We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Securing Applications with AWS

Craig Stansbury

More than 65% of threats that affect networks are deployed through email. This course will teach you how to leverage Cisco's Email Security Appliance to help mitigate the threats that can wreak havoc on your network.

Read more

More than 65% of threats that affect networks are deployed through email. This course will teach you how to leverage Cisco's Email Security Appliance to help mitigate the threats that can wreak havoc on your network.

Cisco estimates that between 65 and 80% of threats are deployed through email. In this course, Cisco Core Security: Email Security with Cisco ESA, you will gain the ability to use Cisco's ESA to secure your network. First, you will learn how to route email through the ESA. Next, you will discover how to block malicious senders in the first place. Finally, you will explore how to configure policies to ensure your emails are secure. When you are finished with this course, you will have the skills and knowledge of email security needed to secure your organization's emails.

Before beginning this course, you should be familiar with security concepts and network security fundamentals.

The Cisco Email Security Appliance (ESA) is an email security gateway product. It is designed to detect and block a wide variety of email-borne threats, such as malware, spam and phishing attempts.

With over 90% of attacks on organizations starting from a malicious email, relying on your built-in security might leave your organization open to cyber criminals that constantly capitalize on the number one attack vector: exploiting human nature and the lack of tight security.

The most common network security threats are Computer viruses, Computer worms, Trojan horse, SQL injection attack, DOS and DDOS attack, Rootkit, Rogue security software, Phishing, Adware and spyware, and Man-in-the-middle attacks.

Cisco ESA uses a multilayer approach to fight viruses and malware: The first layer of defense consists of outbreak filters, which the appliance downloads from Cisco SenderBase. They contain a list of known bad mail servers. Cisco ESA also scans outbound emails to provide antivirus protection.

Following this course you should feel comfortable diving into Cisco Core Security with courses on Content Security with Cisco WSA and Cisco Umbrella, Securing the Cloud, Secure Network Access with Cisco ISE, and Endpoint Protection and Detection with Cisco AMP.

Enroll now

What's inside

Syllabus

Course Overview
Deploying the ESA and Placing It in the Email Path
Configuring the ESA to Accept Email
Configuring the Default Incoming Mail Policy
Read more
Configuring the Default Outgoing Mail Policy and Verifying

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Presents advanced strategies for prevention, mitigation, and recovery against threats deployed via email
Utilizes a comprehensive multi-modal approach with a mix of videos, readings, and discussions
Offers a beginner-friendly framework for understanding email security concepts
Requires familiarity with security concepts and network security fundamentals, making it most suitable for learners with a foundational knowledge in cybersecurity
Covers a wide range of email security threats, including malware, spam, and phishing, ensuring comprehensive understanding of the challenges faced in email communications
Provides practical hands-on labs and interactive materials to reinforce learning and foster hands-on experience

