實(shí)施思科安全威脅控制解決方案考試要點(diǎn)_第1頁(yè)
實(shí)施思科安全威脅控制解決方案考試要點(diǎn)_第2頁(yè)
實(shí)施思科安全威脅控制解決方案考試要點(diǎn)_第3頁(yè)
實(shí)施思科安全威脅控制解決方案考試要點(diǎn)_第4頁(yè)
實(shí)施思科安全威脅控制解決方案考試要點(diǎn)_第5頁(yè)
已閱讀5頁(yè),還剩2頁(yè)未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡(jiǎn)介

1、第 第 頁(yè)實(shí)施思科安全威脅控制解決方案考試要點(diǎn)E*am DescriptionThe Implementing Cisco Threat Control Solutions (SITCS) e*am (300-210) is part of the CCNP Security certification. It tests a network security engineer on advanced firewall architecture and configuration with the Cisco ne*t-generation firewall, utilizing access

2、 and identity policies. This new revision of the SITCS e*am replaces 300-207, removes some older technologies, and adds coverage for both Cisco Firepower NGIPS and Cisco AMP (Advanced Malware Protection). This 90-minute e*am consists of 6575 questions and covers integration of Intrusion Prevention S

3、ystem (IPS) and conte*t-aware firewall components, as well as Web (Cloud) and Email Security solutions. Candidates can prepare for this e*am by taking the Implementing Cisco Threat Control Solutions (SITCS) course.The following topics are general guidelines for the content likely to be included on t

4、he e*am. However, other related topics may also appear on any specific delivery of the e*am. In order to better reflect the contents of the e*am and for clarity purposes, the guidelines below may change at any time without notice.Download Complete List of Topics in PDF format1.0 Content Security27%H

5、ide Details1.1 Cisco Cloud Web Security (CWS)1.1.a Describe the features and functionality1.1.b Implement the IOS and ASA connectors1.1.c Implement the Cisco AnyConnect web security module1.1.d Implement web usage control1.1.e Implement AVC1.1.f Implement antimalware1.1.g Implement decryption polici

6、es1.2 Cisco Web Security Appliance (WSA)1.2.a Describe the features and functionality1.2.b Implement data security1.2.c Implement WSA identity and authentication, including transparent user identification1.2.d Implement web usage control1.2.e Implement AVC1.2.f Implement antimalware and AMP1.2.g Imp

7、lement decryption policies1.2.h Implement traffic redirection and capture methods (e*plicit pro*y vs. transparent pro*y)1.3 Cisco Email Security Appliance1.3.a Describe the features and functionality1.3.b Implement email encryption1.3.c Implement antispam policies1.3.d Implement virus outbreak filte

8、r1.3.e Implement DLP policies1.3.f Implement antimalware and AMP1.3.g Implement inbound and outbound mail policies and authentication1.3.h Implement traffic redirection and capture methods1.3.i Implement ESA GUI for message tracking2.0 Network Threat Defense22%Hide Details2.1 Cisco Ne*t-Generation F

9、irewall (NGFW) Security Services2.1.a Implement application awareness2.1.b Implement access control policies (URL-filtering, reputation based, file filtering)2.1.c Configure and verify traffic redirection2.1.d Implement Cisco AMP for Networks2.2 Cisco Advanced Malware Protection (AMP)2.2.a Describe

10、cloud detection technologies2.2.b Compare and contrast AMP architectures (public cloud, private cloud)2.2.c Configure AMP endpoint deployments2.2.d Describe analysis tools2.2.e Describe incident response functionality2.2.f Describe sandbo* analysis2.2.g Describe AMP integration3.0 Cisco FirePOWER Ne

11、*t-Generation IPS (NGIPS)20%Hide Details3.1 Configurations3.2 Describe traffic redirection and capture methods3.2.a Describe preprocessors and detection engines3.2.b Implement event actions and suppression thresholds3.2.c Implement correlation policies3.2.d Describe SNORT rules3.2.e Implement SSL de

12、cryption policies3.3 Deployments3.3.a Deploy inline or passive modes3.3.b Deploy NGIPS as appliance, virtual appliance, or module within an ASA3.3.c Describe the need for traffic symmetry3.3.d Compare inline modes: inline interface pair and inline tap mode4.0 Security Architectures17%Hide Details4.1

13、 Design a web security solution4.1.a Compare and contrast Cisco FirePOWER NGFW, WSA, and CWS4.1.b Compare and contrast physical WSA and virtual WSA4.1.c Describe the available CWS connectors4.2 Design an email security solution4.2.a Compare and contrast physical ESA and virtual ESA4.2.b Describe hyb

14、rid mode4.3 Design Cisco FirePOWER solutions4.3.a Configure the virtual routed, switched, and hybrid interfaces4.3.b Configure the physical routed interfaces5.0 Troubleshooting, Monitoring, and Reporting Tools14%Hide Details5.1 Design a web security solution5.1.a Compare and contrast FirePOWER NGFW,

15、 WSA, and CWS5.1.b Compare and contrast physical WSA and virtual WSA5.1.c Describe the available CWS connectors5.2 Cisco Web Security Appliance (WSA)5.2.a Implement the WSA Policy Trace tool5.2.b Describe WSA reporting functionality5.2.c Troubleshoot using CLI tools5.3 Cisco Email Security Appliance (ESA)5.3.a Implement the ESA Policy Trace tool5.3.b Describe ESA reporting functionality5.

溫馨提示

  • 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

評(píng)論

0/150

提交評(píng)論