Guest

Security Training

Protect Your Network

Network security training that’s critical to your business success.

Protect Your Network

Network security breaches cost companies billions of dollars annually. Understanding how to detect and prevent modern cybersecurity threats is critical to the success of your business.

Cisco Learning Services provides real-world training for the complex field of network and data security, drawing on the collective expertise of our global security team to place students at the forefront of this high-demand area.

To learn more or schedule a class, please email us.

Courses Offered

Course Delivery Options
Implementing an Integrated Threat Defense Solution (SECUR201)
This instructor-led, lab-based, hands-on course is part of a series of Cisco security solutions courses designed to help businesses implement and operate their Cisco Integrated Threat Defense solution.
In-Person / Virtual Live Training
Private Group Training
Securing Networks with Cisco Firepower Threat Defense NGFW (FIREPOWER200)
This lab-intensive course introduces you to the basic next-generation intrusion prevention system (NGIPS) and next-generation firewall (NGFW) security concepts. The course then leads you through the Cisco Firepower system. Among other powerful features, you become familiar with Firepower Threat Defense configuration, in-depth event analysis, and NGIPS tuning and configuration. You also become familiar with the latest platform features: file and malware inspection, security intelligence, domain awareness, and more.
In-Person / Virtual Live Training
Private Group Training
Deploying Security in Cisco ACI (DSACI)
This instructor-led, lab-based, hands-on course describes how to implement secure Cisco Application Centric Infrastructure (ACI) operation, as well as how to integrate security services with the Cisco ACI Fabric. Students will learn how to implement security mechanisms in the operational infrastructure with the Cisco ACI environment.
In-Person / Virtual Live Training
Private Group Training
Securing Networks with Cisco Firepower Next-Generation IPS (SSFIPS)
Our enhanced Next-Generation Intrusion Prevention System course teaches you to look up which hosts are being targeted within your network, what operating systems and applications are running, what mobile/client-side devices are in use, and what actions users are performing. Previously, gathering this critical information required access to multiple systems, but our Cisco Firepower NGIPS training empowers you do this in one place, in real-time, identifying threats before they unfold.
In-Person / Virtual Live Training
Private Group Training
On-Demand (Self Paced)
Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP)
This lab-intensive course that introduces students to the powerful features of Cisco AMP for Endpoints software. You will learn about the operational use of the product through a number of step-by-step attack scenarios. You’ll learn how to build and manage a Cisco AMP for Endpoints deployment, create policies for endpoint groups, and deploy connectors. You will also analyze malware detections using powerful tools available in the AMP for Endpoints console. This course combines lecture materials and hands-on labs throughout to make sure that you are able to successfully deploy and manage an AMP for Endpoints deployment.
In-Person / Virtual Live Training
Private Group Training
On-Demand (Self Paced)
Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRULES)
This course focuses exclusively on the Snort rules language and rule writing. Starting from rule syntax and structure to advanced rule-option usage, students will analyze exploit packet captures and put the rule writing theories learned to work-implementing rule-language features to trigger alerts on the offending network traffic.
In-Person / Virtual Live Training
Private Group Training
Securing Cisco Networks with Open Source Snort (SSFSNORT)
Learn to build and manage a Snort system using open source tools, plug-ins, and the Snort rule language to help manage, tune, and deliver feedback on suspicious network activity. This course combines lecture materials and hands-on labs to ensure students are able to construct a solid, secure Snort installation and write Snort rules using proper syntax and structure.
In-Person / Virtual Live Training
Private Group Training
On-Demand (Self Paced)