Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
- Describing the Cisco Email Security Appliance
- Cisco Email Security Appliance Overview
- Technology Use Case for Government
- Cisco Email Security Appliance Data Sheet
- SMTP Overview
- Email Pipeline Overview
- Installation Scenarios for Government
- Initial Cisco Email Security Appliance Configuration
- Centralizing Services on a Cisco Content Security Management Appliance (SMA)
- Release Notes for AsyncOS 11.x
- Administering the Cisco Email Security Appliance
- Distributing Administrative Tasks
- System Administration for Government
- Managing and Monitoring Using the Command Line Interface (CLI)
- Other Tasks in the GUI
- Advanced Network Configuration for Government
- Using Email Security Monitor
- Tracking Messages
- Logging for Government
- Controlling Sender and Recipient Domains
- Public and Private Listeners for Government
- Configuring the Gateway to Receive Email for Government
- Host Access Table Overview
- Recipient Access Table Overview
- Configuring Routing and Delivery Features for Government
- Controlling Spam with Talos SenderBase and Anti-Spam
- SenderBase Overview for Government
- Anti-Spam for Government
- Managing Graymail for Government
- Protecting Against Malicious or Undesirable URLs for Government
- File Reputation Filtering and File Analysis for Government
- Bounce Verification for Government
- Using Anti-Virus and Outbreak Filters
- Anti-Virus Scanning Overview for Government
- Sophos Anti-Virus Filtering for Government
- McAfee Anti-Virus Filtering for Government
- Configuring the Appliance to Scan for Viruses for Government
- Outbreak Filters for Government
- How the Outbreak Filters Feature Works for Government
- Managing Outbreak Filters for Government
- Using Mail Policies
- Email Security Manager Overview for Government
- Mail Policies Overview for Government
- Handling Incoming and Outgoing Messages Differently for Government
- Matching Users to a Mail Policy for Government
- Message Splintering for Government
- Configuring Mail Policies for Government
- Using Content Filters
- Content Filters Overview for Government
- Content Filter Conditions for Government
- Content Filter Actions for Government
- Filter Messages Based on Content for Government
- Text Resources Overview for Government
- Using and Testing the Content Dictionaries Filter Rules for Government
- Understanding Text Resources for Government
- Text Resource Management for Government
- Using Text Resources for Government
- Using Message Filters to Enforce Email Policies
- Message Filters Overview for Government
- Components of a Message Filter for Government
- Message Filter Processing for Government
- Message Filter Rules for Government
- Message Filter Actions for Government
- Attachment Scanning for Government
- Examples of Attachment Scanning Message Filters for Government
- Using the CLI to Manage Message Filters for Government
- Message Filter Examples for Government
- Configuring Scan Behavior for Government
- Preventing Data Loss
- Overview of the Data Loss Prevention (DLP) Scanning Process for Government
- Setting Up Data Loss Prevention for Government
- Policies for Data Loss Prevention for Government
- Message Actions for Government
- Updating the DLP Engine and Content Matching Classifiers for Government
- Using LDAP
- Overview of LDAP for Government
- Working with LDAP for Government
- Using LDAP Queries for Government
- Authenticating End-Users of the Spam Quarantine for Government
- Configuring External LDAP Authentication for Users for Government
- Testing Servers and Queries for Government
- Using LDAP for Directory Harvest Attack Prevention for Government
- Spam Quarantine Alias Consolidation Queries for Government
- Validating Recipients Using an SMTP Server for Government
- SMTP Session Authentication
- Configuring AsyncOS for SMTP Authentication for Government
- Authenticating SMTP Sessions Using Client Certificates for Government
- Checking the Validity of a Client Certificate for Government
- Authenticating User Using LDAP Directory for Government
- Authenticating SMTP Connection Over Transport Layer Security (TLS) Using a Client Certificate for Government
- Establishing a TLS Connection from the Appliance for Government
- Updating a List of Revoked Certificates for Government
- Email Authentication
- Email Authentication Overview for Government
- Configuring DomainKeys and DomainKeys Identified Mail (DKIM) Signing for Government
- Verifying Incoming Messages Using DKIM for Government
- Overview of Sender Policy Framework (SPF) and SIDF Verification for Government
- Domain-based Message Authentication Reporting and Conformance (DMARC) Verification for Government
- Forged Email Detection for Government
- Email Encryption
- Overview of Cisco Email Encryption for Government
- Encrypting Messages for Government
- Determining Which Messages to Encrypt for Government
- Inserting Encryption Headers into Messages for Government
- Encrypting Communication with Other Message Transfer Agents (MTAs) for Government
- Working with Certificates for Government
- Managing Lists of Certificate Authorities for Government
- Enabling TLS on a Listener’s Host Access Table (HAT) for Government
- Enabling TLS and Certificate Verification on Delivery for Government
- Secure/Multipurpose Internet Mail Extensions (S/MIME) Security Services for Government
- Using System Quarantines and Delivery Methods
- Describing Quarantines for Government
- Spam Quarantine for Government
- Setting Up the Centralized Spam Quarantine for Government
- Using Safelists and Blocklists to Control Email Delivery Based on Sender for Government
- Configuring Spam Management Features for End Users for Government
- Managing Messages in the Spam Quarantine for Government
- Policy, Virus, and Outbreak Quarantines for Government
- Managing Policy, Virus, and Outbreak Quarantines for Government
- Working with Messages in Policy, Virus, or Outbreak Quarantines for Government
- Delivery Methods for Government
- Centralized Management Using Clusters
- Overview of Centralized Management Using Clusters for Government
- Cluster Organization for Government
- Creating and Joining a Cluster for Government
- Managing Clusters for Government
- Cluster Communication for Government
- Loading a Configuration in Clustered Appliances for Government
- Best Practices for Government
- Testing and Troubleshooting
- Debugging Mail Flow Using Test Messages: Trace for Government
- Using the Listener to Test the Appliance for Government
- Troubleshooting the Network for Government
- Troubleshooting the Listener for Government
- Troubleshooting Email Delivery for Government
- Troubleshooting Performance for Government
- Web Interface Appearance and Rendering Issues for Government
- Responding to Alerts for Government
- Troubleshooting Hardware Issues for Government
- Working with Technical Support for Government
- References
- Model Specifications for Large Enterprises for Government
- Model Specifications for Midsize Enterprises and Small-to-Midsize Enterprises or Branch Offices for Government
- Cisco Email Security Appliance Model Specifications for Virtual Appliances for Government
- Packages and Licenses for Government
Requirements
To fully benefit from this course for government professionals, you should have one or more of the following basic technical competencies:
- Cisco certification (Cisco CCENT® certification or higher)
- Relevant industry certification, such as (ISC)2, CompTIA Security+, EC-Council, Global Information Assurance Certification (GIAC), and ISACA
- Cisco Networking Academy letter of completion (CCNA® 1 and CCNA 2)
- Windows expertise: Microsoft [Microsoft Specialist, Microsoft Certified Solutions Associate (MCSA), Microsoft Certified Systems Engineer (MCSE)], CompTIA (A+, Network+, Server+)
The knowledge and skills that a student must have before attending this course for government are:
- Understanding of TCP/IP services, including Domain Name System (DNS), Secure Shell (SSH), FTP, Simple Network Management Protocol (SNMP), HTTP, and HTTPS
- Experience with IP routing
28 Hours
Testimonials (2)
Questions, that helps me a lot to understand the characteristics of CRISC examination.
Masakazu Yoshijima - Bank of Yokohama, Ltd.
Course - CRISC - Certified in Risk and Information Systems Control
I liked the in-depth knowledge about the subject of the trainer, good explanation, highlighting important things!.