Cisco træning

Insoft Services er en af de få uddannelsesudbydere i EMEAR, der tilbyder hele spektret af Cisco-certificering og specialiseret teknologiuddannelse.

Lær hvordan

Cisco-certificeringer

Oplev en blandet læringsmetode, der kombinerer det bedste fra instruktørstyret træning og e-læring i eget tempo for at hjælpe dig med at forberede dig til din certificeringseksamen.

Lær hvordan

Cisco Learning Credits

Cisco Learning Credits (CLCs) er forudbetalte træningskuponer, der indløses direkte med Cisco, og som gør det nemmere at planlægge din succes, når du køber Cisco-produkter og -tjenester.

Lær hvordan

Cisco Efteruddannelse

Cisco Continuing Education Program tilbyder alle aktive certificeringsindehavere fleksible muligheder for at gencertificere ved at gennemføre en række kvalificerede træningselementer.

Lær hvordan

Cisco Digital Learning

Certificerede medarbejdere er VÆRDSATTE aktiver. Udforsk Ciscos officielle digitale læringsbibliotek for at uddanne dig selv gennem optagede sessioner.

Lær hvordan

Cisco Business Enablement

Cisco Business Enablement Partner Program fokuserer på at skærpe Cisco Channel Partners og kunders forretningsmæssige færdigheder.

Lær hvordan

Cisco kursuskatalog

Lær hvordan

Fortinet-certificeringer

Fortinet Network Security Expert (NSE) -programmet er et otte-niveau uddannelses- og certificeringsprogram for at undervise ingeniører i deres netværkssikkerhed for Fortinet FW-færdigheder og erfaring.

Lær hvordan

Fortinet træning

Insoft er anerkendt som Autoriseret Fortinet Training Center på udvalgte steder på tværs af EMEA.

Tekniske kurser

Fortinet kursuskatalog

Udforsk hele Fortinet-træningskataloget. Programmet omfatter en bred vifte af selvstændige og instruktørledede kurser.

Lær hvordan

ATC-status

Tjek vores ATC-status på tværs af udvalgte lande i Europa.

Lær hvordan

Fortinet Professionelle Services

Globalt anerkendte team af certificerede eksperter hjælper dig med at gøre en mere jævn overgang med vores foruddefinerede konsulent-, installations- og migreringspakker til en lang række Fortinet-produkter.

Lær hvordan

Microsoft træning

Insoft Services tilbyder Microsoft-undervisning i EMEAR. Vi tilbyder Microsoft tekniske kurser og certificeringskurser, der ledes af instruktører i verdensklasse.

Tekniske kurser

Extreme træning

Find all the Extreme Networks online and instructor led class room based calendar here.

Tekniske kurser

Tekniske certificeringer

Vi leverer omfattende læseplan for tekniske kompetencefærdigheder på certificeringspræstationen.

Lær hvordan

Extreme kursuskatalog

Lær hvordan

ATP-akkreditering

Som autoriseret uddannelsespartner (ATP) sikrer Insoft Services, at du får de højeste uddannelsesstandarder, der findes.

Lær hvordan

Løsninger og tjenester

Vi leverer innovativ og avanceret support til design, implementering og optimering af IT-løsninger. Vores kundebase omfatter nogle af de største Telcos globalt.

Lær hvordan

Globalt anerkendte team af certificerede eksperter hjælper dig med at gøre en mere jævn overgang med vores foruddefinerede konsulent-, installations- og migreringspakker til en lang række Fortinet-produkter.

Om os

Insoft tilbyder autoriseret uddannelses- og konsulentbistand til udvalgte IP-leverandører. Få mere at vide om, hvordan vi revolutionerer branchen.

Lær hvordan
  • +45 32 70 99 90
  • Network Forensics Administration

    Duration
    1 Dag
    Delivery
    (Online Og På stedet)
    Price
    Pris på forespørgsel

    This entry-level course covers deployment options, basic administration, and configuration of the integrated Trellix technologies for the Trellix Network Forensics appliances—Packet Capture and Investigation Analysis.

     

    Hands-on activities include post-installation tasks, system health checks, pairing a Packet Capture appliance with the Investigation Analysis system, daily system administration tasks, configuring Event Based Capture, and integration of another Trellix system for alerts.

    • Provide an overview of Packet Capture and Investigation Analysis appliances.
    • Describe the common deployment of Packet Capture and Investigation Analysis in the context of other Trellix products and services.
    • Access the various administration interfaces for Packet Capture and Investigation Analysis.
    • Perform primary management and administration tasks for Packet Capture and Investigation Analysis.
    • Configure and integrate Packet Capture and Investigation Analysis with various supported Trellix technologies.

