YoVDO

Configuring Firepower Threat Defense (FTD) Integrations

Offered By: Pluralsight

Tags

Network Security Courses Malware Detection Courses

Course Description

Overview

This course will teach you how to integrate Firepower Threat Defense with various external systems.

Firewalls have been the first line of defense in network security for over 20 years but in the face of constant attacks and breaches, they’ve had to evolve. With these increasingly complex threats, firewalls should be integrated to share and receive context with other security products as a part of a broader security architecture. In this course, Configuring Firepower Threat Defense (FTD) Integrations, you’ll learn how to maximize the value of your Firepower deployment by integrating it with third party systems to form a cohesive security architecture. First, you’ll explore how to improve malware detection and visibility by integrating Firepower with ThreatGrid, AMP for Endpoints, and AMP for Networks. Next, you’ll discover how to integrate third party threat feeds into Firepower for advanced detection. Then, you’ll integrate Firepower with Identity Services Engine to share contextual information and automate rapid threat containment. Finally, you’ll learn how to integrate Firepower with Cisco Threat Response to perform comprehensive security investigations. When you’re finished with this course, you'll have the skills and knowledge of FTD needed to configure and tune various integrations with other products and systems.

Syllabus

  • Course Overview 1min
  • Configuring Cisco AMP in Firepower Management Center 21mins
  • Configuring Threat Intelligence Director (TID) with Third-party Security Intelligence Feeds 22mins
  • Configuring Integration between Cisco Identity Services Engine (ISE) and Firepower 39mins
  • Configuring Cisco Threat Response 28mins

Taught by

Katherine McNamara

Related Courses

Introducción al Análisis del Malware en Windows
National Technological University – Buenos Aires Regional Faculty via Miríadax
The Complete Cyber Security Course : End Point Protection!
Udemy
Máster en Seguridad Informática. Curso completo de Hacking.
Udemy
Network Analysis with Arkime
Pluralsight
Malicious Code and Threats
Pluralsight