Save this course

Save Securing Applications with AWS to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Securing Applications with AWS. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Securing Applications with AWS will develop knowledge and skills that may be useful to these careers:
Cybersecurity Analyst
Cybersecurity Analysts are responsible for protecting computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. The skills you will learn in the Securing Applications with AWS course will give you an advantage when seeking a job as a Cybersecurity Analyst by building your foundation in AWS security, which is a key skill for protecting cloud-based applications.
Information Security Analyst
Information Security Analysts plan and implement security measures to protect an organization's information systems and data. The skills you learn in the Securing Applications with AWS course can help you succeed in this role by teaching you how to secure applications in the AWS cloud, which is a critical skill in today's digital world.
Security Engineer
Security Engineers design, implement, and maintain security measures to protect an organization's computer networks and systems. The Securing Applications with AWS course will help you prepare for a career as a Security Engineer by providing you with the skills you need to secure applications in the AWS cloud, a key skill in this role.
Cloud Security Architect
Cloud Security Architects design and implement security measures to protect cloud-based applications and data. The Securing Applications with AWS course can help you prepare for this role by teaching you how to secure applications in AWS, a key skill for Cloud Security Architects.
DevOps Engineer
DevOps Engineers work to improve the collaboration between development and operations teams. The Securing Applications with AWS course can help you prepare for this role by teaching you how to secure applications in AWS, a key skill for DevOps Engineers.
Systems Engineer
Systems Engineers design, implement, and maintain computer systems and networks. The Securing Applications with AWS course will help you prepare for this role by providing you with the skills you need to secure applications in AWS, a key skill for Systems Engineers.
Network Engineer
Network Engineers design, implement, and maintain computer networks. Securing Applications with AWS provides a foundation of cloud-based security that complements your core networking skills, preparing you for a career as a Network Engineer.
Database Administrator
Database Administrators are responsible for the maintenance and security of databases. The Securing Applications with AWS course can help you prepare for this role by teaching you how to secure databases in AWS, a key skill for Database Administrators.
Software Engineer
Software Engineers design, develop, and maintain software applications. The Securing Applications with AWS course can help you prepare for this role by teaching you how to secure applications in AWS, a key skill for Software Engineers.
Web Developer
Web Developers design and develop websites and web applications. The Securing Applications with AWS course can help you prepare for this role by teaching you how to secure web applications in AWS, a key skill for Web Developers.
IT Manager
IT Managers plan and direct the activities of an organization's IT department. The Securing Applications with AWS course can help you prepare for this role by providing you with the skills you need to secure applications in AWS, a key skill for IT Managers.
IT Security Manager
IT Security Managers are responsible for the security of an organization's IT systems and data. The Securing Applications with AWS course can help you prepare for this role by teaching you how to secure applications in AWS, a key skill for IT Security Managers.
Information Technology Director
Information Technology Directors are responsible for the overall IT strategy and operations of an organization. The Securing Applications with AWS course can help you prepare for this role by providing you with the skills you need to secure applications in AWS, a key skill for Information Technology Directors.
Chief Information Security Officer
Chief Information Security Officers are responsible for the overall security of an organization's IT systems and data. The Securing Applications with AWS course may help you prepare for this role by providing you with a foundation in AWS security, which is a key skill for Chief Information Security Officers.
Chief Technology Officer
Chief Technology Officers are responsible for the overall technology strategy and operations of an organization. The Securing Applications with AWS course may help you prepare for this role by providing you with a foundation in AWS security, which is a key skill for Chief Technology Officers.

Reading list

We've selected eight books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Securing Applications with AWS.
This vendor documentation provides detailed information on deploying and managing Cisco Security Manager, a network security management tool that can be used to monitor and manage the Cisco ESA and other Cisco security devices.
This comprehensive text provides a deep dive into the principles and practices of security engineering. It valuable resource for understanding the theoretical foundations of email security and other cybersecurity domains.
This comprehensive textbook provides a rigorous introduction to cryptography and network security concepts. It valuable resource for understanding the underlying principles of email security and other cybersecurity domains.
This comprehensive handbook provides a practical guide to implementing and managing internet security solutions. It includes valuable advice on email security and other cybersecurity best practices.
This classic text provides a comprehensive introduction to network security concepts and protocols. It offers a valuable foundation for understanding the technical aspects of email security and other network security domains.
This comprehensive textbook provides a solid foundation in network security concepts and standards. While it is not specific to Cisco ESA, it offers a broader understanding of the underlying principles relevant to the course.
This practical guide provides a high-level overview of cybersecurity concepts and risks. It is useful for gaining a general understanding of the importance of email security within the broader cybersecurity landscape.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Securing Applications with AWS.
Automating Cisco Security Management Solutions Using APIs
Most relevant
Cisco Core Security: Network Security with Cisco Firepower
Most relevant
Cisco Core Security: Content Security with Cisco WSA &...
Most relevant
Cisco Core Security: Secure Network Access, Visibility,...
Most relevant
Home Networking Basics
Most relevant
Cisco Core Security: Endpoint Protection and Detection...
Most relevant
Cisco Core Security: Security Concepts
Most relevant
Cisco Core Security: Network Security Fundamentals
Most relevant
Cisco Core Security: Describing and Configuring VPNs
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser