Project Description
Advanced Threat Protection and Content Security
- 2.1 Compare and contrast different AMP solutions including public and private cloud deployment models
- 2.2 Describe, implement, and troubleshoot AMP for networks, AMP for endpoints, and AMP for content security (CWS, ESA, and WSA)
- 2.3 Detect, analyze, and mitigate malware incidents
- 2.4 Describe the benefit of threat intelligence provided by AMP Threat GRID
- 2.5 Perform packet capture and analysis using Wireshark, tcpdump, SPAN, and RSPAN
- 2.6 Describe, implement, and troubleshoot web filtering, user identification, and Application Visibility and Control (AVC)
- 2.7 Describe, implement, and troubleshoot mail policies, DLP, email quarantines, and SenderBase on ESA
- 2.8 Describe, implement, and troubleshoot SMTP authentication such as SPF and DKIM on ESA
- 2.9 Describe, implement, and troubleshoot SMTP encryption on ESA
- 2.10 Compare and contrast different LDAP query types on ESA
- 2.11 Describe, implement, and troubleshoot WCCP redirection
- 2.12 Compare and contrast different proxy methods such as SOCKS, Auto proxy/WPAD, and transparent
- 2.13 Describe, implement, and troubleshoot HTTPS decryption and DLP
- 2.14 Describe, implement, and troubleshoot CWS connectors on Cisco IOS routers, Cisco ASA, Cisco AnyConnect, and WSA
- 2.15 Describe the security benefits of leveraging the OpenDNS solution.
- 2.16 Describe, implement, and troubleshoot SMA for centralized content security management
- 2.17 Describe the security benefits of leveraging Lancope