Project Description

Advanced Threat Protection and Content Security

  • 2.1          Compare and contrast different AMP solutions including public and private cloud deployment models
  • 2.2          Describe, implement, and troubleshoot AMP for networks, AMP for endpoints, and AMP for content security (CWS, ESA, and WSA)
  • 2.3         Detect, analyze, and mitigate malware incidents
  • 2.4        Describe the benefit of threat intelligence provided by AMP Threat GRID
  • 2.5         Perform packet capture and analysis using Wireshark, tcpdump, SPAN, and RSPAN
  • 2.6          Describe, implement, and troubleshoot web filtering, user identification, and Application Visibility and Control (AVC)
  • 2.7          Describe, implement, and troubleshoot mail policies, DLP, email quarantines, and SenderBase on ESA
  • 2.8          Describe, implement, and troubleshoot SMTP authentication such as SPF and DKIM on ESA
  • 2.9         Describe, implement, and troubleshoot SMTP encryption on ESA
  • 2.10      Compare and contrast different LDAP query types on ESA
  • 2.11      Describe, implement, and troubleshoot WCCP redirection
  • 2.12        Compare and contrast different proxy methods such as SOCKS, Auto proxy/WPAD, and transparent
  • 2.13      Describe, implement, and troubleshoot HTTPS decryption and DLP
  • 2.14        Describe, implement, and troubleshoot CWS connectors on Cisco IOS routers, Cisco ASA, Cisco AnyConnect, and WSA
  •  2.15      Describe the security benefits of leveraging the OpenDNS solution.
  • 2.16        Describe, implement, and troubleshoot SMA for centralized content security management
  • 2.17      Describe the security benefits of leveraging Lancope