Vi ste ovdje
Overview/Description
Current trends in security threat vectors require a carefully planned threat control strategy. Trends that affect security include persistent application-layer threats that use social engineering to exploit the trust architecture of the enterprise, the pervasiveness of mobility and consumerization, and the insidious motivations behind the behavior of the attacker. All these trends result in the need for dynamic security intelligence gathering and distribution, early warning systems, and application layer inspection for mobile services where data and applications are...
Overview/Description
An IP Security (IPsec) VPN uses the Internet to connect branch offices, remote employees, and business partners to the resources of your company. It is a reliable way to maintain your company privacy while streamlining operations, reducing costs, and allowing flexible network administration. VPNs are an integral part of any security architecture. Providing confidentiality, integrity, and endpoint authentication, VPNs are ubiquitous and provide data loss prevention mechanisms for data that is in transit at multiple levels. From Secure Sockets Layer (SSL) VPNs to IP...
Overview/Description
When you need to address a threat that is uniquely specific to your environment, or otherwise do not have an appropriate signature in the default signature set to address a particular threat, you can create custom signatures on the Cisco Intrusion Prevention System (IPS) sensor. This course describes the methods and configuration procedures that allow you to create custom signatures on a Cisco IPS sensor and examines some methodologies to tune a Cisco IPS sensor to properly manage false positive and negative events.
Target Audience
Anyone wishing to obtain the Cisco...
Overview/Description
Cisco ASA Adaptive Security Appliance Advanced Inspection and Prevention (AIP) Security Services Module (SSM) and AIP Security Services Card 5 (SSC-5) modules, Cisco Intrusion Prevention System (IPS) Advanced Integration Module (AIM) and Network Module Enhanced (NME) modules, and the Cisco Intrusion Detection System Services Module 2 (IDSM-2) module allow you to provide rich IPS functionality that is integrated into various Cisco products. This course focuses on configuration and maintenance procedures that are specific to these integration modules as opposed to...
Overview/Description
This course describes the engine architecture found in the Cisco Intrusion Prevention System (IPS) sensors. It introduces each engine category and briefly describes each engine. You can use the information in this course to better understand individual signatures when tuning them, and when creating custom signatures. Anomaly detection is also introduced in this course. The anomaly detection component of the Cisco Intrusion Prevention System (IPS) Sensor Software detects known and yet-unknown network treats and can take appropriate preventive actions to prevent their...
Overview/Description
Network intrusion prevention technologies are much more effective when they are customized for the environment in which they operate, which increases the quality of produced alarms and responses. This course examines some methodologies to tune a Cisco Intrusion Prevention System (IPS) sensor to properly manage false positive and negative events. This course also provides configuration guidance for integrating the Cisco Intrusion Prevention System (IPS) sensor with your network and system environment and discusses several Cisco IPS sensor features can be enabled to...
Overview/Description
After you have configured the sensing interfaces of a Cisco Intrusion Prevention System (IPS) sensor, you will need to attach them to the sensor analysis engine, and optionally tune basic, low-level analysis options that apply to inspected traffic. In this course, you will learn about virtual sensors and their session tracking modes, traffic sources and analysis engine settings, inline normalization and promiscuous mode reassembly options, IP version 6 (IPv6) support and how to configure the bypass feature. This course also introduces the configuration of the built-in...
Overview/Description
In modern IT infrastructures, it is becoming increasingly important to protect company resources. Not only must company resources be defended passively, but the protection also must be constantly monitored and enhanced with systems that actively inspect the data that is passed over allowed and open connections. Intrusion prevention and intrusion detection systems are two technologies that can provide such risk reduction. Cisco provides various Cisco Intrusion Prevention System (IPS) sensor platforms that satisfy different requirements for network integration and...
Overview/Description
Network intrusion prevention system (IPS) and intrusion detection system (IDS) sensors use various techniques to analyze network traffic in order to optimally detect suspicious and malicious traffic while maintaining the desired performance levels. These sensors can be deployed in various situations and architectures to enhance network-based protection of enterprise assets. This course describes network IPS traffic analysis methods, evasion methods that are used by attackers to avoid detection, and common anti-evasive countermeasures that network IPS engines use to...
Overview/Description
Cisco IPS Manager Express (IME) is a powerful, integrated intrusion prevention system (IPS) management application that is designed to meet IPS sensor configuration, operation, event monitoring, and event reporting needs of small- and medium-sized businesses. With one application, you can provision, monitor, troubleshoot, and generate reports for as many as 10 Cisco IPS sensors. Cisco IME allows administrators to create long-term reports that are based on the event database, and real-time notifications to quickly alert administrators about critical events, as defined by...