Implementing and Operating Cisco Security Core Technologies (SCOR) - Topología de laboratorio

 

Topología de laboratorio

  • Configure Network Settings and NAT on Cisco Secure Firewall ASA
  • Configure Cisco Secure Firewall ASA Access Control Policies
  • Configure Cisco Secure Firewall Threat Defense NAT
  • Configure Cisco Secure Firewall Threat Defense Access Control Policy
  • Configure Cisco Secure Firewall Threat Defense Discovery and IPS Policy
  • Configure Cisco Secure Firewall Threat Defense Malware and File Policy
  • Configure Listener, HAT, and RAT on Cisco Email Secure Email Gateway
  • Configure Cisco Secure Email Policies
  • Configure Proxy Services, Authentication, and HTTPS Decryption
  • Enforce Acceptable Use Control and Malware Protection
  • Configure Static VTI Point-to-Point IPsec IKEv2 Tunnel
  • Configure Point-to-Point VPN between Cisco Secure Firewall Threat Defense Devices
  • Configure Remote Access VPN on the Cisco Secure Firewall Threat Defense
  • Examine Cisco Umbrella Dashboard and DNS Security
  • Examine Cisco Umbrella Secure Web Gateway and Cloud-Delivered Firewall
  • Explore Cisco Umbrella CASB Funtionalities
  • Explore Cisco Secure Endpoint
  • Perform Endpoint Analysis Using Cisco Secure Endpoint Console
  • Explore File Ransomware Protection by Cisco Secure Endpoint Console
  • Explore Secure Network Analytics v7.4.2
  • Explore Global Threat Alerts Integration and ETA Cryptographic Audit
  • Explore Cloud Analytics Dashboard and Operations
  • Explore Secure Cloud Private and Public Cloud Monitoring