<dfn id="w48us"></dfn><ul id="w48us"></ul>
  • <ul id="w48us"></ul>
  • <del id="w48us"></del>
    <ul id="w48us"></ul>
  • 實施思科安全威脅控制解決方案考試要點

    時間:2024-07-17 15:15:50 思科認證 我要投稿
    • 相關推薦

    實施思科安全威脅控制解決方案考試要點

      實施思科安全威脅控制解決方案(SITCS)主要檢驗考生作為網絡安全工程師是否能夠利用訪問和身份策略,掌握高級防護墻架構以及配置思科下一代防火墻。一些舊的技術已被刪除,包括Cisco Firepower NGIPS以及Cisco AMP(高級惡意軟件防護)。 該考試涵蓋入侵防御系統(IPS)、事件感知的防火墻組件以及Web(云)和電子郵件安全解決方案。

    實施思科安全威脅控制解決方案考試要點

      Exam Description

      The Implementing Cisco Threat Control Solutions (SITCS) exam (300-210) is part of the CCNP Security certification. It tests a network security engineer on advanced firewall architecture and configuration with the Cisco next-generation firewall, utilizing access and identity policies. This new revision of the SITCS exam replaces 300-207, removes some older technologies, and adds coverage for both Cisco Firepower NGIPS and Cisco AMP (Advanced Malware Protection). This 90-minute exam consists of 65–75 questions and covers integration of Intrusion Prevention System (IPS) and context-aware firewall components, as well as Web (Cloud) and Email Security solutions. Candidates can prepare for this exam by taking the Implementing Cisco Threat Control Solutions (SITCS) course.

      The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

      Download Complete List of Topics in PDF format

      1.0 Content Security27%Hide Details

      1.1 Cisco Cloud Web Security (CWS)

      1.1.a Describe the features and functionality

      1.1.b Implement the IOS and ASA connectors

      1.1.c Implement the Cisco AnyConnect web security module

      1.1.d Implement web usage control

      1.1.e Implement AVC

      1.1.f Implement antimalware

      1.1.g Implement decryption policies

      1.2 Cisco Web Security Appliance (WSA)

      1.2.a Describe the features and functionality

      1.2.b Implement data security

      1.2.c Implement WSA identity and authentication, including transparent user identification

      1.2.d Implement web usage control

      1.2.e Implement AVC

      1.2.f Implement antimalware and AMP

      1.2.g Implement decryption policies

      1.2.h Implement traffic redirection and capture methods (explicit proxy vs. transparent proxy)

      1.3 Cisco Email Security Appliance

      1.3.a Describe the features and functionality

      1.3.b Implement email encryption

      1.3.c Implement antispam policies

      1.3.d Implement virus outbreak filter

      1.3.e Implement DLP policies

      1.3.f Implement antimalware and AMP

      1.3.g Implement inbound and outbound mail policies and authentication

      1.3.h Implement traffic redirection and capture methods

      1.3.i Implement ESA GUI for message tracking

      2.0 Network Threat Defense22%Hide Details

      2.1 Cisco Next-Generation Firewall (NGFW) Security Services

      2.1.a Implement application awareness

      2.1.b Implement access control policies (URL-filtering, reputation based, file filtering)

      2.1.c Configure and verify traffic redirection

      2.1.d Implement Cisco AMP for Networks

      2.2 Cisco Advanced Malware Protection (AMP)

      2.2.a Describe cloud detection technologies

      2.2.b Compare and contrast AMP architectures (public cloud, private cloud)

      2.2.c Configure AMP endpoint deployments

      2.2.d Describe analysis tools

      2.2.e Describe incident response functionality

      2.2.f Describe sandbox analysis

      2.2.g Describe AMP integration

      3.0 Cisco FirePOWER Next-Generation IPS (NGIPS)20%Hide Details

      3.1 Configurations

      3.2 Describe traffic redirection and capture methods

      3.2.a Describe preprocessors and detection engines

      3.2.b Implement event actions and suppression thresholds

      3.2.c Implement correlation policies

      3.2.d Describe SNORT rules

      3.2.e Implement SSL decryption policies

      3.3 Deployments

      3.3.a Deploy inline or passive modes

      3.3.b Deploy NGIPS as appliance, virtual appliance, or module within an ASA

      3.3.c Describe the need for traffic symmetry

      3.3.d Compare inline modes: inline interface pair and inline tap mode

      4.0 Security Architectures17%Hide Details

      4.1 Design a web security solution

      4.1.a Compare and contrast Cisco FirePOWER NGFW, WSA, and CWS

      4.1.b Compare and contrast physical WSA and virtual WSA

      4.1.c Describe the available CWS connectors

      4.2 Design an email security solution

      4.2.a Compare and contrast physical ESA and virtual ESA

      4.2.b Describe hybrid mode

      4.3 Design Cisco FirePOWER solutions

      4.3.a Configure the virtual routed, switched, and hybrid interfaces

      4.3.b Configure the physical routed interfaces

      5.0 Troubleshooting, Monitoring, and Reporting Tools14%Hide Details

      5.1 Design a web security solution

      5.1.a Compare and contrast FirePOWER NGFW, WSA, and CWS

      5.1.b Compare and contrast physical WSA and virtual WSA

      5.1.c Describe the available CWS connectors

      5.2 Cisco Web Security Appliance (WSA)

      5.2.a Implement the WSA Policy Trace tool

      5.2.b Describe WSA reporting functionality

      5.2.c Troubleshoot using CLI tools

      5.3 Cisco Email Security Appliance (ESA)

      5.3.a Implement the ESA Policy Trace tool

      5.3.b Describe ESA reporting functionality

      5.3.c Troubleshoot using CLI tools

      5.4 Cisco FirePOWER

      5.4.a Describe the Cisco FirePOWER Management Center dashboards and reports

      5.4.b Implement health policy

      5.4.c Configure email, SNMP, and syslog alerts

      5.4.d Troubleshoot NGIPS using CLI tools

    【實施思科安全威脅控制解決方案考試要點】相關文章:

    思科CCIE安全實驗考試要點03-18

    思科網絡安全運營考試要點03-16

    思科認證CLDFND考試要點01-08

    思科認證SIMOS考試要點01-09

    實施思科IP交換網絡(SWITCH 642-813)考試要點03-17

    實施思科統一無線語音網絡IUWVN考試要點01-09

    實施思科IOS網絡安全考試(IINS)09-20

    思科認證CCIE數據中心實驗考試要點03-18

    實施思科IP路由考試主要內容03-17

    主站蜘蛛池模板: 亚洲精品永久在线观看| 午夜精品一区二区三区免费视频| 97热久久免费频精品99| 久久水蜜桃亚洲av无码精品麻豆| 亚洲国产精品一区第二页| 亚洲av午夜福利精品一区| 国产精品无码午夜福利| 久久se精品一区精品二区| 一区二区三区国产精品| 久久精品国产WWW456C0M| 四虎成人精品无码| jiucao在线观看精品| 国内精品久久久久久久久电影网| 四虎国产精品成人免费久久| 国产久热精品无码激情| 久草热久草热线频97精品| 四虎精品成人免费视频| 国产精品天天看天天狠| 国产一级精品高清一级毛片| 99精品视频在线观看re| 久久久久久青草大香综合精品| 欧美精品欧美人与动人物牲交| 92国产精品午夜福利免费| 亚洲精品乱码久久久久久中文字幕| 国产一成人精品福利网站| 亚洲日韩欧美制服精品二区| 久久99精品久久久久久水蜜桃| 国内少妇偷人精品视频免费| 久久国产精品一区| 精品无人区麻豆乱码1区2区| 亚洲国产精品无码一线岛国| 国产精品免费久久久久影院 | 高清日韩精品一区二区三区 | 久久精品国产亚洲AV香蕉| 国产在线精品一区二区三区不卡 | 亚洲国产精品久久久天堂| 午夜精品美女写真福利| 国内精品久久久久久99蜜桃| 久久精品国产99国产精品| 亚洲国产精品线在线观看| 国产乱人伦偷精品视频AAA|