Download CCIE/CCNP Security SNCF 300-710: SECURING NETWORKS WITH CISCO FIREPOWER (SNCF) PDF Free - Full Version
Download CCIE/CCNP Security SNCF 300-710: SECURING NETWORKS WITH CISCO FIREPOWER (SNCF) by Lammle, Todd in PDF format completely FREE. No registration required, no payment needed. Get instant access to this valuable resource on PDFdrive.to!
About CCIE/CCNP Security SNCF 300-710: SECURING NETWORKS WITH CISCO FIREPOWER (SNCF)
<p>SECURITY</p><p>EXAM 300-710: SECURING NETWORKS WITH CISCO FIREPOWER (SNCF)</p><p>About the Author</p><p>Introduction</p><p>History of SourceFire/Firepower</p><p>Managing Firepower</p><p>What Is This Book Really About?</p><p>What Does This Book Cover?</p><p>Securing Networks with Cisco Firepower (SNCF 300-710) Exam Objectives</p><p>Exam Description</p><p>What Objectives Will the Second Book in This Series Cover?</p><p>What chapters are covered in Part II in this CCNP Security SNCF series?</p><p>Chapter 1: Firepower Management Center (FMC)</p><p>Deploying a Cisco Firepower Network</p><p>What Is a Firepower Management Center (FMC)?</p><p>What If Your FMC Goes Down?</p><p>Virtual FMCs</p><p>FMC Virtual</p><p>FMC Virtual 300</p><p>Hardware FMCs</p><p>Starting the Firepower Management Center</p><p>Summary</p><p>Chapter 2: Cisco Firepower Management Center (FMC) Configuration</p><p>Initial FMC Login</p><p>Navigation Overview</p><p>Firepower System Configuration</p><p>Information</p><p>Access List</p><p>Access Control Preferences</p><p>Audit Log Certificate and Audit Log</p><p>Change Reconciliation</p><p>Console Configuration</p><p>DNS Cache</p><p>Dashboard</p><p>Database</p><p>Email Notification</p><p>External Database Access</p><p>HTTPS Certificate</p><p>Intrusion Policy Preferences</p><p>Language</p><p>Login Banner</p><p>Management Interfaces</p><p>Network Analysis Policy Preferences</p><p>Process</p><p>REST API Preferences</p><p>Remote Storage Device</p><p>SNMP</p><p>Shell Timeout</p><p>Time</p><p>Time Synchronization</p><p>UCAPL/CC Compliance</p><p>User Configuration</p><p>VMware Tools</p><p>Vulnerability Mapping</p><p>Web Analytics</p><p>Summary</p><p>Chapter 3: Firepower Management Center (FMC) Actions</p><p>Firepower Management Center (FMC) Actions</p><p>Firepower Management Center Alert Responses</p><p>Alert Responses</p><p>FMC Detailed Alerts</p><p>Summary</p><p>Chapter 4: Licensing & Health Policy</p><p>Licensing</p><p>Health Policy</p><p>Health Monitor</p><p>Health Policy</p><p>Health Events</p><p>Blacklist</p><p>Health Monitor Alerts</p><p>Summary</p><p>Chapter 5: Chassis Manager</p><p>Hardware Overview</p><p>Resetting our 4100s</p><p>Resetting the Password on 4100/9300</p><p>Setting the 4100/9300 Devices to Factory Default</p><p>Initial Configuration for 4100/9300</p><p>FXOS Overview</p><p>UCS Context</p><p>FXOS Context</p><p>Security Module Context</p><p>Local Management Context</p><p>Adapter Context</p><p>CIMC Context</p><p>Image Management</p><p>Adding FXOS</p><p>Upgrading FXOS</p><p>Adding a ASA Image</p><p>Adding an FTD Image</p><p>Adding Radware</p><p>Logging into the Chassis Manager</p><p>Platform Settings</p><p>Interfaces</p><p>Logical Devices</p><p>Adaptive Security Appliance (ASA)</p><p>FTD Cluster</p><p>FTD Standard</p><p>Cluster Traffic Flow</p><p>Centralized Features</p><p>Dynamic Routing in a Cluster</p><p>Site to Site VPNs in a Cluster</p><p>NAT in a Cluster</p><p>SIP in a Cluster</p><p>Syslog in a Cluster</p><p>SNMP in a Cluster</p><p>FTP in a Cluster</p><p>Trustsec in a Cluster</p><p>Unsupported Features</p><p>Summary</p><p>Chapter 6: Firepower Devices</p><p>Firepower Threat Defense (FTD) on the 1000/1100/2100/4100/9300 Devices</p><p>Configuration for 1010/1100/2100</p><p>Firepower Devices used in this book</p><p>7000/8000 Appliances</p><p>Virtual FTD on vCenter</p><p>CLI of the FTD Devices</p><p>Basic FTD CLI Commands</p><p>CLI Troubleshooting commands</p><p>Download