• Classroom
  • Online, Instructor-Led
Course Description

The Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention (SFWIPF) training shows you how to implement and configure Cisco Secure Firewall Threat Defense for deployment as a next-generation firewall at the internet edge. You’ll gain an understanding of Cisco Secure Firewall architecture and deployment, base configuration, packet processing, and advanced options, and conducting Secure Firewall administration troubleshooting.

Learning Objectives

Describe Cisco Secure Firewall Threat Defense Describe Cisco Secure Firewall Threat Defense Deployment Options Describe management options for Cisco Secure Firewall Threat Defense Configure basic initial settings on Cisco Secure Firewall Threat Defense Configure high availability on Cisco Secure Firewall Threat Defense Configure basic Network Address Translation on Cisco Secure Firewall Threat Defense Describe Cisco Secure Firewall Threat Defense policies and explain how different policies influence packet processing through the device Configure Discovery Policy on Cisco Secure Firewall Threat Defense Configure and explain prefilter and tunnel rules in the prefilter policy Configure an access control policy on Cisco Secure Firewall Threat Defense Configure security intelligence on Cisco Secure Firewall Threat Defense Configure file policy on Cisco Secure Firewall Threat Defense Configure Intrusion Policy on Cisco Secure Firewall Threat Defense Perform basic threat analysis using Cisco Secure Firewall Management Center Perform basic management and system administration tasks on Cisco Secure Firewall Threat Defense Perform basic traffic flow troubleshooting on Cisco Secure Firewall Threat Defense Manage Cisco Secure Firewall Threat Defense with Cisco Secure Firewall Threat Defense Manager

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Defense Analysis
  • Cyber Defense Infrastructure Support
  • Cyber Investigation
  • Digital Forensics
  • Exploitation Analysis
  • Network Services
  • Risk Management
  • Software Development
  • Test and Evaluation
  • Threat Analysis
  • Training, Education, and Awareness
  • Vulnerability Assessment and Management