Protect Your Network
Get Internet security training that is mission-critical to today's companies.
Internet crime costs companies billions of dollars annually. Understanding how to profile attackers and defend network and data assets is essential.
Cisco Learning Services provides superior, world-class training experiences in the complex area of network and data security. Cisco security training takes full advantage of the collective expertise of a global collection of security experts. It delivers a thorough, hands-on, and relevant experience that can place students in the forefront of this high-demand area.
Strengthen Your Network Security
Take the "Securing Cisco Networks with Threat Detection and Analysis" course.Get Details
Securing Cisco Networks with Threat Detection and Analysis (SCYBER)
As preparation for the Cisco Cyber Security Specialist Certification exam, students learn to detect, mitigate, and thwart network attacks using real-world data and a range of industry security devices.
Securing Cisco Networks with FireSIGHT Intrusion Prevention System (SSFIPS)
This lab-intensive course introduces students to the powerful features of the Cisco FireSIGHT system, in-depth event analysis, IPS tuning and configuration, and the SNORT rules language.
Securing Cisco Networks with Sourcefire FireAMP Endpoints (SSFAMP)
This two-day instructor-led virtual class, delivered through Cisco WebEx, covers information on Sourcefire Advanced Malware Protection (AMP) technology, deployment, management, and analysis.
Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRULES)
This course focuses exclusively on the Snort rules language and rule writing. Starting from rule syntax and structure to advanced rule-option usage, students will analyze exploit packet captures and put the rule writing theories learned to work-implementing rule-language features to trigger alerts on the offending network traffic.
Securing Cisco Networks with Open Source Snort (SSFSNORT)
Learn to build and manage a Snort system using open source tools, plug-ins, and the Snort rule language to help manage, tune, and deliver feedback on suspicious network activity. This course combines lecture materials and hands-on labs to ensure students are able to construct a solid, secure Snort installation and write Snort rules using proper syntax and structure.