Protect Your Network
Get Internet security training that is mission-critical to today's companies.
Internet crime costs companies billions of dollars annually. Understanding how to profile attackers and defend network and data assets is essential.
Cisco Learning Services provides superior, world-class training experiences in the complex area of network and data security. Cisco security training takes full advantage of the collective expertise of a global collection of security experts. It delivers a thorough, hands-on, and relevant experience that can place students in the forefront of this high-demand area.
Strengthen Your Network Security
Take the "Securing Cisco Networks with FireSIGHT Intrusion Prevention System" course.Get Details
Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP)
Students will learn how modern threats such as Exploit Kits, Bots, and Trojans work in real-world scenarios, and gain insight into the methods and purposes of attackers, as well as recent security trends. Armed with this contextual knowledge, students will engage in a detailed walkthrough of remediating infections with Cisco AMP, including deployment, troubleshooting, and best practices.
Securing Cisco Networks with FireSIGHT Intrusion Prevention System (SSFIPS)
This lab-intensive course introduces students to the powerful features of the Cisco FireSIGHT system, in-depth event analysis, IPS tuning and configuration, and the SNORT rules language.
Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRULES)
This course focuses exclusively on the Snort rules language and rule writing. Starting from rule syntax and structure to advanced rule-option usage, students will analyze exploit packet captures and put the rule writing theories learned to work-implementing rule-language features to trigger alerts on the offending network traffic.
Securing Cisco Networks with Open Source Snort (SSFSNORT)
Learn to build and manage a Snort system using open source tools, plug-ins, and the Snort rule language to help manage, tune, and deliver feedback on suspicious network activity. This course combines lecture materials and hands-on labs to ensure students are able to construct a solid, secure Snort installation and write Snort rules using proper syntax and structure.