the Advanced Troubleshooting File from the GUI</p><p>Download the Advanced Troubleshooting File from the CLI</p><p>Adding the 1010s and 1150s to the 2500 FMC</p><p>Adding the Firepower Appliance, 4140s and vFTDs into the Virtual FMC</p><p>Configuring the IPs on the 172.16.10.0 Devices</p><p>Configuring a DHCP Server</p><p>Configuring Routing</p><p>Verifying the Configuration from the CLI</p><p>Configuring the IPs on the 10.11.10.0 Managed Devices</p><p>Configuring Routing</p><p>Device Tab</p><p>Summary</p><p>Chapter 7: High Availability</p><p>High Availability</p><p>Licensing</p><p>Determining the Active Unit</p><p>High Availability on the Hardware FMC</p><p>High Availability on the Firepower Devices</p><p>Monitoring and Troubleshooting</p><p>Monitoring Interfaces</p><p>Standby Interface IP Addresses</p><p>Active/Standby IP Addresses and MAC Addresses</p><p>Verifying with the CLI</p><p>Upgrading a High Availability Pair</p><p>Upgrading a Firepower Device HA Pair</p><p>Summary</p><p>Chapter 8: Objects</p><p>Objects</p><p>Network</p><p>Port</p><p>Interface</p><p>Tunnel Zone</p><p>Application Filters</p><p>VLAN Tag</p><p>Security Group Tag</p><p>URL</p><p>Geolocation</p><p>Variable Set</p><p>Time Range</p><p>Security Intelligence Overview</p><p>Network Security Intelligence (SI)</p><p>DNS Security Intelligence</p><p>URL Security Intelligence</p><p>Security Intelligence Under the Hood</p><p>Sinkhole</p><p>Sinkhole Reloaded</p><p>File List</p><p>Cipher Suite List</p><p>Distinguished Name</p><p>PKI</p><p>FTD Only Settings</p><p>SLA Monitor</p><p>Prefix Lists</p><p>Route Map</p><p>Access Lists</p><p>AS Path</p><p>Community List</p><p>Policy List</p><p>VPN</p><p>Address Pools</p><p>FlexConfig</p><p>Radius Server Group</p><p>Intrusion Rules</p><p>Summary</p><p>Chapter 9: Access Control Policy</p><p>Overview</p><p>Policy Creation</p><p>Policy Editing</p><p>General Settings</p><p>Security Intelligence</p><p>HTTP Responses</p><p>Advanced</p><p>The Rules Tab</p><p>Rules!</p><p>ACP Rules Example</p><p>Summary</p><p>Chapter 10: Malware and File Policy</p><p>Advanced Malware Protection (AMP) Basics</p><p>File Analysis</p><p>Retrospective Events</p><p>File Dispositions</p><p>File Disposition Caching</p><p>Cloud Communications</p><p>Malware & File Policy</p><p>Advanced Settings</p><p>File Rules</p><p>File Policy Actions and Licensing</p><p>File Blocking Behavior</p><p>File Types and Categories</p><p>Sample Policy</p><p>Cisco AMP for Endpoints in Firepower Management Center</p><p>Integrating Firepower with AMP for Endpoints</p><p>AMP for Endpoints and AMP Private Cloud</p><p>Putting It All Together</p><p>Verifying a File Policy</p><p>Summary</p><p>Chapter 11: Firepower Network Discovery</p><p>Firepower Technologies</p><p>Network Discovery Policy</p><p>Firepower Discovery Information</p><p>User Information</p><p>Host Attributes</p><p>Summary</p><p>Chapter 12: Intrusion Prevention System (IPS) Policy</p><p>Policy Basics</p><p>What Rules Are Enabled by Default?</p><p>Connectivity over Security Base Policy</p><p>Balanced Security and Connectivity Base Policy</p><p>Security over Connectivity Base Policy</p><p>Maximum Detection Base Policy</p><p>Final Thoughts on Base Policies</p><p>Rule States</p><p>Layers</p><p>Private and Shared Layers</p><p>A Shared Layer Alternative</p><p>The Intrusion Policy Interface</p><p>Intrusion Policy Editing</p><p>Rule Management</p><p>Creating, Importing, Deleting, & Editing a Snort Rule</p><p>Firepower Recommendations</p><p>Advanced Settings</p><p>Policy Layers</p><p>Committing Changes</p><p>Configuring and Verifying an Intrusion Policy</p><p>Verifying Your IPS Policy</p><p>Summary</p><p>Chapter 13: DNS Policy</p><p>Domain Name System (DNS)</p><p>The Kill Chain</p><p>A Typical Malware Infection</p><p>IP Blacklists</p><p>The Proxy Problem</p><p>The Proxy Solution</p><p>DNS Policy Configuration</p><p>Summary</p><p>Chapter 14: Prefilter</p><p>Overview</p><p>Prefilter Uses</p><p>Policy Creation</p><p>Prefilter Rules</p><p>Summary</p><p>Chapter 15: Network Address Translation (NAT)</p><p>What Is Network Address Translation (NAT)?