Protecting Against Malware Threats With Cisco AMP For Endpoints (SSFAMP) v5.1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Learning@Cisco

Course overview

Protecting Against Malware Threats with


Cisco AMP for Endpoints (SSFAMP) v5.1
What you’ll learn in this course
The Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) v5.1 course shows you
how to deploy and use Cisco® AMP for Endpoints, a next-generation endpoint security solution that prevents,
detects, and responds to advanced threats. Through expert instruction and hands-on lab exercises, you will learn
how to implement and use this powerful solution through a number of step-by-step attack scenarios. You’ll learn
how to build and manage a Cisco AMP for Endpoints deployment, create policies for endpoint groups, and deploy
connectors. You will also analyze malware detections using the tools available in the AMP for Endpoints console.

Course duration
● Instructor-led training: 3 days in the classroom with hands-on lab practice
● Virtual instructor-led training: 3 days of web-based classes with hands-on lab practice

How you’ll benefit


This class will help you:

● Learn how to deploy and manage Cisco AMP for Endpoints


● Succeed in today’s high-demand security operations roles

Who should enroll


● Security administrators
● Security consultants
● Network administrators
● Systems engineers
● Technical support personnel
● Cisco integrators, resellers, and partners

How to enroll

Instructor-led training
● Find a class at the Cisco Learning Locator
● Arrange training at your location through Cisco Private Group Training

.
Learning@Cisco
Course overview

Technology areas
● Security

Course details

Objectives
After taking this course, you should be able to:

● Identify the key components and methodologies of Cisco Advanced Malware Protection (AMP)
● Recognize the key features and concepts of the AMP for Endpoints product
● Navigate the AMP for Endpoints console interface and perform first-use setup tasks
● Identify and use the primary analysis features of AMP for Endpoints
● Use the AMP for Endpoints tools to analyze a compromised host
● Describe malware terminology and recognize malware categories
● Analyze files and events by using the AMP for Endpoints console and be able to produce threat reports
● Use the AMP for Endpoints tools to analyze a malware attack and a Zero Access infection
● Configure and customize AMP for Endpoints to perform malware detection
● Create and configure a policy for AMP-protected endpoints
● Plan, deploy, and troubleshoot an AMP for Endpoints installation
● Describe the AMP Representational State Transfer (REST) API and the fundamentals of its use
● Describe all the features of the Accounts menu for both public and private cloud installations

Prerequisites
To fully benefit from this course, you should have the following knowledge and skills:

● Technical understanding of TCP/IP networking and network architecture


● Technical understanding of security concepts and protocols

Outline
● Introduction to Cisco AMP Technologies
● AMP for Endpoints Overview and Architecture
● Console Interface and Navigation
● Using AMP for Endpoints
● Detecting an Attacker — A Scenario
● Modern Malware
● Analysis
● Analysis Case Studies
● Outbreak Control
● Endpoint Policies
● AMP REST API
● Accounts

Page2 of 3
Learning@Cisco
Course overview

Lab outline
● Request Cisco AMP for Endpoints User Account (e-learning version only)
● Accessing AMP for Endpoints
● Attack Scenario
● Attack Analysis
● Analysis Tools and Reporting
● Zbot Analysis
● Outbreak Control
● Endpoint Policies
● Groups and Deployment
● Testing Your Policy Configuration
● REST API
● User Accounts (optional)

Course content is dynamic and subject to change without notice.

© 2020 Cisco and/or its affiliates. All rights reserved. Course version: SSFAMP_5.1 C22-741222-01 06/20

Page3 of 3

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy