Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP)

The Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) v5.0 is a 3 day course which shows you how to deploy and use Cisco® AMP for Endpoints, a next-generation endpoint security solution that prevents, detects, and responds to advanced threats.
$3,000.00
The Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) v5.0 is a 3 day course which shows you how to deploy and use Cisco® AMP for Endpoints, a next-generation endpoint security solution that prevents, detects, and responds to advanced threats.

More Information:

  • Modality: Virtual
  • Provider: Cisco
  • Difficulty: Intermediate
  • Duration: 3 Days
  • CLC: 30 Units
  • Course Info: Download PDF
  • Certificate: See Sample

Course Information

About this course:

The Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) v5.0 is a 3 day course which shows you how to deploy and use Cisco® AMP for Endpoints, a next-generation endpoint security solution that prevents, detects, and responds to advanced threats. Through expert instruction and hands-on lab exercises, you will learn how to implement and use this powerful solution through a number of step-by-step attack scenarios. You’ll learn how to build and manage a Cisco AMP for Endpoints deployment, create policies for endpoint groups, and deploy connectors. You will also analyze malware detections using the tools available in the AMP for Endpoints console.

Course Objective:

Upon completing this course, the learner will be able to meet these overall objectives:

  • Identify the key components and methodologies of Cisco Advanced Malware Protection (AMP)
  • Recognize the key features and concepts of the AMP for Endpoints product
  • Navigate the AMP for Endpoints console interface and perform first-use setup tasks
  • Identify and use the primary analysis features of AMP for Endpoints
  • Use the AMP for Endpoints tools to analyze a compromised host
  • Describe malware terminology and recognize malware categories
  • Analyze files and events by using the AMP for Endpoints console and be able to produce threat reports
  • Use the AMP for Endpoints tools to analyze a malware attack and a ZeroAccess infection
  • Configure and customize AMP for Endpoints to perform malware detection
  • Create and configure a policy for AMP-protected endpoints
  • Plan, deploy, and troubleshoot an AMP for Endpoints installation
  • Describe the AMP Representational State Transfer (REST) API and the fundamentals of its use
  • Describe all the features of the Accounts menu for both public and private cloud installation

Audience:

The primary audience for this course is as follows:

  • Security administrators
  • Security consultants
  • Network administrators
  • Systems engineers
  • Technical support personnel
  • Cisco integrators, resellers, and partners

Prerequisite:

The knowledge and skills that a learner should have before attending this course are as follows:

  • Technical understanding of TCP/IP networking and network architecture
  • Technical understanding of security concepts and protocols

Outline

Hit button to validate captcha