    1. Appliance Overview and Network Placement

    • Packet Capture
    • Packet Capture: Deployments
    • Investigation Analysis
    • Investigation Analysis: Deployments
    • Network Forensics: Appliance relationship
    • Basic hardware components
    • Network Forensics integrations overview
    • Lab: Start up the training environment

    2. Network Forensics Administration Interfaces

    • Network Forensics administration interfaces
    • CLI via SSH
    • CLI via the IPMI
    • Accessing admin-level commands
    • Configuration mode
    • Accessing the Web UI
    • Lab: Configure Packet Capture (PX)
    • Lab: Configure Investigation Analysis (IA)

    3. Network Forensics Administration Tasks

    • Identity management
    • Authentication
    • CLI authentication type
    • CAC/PIV authentication
    • Local users and roles
    • System management
    • Processes
    • Restarting processes
    • Logs
    • Web UI admin pages
    • Show command
    • IA appliance groups
    • Rules and software management
    • Uploading software on Investigation Analysis
    • Updating software from Investigation Analysis
    • Configuring and deploying EBC
    • Load management
    • PX metadata filtering
    • DNS aggregation management
    • Lab: Pair Packet Capture and Investigation Analysis

    4. Configuring Trellix Integrations

    • Packet Capture and Helix
    • Packet Capture and Threat Intelligence
    • Packet Capture and Network Security
    • Investigation Analysis and Packet Capture
    • Investigation Analysis and Trellix alert aggregation
    • Investigation Analysis and Malware Analysis
    • Utilizing Network Security as a sensor
    • Investigation Analysis and Endpoint Security (HX for host metadata)
    • Lab: Set up Network Forensics aggregated alerts with an integrated Trellix system

    Network security professionals and system administrators who operate and administer Trellix Packet Capture and Investigation Analysis appliances and integrate them with other Trellix technologies.

    A working understanding of the command line interface (CLI) and the Linux Operating system, and familiarity with network security.

    This entry-level course covers deployment options, basic administration, and configuration of the integrated Trellix technologies for the Trellix Network Forensics appliances—Packet Capture and Investigation Analysis.

     

    Hands-on activities include post-installation tasks, system health checks, pairing a Packet Capture appliance with the Investigation Analysis system, daily system administration tasks, configuring Event Based Capture, and integration of another Trellix system for alerts.

    • Provide an overview of Packet Capture and Investigation Analysis appliances.
    • Describe the common deployment of Packet Capture and Investigation Analysis in the context of other Trellix products and services.
    • Access the various administration interfaces for Packet Capture and Investigation Analysis.
    • Perform primary management and administration tasks for Packet Capture and Investigation Analysis.
    • Configure and integrate Packet Capture and Investigation Analysis with various supported Trellix technologies.

    1. Appliance Overview and Network Placement

    • Packet Capture
    • Packet Capture: Deployments
    • Investigation Analysis
    • Investigation Analysis: Deployments
    • Network Forensics: Appliance relationship
    • Basic hardware components
    • Network Forensics integrations overview
    • Lab: Start up the training environment

    2. Network Forensics Administration Interfaces

    • Network Forensics administration interfaces
    • CLI via SSH
    • CLI via the IPMI
    • Accessing admin-level commands
    • Configuration mode
    • Accessing the Web UI
    • Lab: Configure Packet Capture (PX)
    • Lab: Configure Investigation Analysis (IA)

    3. Network Forensics Administration Tasks

    • Identity management
    • Authentication
    • CLI authentication type
    • CAC/PIV authentication
    • Local users and roles
    • System management
    • Processes
    • Restarting processes
    • Logs
    • Web UI admin pages
    • Show command
    • IA appliance groups
    • Rules and software management
    • Uploading software on Investigation Analysis
    • Updating software from Investigation Analysis
    • Configuring and deploying EBC
    • Load management
    • PX metadata filtering
    • DNS aggregation management
    • Lab: Pair Packet Capture and Investigation Analysis

    4. Configuring Trellix Integrations

    • Packet Capture and Helix
    • Packet Capture and Threat Intelligence
    • Packet Capture and Network Security
    • Investigation Analysis and Packet Capture
    • Investigation Analysis and Trellix alert aggregation
    • Investigation Analysis and Malware Analysis
    • Utilizing Network Security as a sensor
    • Investigation Analysis and Endpoint Security (HX for host metadata)
    • Lab: Set up Network Forensics aggregated alerts with an integrated Trellix system

    Network security professionals and system administrators who operate and administer Trellix Packet Capture and Investigation Analysis appliances and integrate them with other Trellix technologies.

    A working understanding of the command line interface (CLI) and the Linux Operating system, and familiarity with network security.

      Kommende datoer
      Dato på anmodning

    Follow Up Courses

    Filtrer
    • 2 Dage
      Dato på anmodning
      Price on Request
      Book Now
    • 3 Dage
      Dato på anmodning
      Price on Request
      Book Now
    • 4 Dage
      Dato på anmodning
      Price on Request
      Book Now
    • 4 Dage
      Dato på anmodning
      Price on Request
      Book Now
    • 4 Dage
      Dato på anmodning
      Price on Request
      Book Now
    • 1 Dag
      Dato på anmodning
      Price on Request
      Book Now
    • 4 Dage
      Dato på anmodning
      Price on Request
      Book Now
    • 2 Dage
      Dato på anmodning
      Price on Request
      Book Now
    • 4 Dage
      Dato på anmodning
      Price on Request
      Book Now
    • 5 Dage
      Dato på anmodning
      Price on Request
      Book Now

    Know someone who´d be interested in this course?
    Let them know...

    Use the hashtag #InsoftLearning to talk about this course and find students like you on social media.