Network security training that’s critical to your business success.Learn more
Network security breaches cost companies billions of dollars annually. Understanding how to detect and prevent modern cybersecurity threats is critical to the success of your business.
Cisco Learning Services provides real-world training for the complex field of network and data security, drawing on the collective expertise of our global security team to place students at the forefront of this high-demand area.
|Securing Industrial IoT Networks with Cisco Technologies (ISECIN)
This course provides the foundation you need to succeed with the industrial IoT. You will learn how to lead and secure high-visibility IIoT enabled infrastructure projects, and gain critical insight into IoT-enabled industries such as manufacturing, energy, oil and gas, utilities, and process control.
|Deploying Security in Cisco ACI (DSACI)
This instructor-led, lab-based, hands-on course describes how to implement secure Cisco Application Centric Infrastructure (ACI) operation, as well as how to integrate security services with the Cisco ACI Fabric. Students will learn how to implement security mechanisms in the operational infrastructure with the Cisco ACI environment.
|Securing Networks with Cisco Firepower Threat Defense NGFW (FIREPOWER200)
This lab-intensive course introduces you to the basic next-generation intrusion prevention system (NGIPS) and next-generation firewall (NGFW) security concepts. The course then leads you through the Cisco Firepower system. Among other powerful features, you become familiar with Firepower Threat Defense configuration, in-depth event analysis, and NGIPS tuning and configuration. You also become familiar with the latest platform features: file and malware inspection, security intelligence, domain awareness, and more.
|Implementing an Integrated Threat Defense Solution (SECUR201)
This instructor-led, lab-based, hands-on course is part of a series of Cisco security solutions courses designed to help businesses implement and operate their Cisco Integrated Threat Defense solution.
|Integrated Threat Defense Investigation and Mitigation (SECUR202)
This instructor-led, lab-based, hands-on course will introduce students to network threat investigation and then reinforce student learning through a series of lab scenarios designed to identify relationships between the Cisco products and the stages of the attack lifecycle.
|Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP)
This course shows you how to deploy and use Cisco® AMP for Endpoints, a next-generation endpoint security solution that prevents, detects, and responds to advanced threats. Through expert instruction and hands-on lab exercises, you will learn how to implement and use this powerful solution through a number of step-by-step attack scenarios.
|Securing Networks with Cisco Firepower Next-Generation IPS (SSFIPS)
Our enhanced Next-Generation Intrusion Prevention System course teaches you to look up which hosts are being targeted within your network, what operating systems and applications are running, what mobile/client-side devices are in use, and what actions users are performing. Previously, gathering this critical information required access to multiple systems, but our Cisco Firepower NGIPS training empowers you do this in one place, in real-time, identifying threats before they unfold.
|Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRULES)
This course focuses exclusively on the Snort rules language and rule writing. Starting from rule syntax and structure to advanced rule-option usage, students will analyze exploit packet captures and put the rule writing theories learned to work-implementing rule-language features to trigger alerts on the offending network traffic.
|Securing Cisco Networks with Open Source Snort (SSFSNORT)
Learn to build and manage a Snort system using open source tools, plug-ins, and the Snort rule language to help manage, tune, and deliver feedback on suspicious network activity. This course combines lecture materials and hands-on labs to ensure students are able to construct a solid, secure Snort installation and write Snort rules using proper syntax and structure.
Sorry, no results matched your search criteria(s). Please try again.