Configure network devices to send telemetry data to pxGrid.
  • Use pxGrid to visualize and analyze network traffic data.
  • Identify and investigate suspicious network activity.
Follow Tutorials on Implementing Cisco's Secure Access Service Edge (SASE) Framework
Follow guided tutorials to gain practical experience in implementing Cisco's SASE framework.
Browse courses on network security
Show steps
  • Identify reputable online resources and tutorials for Cisco SASE implementation.
  • Set up a lab environment or use a cloud sandbox to practice.
  • Follow the tutorials step-by-step and configure SASE components.
  • Test and validate the SASE implementation.
Explore Cisco's pxGrid platform
Familiarize yourself with Cisco's pxGrid platform by completing guided tutorials, allowing you to utilize its capabilities for security information sharing and incident response.
Show steps
  • Access Cisco's pxGrid documentation and tutorials
  • Complete the pxGrid getting started tutorial
  • Explore tutorials on integrating pxGrid with other Cisco security products
  • Experiment with different pxGrid use cases and scenarios
Network Telemetry with Cisco pxGrid
Enhance your understanding of how Cisco pxGrid enables communication and data sharing among security products.
Show steps
  • Explore online tutorials on Cisco pxGrid and its architecture.
  • Follow step-by-step guides to configure and deploy pxGrid in a lab environment.
  • Analyze pxGrid logs and use the data for security monitoring.
Configure Cisco Firepower Threat Defense for Application Visibility and Control (AVC).
Create a step-by-step guide on how to configure Cisco Firepower Threat Defense for AVC.
Show steps
  • Review the AVC documentation and gather the necessary information.
  • Configure AVC policies and rules.
  • Deploy AVC policies to your network devices.
  • Monitor and maintain AVC policies.
  • Create a written or video guide that clearly explains the configuration process.
Practice Detecting Exfiltration Techniques with Cisco Security Products
Practice detecting exfiltration techniques using Cisco security products to protect your network.
Show steps
  • Set up a lab environment with Cisco security products.
  • Configure security policies to detect exfiltration techniques.
  • Simulate exfiltration attacks and observe how Cisco security products respond.
  • Analyze the results and identify areas for improvement.
Network Security Policy Analysis
Apply your knowledge to analyze and improve the effectiveness of network security policies.
Show steps
  • Review existing network security policies and identify potential vulnerabilities.
  • Research industry best practices and security frameworks.
  • Draft recommendations for policy enhancements and improvements.
  • Create a presentation or report summarizing your findings and recommendations.
Cisco Security Product Integration Workshop
Gain hands-on experience integrating and optimizing Cisco security products for enhanced protection.
Browse courses on Cisco Security Products
Show steps
  • Attend a Cisco Security Product Integration Workshop conducted by experts.
  • Configure and manage Cisco security devices such as firewalls, intrusion prevention systems, and endpoint protection platforms.
  • Learn about best practices for threat detection, response, and prevention.
Network Security Incident Response Plan
Develop a comprehensive plan to guide your response to network security incidents and minimize their impact.
Browse courses on Incident Response
Show steps
  • Identify potential security threats and vulnerabilities.
  • Establish procedures for incident detection, escalation, and containment.
  • Designate roles and responsibilities for incident response team members.
  • Create documentation outlining the incident response process and communication channels.
  • Conduct regular drills and exercises to test and refine the plan.

