Protecting Against Malware Threats with Cisco AMP for Endpoints Training v4.0 (SSFAMP)

Protecting Against Malware Threats with Cisco AMP for Endpoints Training

Course Delivery

This Course is available in the following format:

Request this course in a different delivery format

GSA Schedule 70 Saving for Government Customers

Course Overview:

Protecting Against Malware Threats with Cisco AMP for Endpoints Training v4.0 (SSFAMP) – Hands-on

In this lab-intensive Protecting Against Malware Threats with Cisco AMP for Endpoints Training v4.0 (SSFAMP) course, you will be introduced to the powerful features of Cisco AMP for Endpoints software. You will learn about the operational use of the product through a number of step-by-step attack scenarios.

Audience / Target Group:

The target audience for this Protecting Against Malware Threats with Cisco AMP for Endpoints Training course:

» Security administrators
» Security consultants
» Network administrators
» Systems engineers
» Technical support personnel
» Channel partners and resellers

Class Prerequisites:

The knowledge and skills that a learner must have before attending this Protecting Against Malware Threats with Cisco AMP for Endpoints Training course are:

» Technical understanding of TCP/IP networking and network architecture
» Technical understanding of security concepts and protocols

What You Will Learn:

Upon completing this Protecting Against Malware Threats with Cisco AMP for Endpoints Training course, learners will be able to meet these objectives:

» Key components and methodologies of Cisco Advanced Malware Protection (AMP)
» Key features and concepts of the AMP for Endpoints product
» Navigate the AMP for Endpoints console interface and perform first-use setup tasks
» Use the primary analysis features of AMP for Endpoints
» Use the AMP for Endpoints tools to analyze a compromised host
» Malware terminology and recognize malware categories
» Files and events by using the AMP for Endpoints console and be able to produce threat reports
» Use the AMP for Endpoints tools to analyze a malware attack and a ZeroAccess infection
» Configure and customize AMP for Endpoints to perform malware detection
» Create and configure a policy for AMP-protected endpoints
» Plan, deploy, and troubleshoot an AMP for Endpoints installation
» AMP Representational State Transfer (REST) API and the fundamentals of its use
» Features of the Accounts menu for both public- and private-cloud installations

Protecting Against Malware Threats with Cisco AMP for Endpoints Training – Course Syllabus:

Introduction to Cisco AMP Technologies
AMP for Endpoints Overview and Architecture
Console Interface and Navigation
Using AMP for Endpoints
Scenario: Detecting an Attacker
Modern Malware
Analysis
Analysis Case Studies
Outbreak Control
Endpoint Policies
Groups and Deployment
AMP REST API
Accounts

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

Print Friendly, PDF & Email