</p><p>Types of Network Address Translation</p><p>NAT Names</p><p>Firepower NAT</p><p>Firepower NAT Examples</p><p>Firepower Threat Defense (FTD) NAT</p><p>Auto NAT or Manual NAT?</p><p>Testing and Troubleshooting NAT</p><p>NAT Verification</p><p>Summary</p><p>Chapter 16: Identity Policy</p><p>Identity with Firepower</p><p>Identity Sources</p><p>Non-Authoritative (Traffic-Based Detection)</p><p>Authoritative Sources</p><p>Realms</p><p>Add Realm</p><p>Add Directory</p><p>User Download</p><p>Identity Policy</p><p>Implement your Identity Policy</p><p>Summary</p><p>Chapter 17: User Management</p><p>User Preferences</p><p>Account Management</p><p>Internal vs. External User Authentication</p><p>User Privileges</p><p>Predefined User Roles</p><p>Creating New User Accounts</p><p>Creating a Custom User Role</p><p>Managing User Role Escalation</p><p>Configuring External Authentication</p><p>Creating Authentication Objects</p><p>Summary</p><p>Chapter 18: Advanced Network Analysis</p><p>Event Analysis Principles</p><p>False Positives</p><p>False Negatives</p><p>Possible Outcomes</p><p>The Goal of Analysis</p><p>Intrusion Events</p><p>Workflows</p><p>The Time Window</p><p>Navigating the Analysis Interface</p><p>Security Intelligence Events</p><p>Security Intelligence Workflows</p><p>Security Intelligence Tuning</p><p>File and Malware Events</p><p>Summary</p>
Detailed Information
Author: | Lammle, Todd |
---|---|
Publication Year: | 2020 |
Pages: | 618 |
Language: | english |
File Size: | 104.6926 |
Format: | |
Price: | FREE |
Safe & Secure Download - No registration required
Why Choose PDFdrive for Your Free CCIE/CCNP Security SNCF 300-710: SECURING NETWORKS WITH CISCO FIREPOWER (SNCF) Download?
- 100% Free: No hidden fees or subscriptions required for one book every day.
- No Registration: Immediate access is available without creating accounts for one book every day.
- Safe and Secure: Clean downloads without malware or viruses
- Multiple Formats: PDF, MOBI, Mpub,... optimized for all devices
- Educational Resource: Supporting knowledge sharing and learning
Frequently Asked Questions
Is it really free to download CCIE/CCNP Security SNCF 300-710: SECURING NETWORKS WITH CISCO FIREPOWER (SNCF) PDF?
Yes, on https://PDFdrive.to you can download CCIE/CCNP Security SNCF 300-710: SECURING NETWORKS WITH CISCO FIREPOWER (SNCF) by Lammle, Todd completely free. We don't require any payment, subscription, or registration to access this PDF file. For 3 books every day.
How can I read CCIE/CCNP Security SNCF 300-710: SECURING NETWORKS WITH CISCO FIREPOWER (SNCF) on my mobile device?
After downloading CCIE/CCNP Security SNCF 300-710: SECURING NETWORKS WITH CISCO FIREPOWER (SNCF) PDF, you can open it with any PDF reader app on your phone or tablet. We recommend using Adobe Acrobat Reader, Apple Books, or Google Play Books for the best reading experience.
Is this the full version of CCIE/CCNP Security SNCF 300-710: SECURING NETWORKS WITH CISCO FIREPOWER (SNCF)?
Yes, this is the complete PDF version of CCIE/CCNP Security SNCF 300-710: SECURING NETWORKS WITH CISCO FIREPOWER (SNCF) by Lammle, Todd. You will be able to read the entire content as in the printed version without missing any pages.
Is it legal to download CCIE/CCNP Security SNCF 300-710: SECURING NETWORKS WITH CISCO FIREPOWER (SNCF) PDF for free?
https://PDFdrive.to provides links to free educational resources available online. We do not store any files on our servers. Please be aware of copyright laws in your country before downloading.
The materials shared are intended for research, educational, and personal use in accordance with fair use principles.