We are happy to advise you!
Contact
Implementing and Operating Cisco Security Core Technologies (SCOR) - Lab Topology
Lab Topology
- Configure Network Settings and NAT on Cisco Secure Firewall ASA
- Configure Cisco Secure Firewall ASA Access Control Policies
- Configure Cisco Secure Firewall Threat Defense NAT
- Configure Cisco Secure Firewall Threat Defense Access Control Policy
- Configure Cisco Secure Firewall Threat Defense Discovery and IPS Policy
- Configure Cisco Secure Firewall Threat Defense Malware and File Policy
- Configure Listener, HAT, and RAT on Cisco Email Secure Email Gateway
- Configure Cisco Secure Email Policies
- Configure Proxy Services, Authentication, and HTTPS Decryption
- Enforce Acceptable Use Control and Malware Protection
- Configure Static VTI Point-to-Point IPsec IKEv2 Tunnel
- Configure Point-to-Point VPN between Cisco Secure Firewall Threat Defense Devices
- Configure Remote Access VPN on the Cisco Secure Firewall Threat Defense
- Examine Cisco Umbrella Dashboard and DNS Security
- Examine Cisco Umbrella Secure Web Gateway and Cloud-Delivered Firewall
- Explore Cisco Umbrella CASB Funtionalities
- Explore Cisco Secure Endpoint
- Perform Endpoint Analysis Using Cisco Secure Endpoint Console
- Explore File Ransomware Protection by Cisco Secure Endpoint Console
- Explore Secure Network Analytics v7.4.2
- Explore Global Threat Alerts Integration and ETA Cryptographic Audit
- Explore Cloud Analytics Dashboard and Operations
- Explore Secure Cloud Private and Public Cloud Monitoring