Career center

Learners who complete Cisco Core Security: Secure Network Access, Visibility, and Enforcement will develop knowledge and skills that may be useful to these careers:
Network Security Analyst
A Network Security Analyst plans the implementation of cybersecurity systems, which might include Cisco's security products. To be successful, you must understand a multitude of exfiltration techniques so that you are prepared for any eventuality. Cisco Core Security: Secure Network Access, Visibility, and Enforcement will teach you the techniques you need. It will also teach you how to use Cisco's pxGrid so that the security products can work together to identify and mitigate threats.
Cybersecurity Analyst
As a Cybersecurity Analyst, you will be responsible for protecting your organization's data from advanced and evolving threats. As part of this, you might work with Cisco security products. By taking Cisco Core Security: Secure Network Access, Visibility, and Enforcement, you will learn about different exfiltration techniques used by attackers. You will also learn how to implement Cisco's pxGrid to ensure that Cisco security products are working together. This course will help you to build a foundation for success in this role.
Cyber Threat Intelligence Analyst
In the role of Cyber Threat Intelligence Analyst, you will collect, analyze, and disseminate threat intelligence for insider and external threats. You may be responsible for Cisco product implementation as part of this. Cisco Core Security: Secure Network Access, Visibility, and Enforcement will help you to build the knowledge foundation you need for this role. This course will teach you about exfiltration techniques and Cisco pxGrid. You will also learn how to use Cisco security products to identify and mitigate threats.
Cloud Security Architect
A Cloud Security Architect designs and implements security solutions for cloud-based systems. This may include deploying Cisco security products. By taking Cisco Core Security: Secure Network Access, Visibility, and Enforcement, you will learn about various exfiltration techniques and how to implement Cisco's pxGrid to enable Cisco security products to communicate with each other. This course will give you the knowledge you need to excel in this role.
Security Architect
As a Security Architect, you will be responsible for designing, implementing, and maintaining an organization's security architecture. Cisco's security products often feature prominently in a security architecture framework. Cisco Core Security: Secure Network Access, Visibility, and Enforcement will familiarize you with exfiltration techniques. You will also learn how Cisco products use pxGrid and how to configure and implement Cisco AVC. This course will help you to develop the skills needed to succeed in this role.
Network Engineer
As a Network Engineer, you must implement and maintain an organization's computer networks. Cisco's security products are ubiquitous in the field. In Cisco Core Security: Secure Network Access, Visibility, and Enforcement, you will learn how to design and implement Cisco security solutions. You will learn about a variety of exfiltration techniques. You will also learn how Cisco's pxGrid and AVC work. This course will give you essential knowledge for success in this role.
Malware Analyst
Malware Analysts investigate computer systems to solve security breaches. They provide technical solutions to prevent cyberattacks. Cisco Core Security: Secure Network Access, Visibility, and Enforcement may be helpful for this role. In this course, you will learn about exfiltration techniques and how to use Cisco security products to combat them.
Security Operations Center (SOC) Analyst
A SOC Analyst monitors and analyzes security events in a Security Operations Center. Cisco Core Security: Secure Network Access, Visibility, and Enforcement may be helpful in this role. This course teaches about various exfiltration techniques and how to use Cisco pxGrid to enhance communications between Cisco security products. This knowledge would be beneficial in the SOC.
Systems Engineer
Systems Engineers carry out technical planning, implementation, and maintenance. This often includes the implementation and maintenance of security systems. Cisco Core Security: Secure Network Access, Visibility, and Enforcement can provide a useful foundation for this role. This course teaches you about exfiltration techniques and how to use Cisco's pxGrid. This knowledge can help you work with Cisco products to build robust, secure systems.
Ethical Hacker
Ethical Hackers are also known as Penetration Testers. They test an organization's computer systems and networks to identify security vulnerabilities. Cisco Core Security: Secure Network Access, Visibility, and Enforcement provides a helpful background for this role. This course will teach you about different exfiltration techniques and how attackers might use them.
Incident Responder
Incident Responders lead teams of cybersecurity professionals. Cisco Core Security: Secure Network Access, Visibility, and Enforcement may be useful for this role. This course will teach you about exfiltration techniques and Cisco's pxGrid. It will also teach you about Cisco AVC and how it can be implemented to improve an organization's security posture.
Network Administrator
Network Administrators build, maintain, and manage computer networks. They may also design security systems to protect the network. Cisco Core Security: Secure Network Access, Visibility, and Enforcement may be useful for this role. This course will teach you about exfiltration techniques. It will also teach you how to use Cisco products to improve network security.
Database Administrator
Database Administrators are responsible for maintaining and supporting an organization's databases. They may also implement security measures to protect these databases. Cisco Core Security: Secure Network Access, Visibility, and Enforcement may be useful for this role. This course will teach you about exfiltration techniques. It will also teach you how to use Cisco's pxGrid to use Cisco security products to enhance database security.
Security Software Developer
Security Software Developers design and create security software. They may also work on the development of security features for other software products. Cisco Core Security: Secure Network Access, Visibility, and Enforcement may be helpful in this role. This course teaches about different exfiltration techniques. You will also learn how Cisco security products work together to protect against these threats.
Information Security Engineer
Information Security Engineers design, implement, and monitor an organization's security systems. They may also work with Cisco security products. Cisco Core Security: Secure Network Access, Visibility, and Enforcement can help you build essential skills for this role. This course will teach you about exfiltration techniques. It will also teach you about Cisco pxGrid and AVC.

Reading list

We've selected six books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Cisco Core Security: Secure Network Access, Visibility, and Enforcement.
Can serve as a current reference on network security. This book great resource for students to learn about and implement better network security.
This highly-rated book provides an excellent overview of many security concepts including security monitoring and forensics. Crucially, this book can provide background knowledge for this course as it has a section on identifying various exfiltration techniques used by attackers.
Provides an excellent background in computer networking which is useful for this course on implementing better security.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Cisco Core Security: Secure Network Access, Visibility, and Enforcement.
Cisco Core Security: Security Concepts
Most relevant
Automating Cisco Security Management Solutions Using APIs
Most relevant
Cisco Core Security: Content Security with Cisco WSA &...
Most relevant
Configuring Firepower Threat Defense (FTD) Integrations
Most relevant
Securing Applications with AWS
Most relevant
Operationalizing Cisco Firepower
Most relevant
Security Administration with Cisco Defense Orchestrator
Most relevant
Cisco Core Security: Network Security Fundamentals
Most relevant
CCNP SECURITY - CORE SCOR-350-701
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser