Securing Email with Cisco Email Security Appliance

Datum
09/11/2020 - 11/11/2020
Ganztägig
Kalender-Import: iCal

Veranstaltungsort
ETC Trainingcenter
Modecenterstrasse 22, 1030 - Wien




Für dieses Seminar werden folgende Kenntnisse empfohlen:
Um das Wissen des Kurses in vollem Umfang nutzen zu können, sollten Sie über eine oder mehrere der folgenden technischen Grundkompetenzen verfügen:

  • Cisco-Zertifizierung (Cisco CCENT®-Zertifizierung oder höher)
  • Relevante Branchenzertifizierung wie (ISC) 2, CompTIA Security +, EC-Council, Global Information Assurance-Zertifizierung (GIAC) und ISACA
  • Abschlussbestätigung der Cisco Networking Academy (CCNA® 1 und CCNA 2)
  • Windows-Kenntnisse: Microsoft [Microsoft-Spezialist, Microsoft Certified Solutions Associate (MCSA), Microsoft Certified Systems Engineer (MCSE)], CompTIA (A +, Network +, Server +)

 

Die Kenntnisse und Fähigkeiten, die ein Teilnehmer haben muss, bevor er an diesem Kurs teilnimmt, sind:

  • TCP / IP-Dienste, einschließlich DNS (Domain Name System), SSH (Secure Shell), FTP, SNMP (Simple Network Management Protocol), HTTP und HTTPS
  • Erfahrung mit IP-Routing

Dieses Seminar zeigt, wie Sie die Cisco Email Security Appliance bereitstellen und verwenden, um Schutz für Ihre E-Mail-Systeme vor Phishing, geschäftlicher E-Mail-Gefahren und Ransomware zu schaffen und die E-Mail-Sicherheit zu optimieren. Dieser praktische Kurs vermittelt Ihnen das Wissen und die Fähigkeiten zur Implementierung, Fehlerbehebung und Verwaltung der Cisco Email Security Appliance, einschließlich der wichtigsten Funktionen wie erweiterter Malware-Schutz, Spam-Blockierung, Virenschutz, Outbreak Filterung, Verschlüsselung, Quarantäne und Verlust von Daten.

Nach Abschluss des Seminars haben die Teilnehmer Kenntnisse zu folgenden Themen:

  • Installation und Administration der Cisco ESA
  • Überwachung der Sender- und Empfänger-Domäne
  • Überwachung von Spam mit Hilfe von Cisco SensorBase und Antispam
  • Einsatz von Antivirus- und Outbreak-Filtern sowie Mail-Policies und Content-Filtern
  • Vermeidung eines Datenverlustes
  • Verwendung von LDAP
  • Einsatz von Authentisierung und Verschlüsselung
  • Message-Filter
  • Einsatz von System-Quarantänen und Zustellungs-Methoden
  • Clustering
  • Troubleshooting
  •  

Dieses Seminar richtet sich an:

  • Securits Archtiekten und System Designer
  • Netzwerk Administratoren und Operations Engineers
  • Netzwerk und Security Managers, die für die Email Sicherheit zuständig sind
  • Describing the Cisco Email Security Appliance

    • Cisco Email Security Appliance Overview
    • Technology Use Case
    • Cisco Email Security Appliance Data Sheet
    • SMTP Overview
    • Email Pipeline Overview
    • Installation Scenarios
    • Initial Cisco Email Security Appliance Configuration
    • Centralizing Services on a Cisco Content Security Management Appliance (SMA)
    • Release Notes for AsyncOS 11.x

    Administering the Cisco Email Security Appliance

    • Distributing Administrative Tasks
    • System Administration
    • Managing and Monitoring Using the Command Line Interface (CLI)
    • Other Tasks in the GUI
    • Advanced Network Configuration
    • Using Email Security Monitor
    • Tracking Messages
    • Logging

    Controlling Sender and Recipient Domains

    • Public and Private Listeners
    • Configuring the Gateway to Receive Email
    • Host Access Table Overview
    • Recipient Access Table Overview
    • Configuring Routing and Delivery Features

    Controlling Spam with Talos SenderBase and Anti-Spam

    • SenderBase Overview
    • Anti-Spam
    • Managing Graymail
    • Protecting Against Malicious or Undesirable URLs
    • File Reputation Filtering and File Analysis
    • Bounce Verification

    Using Anti-Virus and Outbreak Filters

    • Anti-Virus Scanning Overview
    • Sophos Anti-Virus Filtering
    • McAfee Anti-Virus Filtering
    • Configuring the Appliance to Scan for Viruses
    • Outbreak Filters
    • How the Outbreak Filters Feature Works
    • Managing Outbreak Filters

    Using Mail Policies

    • Email Security Manager Overview
    • Mail Policies Overview
    • Handling Incoming and Outgoing Messages Differently
    • Matching Users to a Mail Policy
    • Message Splintering
    • Configuring Mail Policies

    Using Content Filters

    • Content Filters Overview
    • Content Filter Conditions
    • Content Filter Actions
    • Filter Messages Based on Content
    • Text Resources Overview
    • Using and Testing the Content Dictionaries Filter Rules
    • Understanding Text Resources
    • Text Resource Management
    • Using Text Resources

    Using Message Filters to Enforce Email Policies

    • Message Filters Overview
    • Components of a Message Filter
    • Message Filter Processing
    • Message Filter Rules
    • Message Filter Actions
    • Attachment Scanning
    • Examples of Attachment Scanning Message Filters
    • Using the CLI to Manage Message Filters
    • Message Filter Examples
    • Configuring Scan Behavior

    Preventing Data Loss

    • Overview of the Data Loss Prevention (DLP) Scanning Process
    • Setting Up Data Loss Prevention
    • Policies for Data Loss Prevention
    • Message Actions
    • Updating the DLP Engine and Content Matching Classifiers

    Using LDAP

    • Overview of LDAP
    • Working with LDAP
    • Using LDAP Queries
    • Authenticating End-Users of the Spam Quarantine
    • Configuring External LDAP Authentication for Users
    • Testing Servers and Queries
    • Using LDAP for Directory Harvest Attack Prevention
    • Spam Quarantine Alias Consolidation Queries
    • Validating Recipients Using an SMTP Server

    SMTP Session Authentication

    • Configuring AsyncOS for SMTP Authentication
    • Authenticating SMTP Sessions Using Client Certificates
    • Checking the Validity of a Client Certificate
    • Authenticating User Using LDAP Directory
    • Authenticating SMTP Connection Over Transport Layer Security (TLS) Using a Client Certificate
    • Establishing a TLS Connection from the Appliance
    • Updating a List of Revoked Certificates

    Email Authentication

    • Email Authentication Overview
    • Configuring DomainKeys and DomainKeys Identified MailDKIM) Signing
    • Verifying Incoming Messages Using DKIM
    • Overview of Sender Policy FrameworkSPF) and SIDF Verification
    • Domain-based Message Authentication Reporting and Conformance (DMARC) Verification
    • Forged Email Detection

    Email Encryption

    • Overview of Cisco Email Encryption
    • Encrypting Messages
    • Determining Which Messages to Encrypt
    • Inserting Encryption Headers into Messages
    • Encrypting Communication with Other Message Transfer Agents (MTAs)
    • Working with Certificates
    • Managing Lists of Certificate Authorities
    • Enabling TLS on a Listener’s Host Access Table (HAT)
    • Enabling TLS and Certificate Verification on Delivery
    • Secure/Multipurpose Internet Mail Extensions (S/MIME) Security Services

    Using System Quarantines and Delivery Methods

    • Describing Quarantines
    • Spam Quarantine
    • Setting Up the Centralized Spam Quarantine
    • Using Safelists and Blocklists to Control Email Delivery Based on Sender
    • Configuring Spam Management Features for End Users
    • Managing Messages in the Spam Quarantine
    • Policy, Virus, and Outbreak Quarantines
    • Managing Policy, Virus, and Outbreak Quarantines
    • Working with Messages in Policy, Virus, or Outbreak Quarantines
    • Delivery Methods

    Centralized Management Using Clusters

    • Overview of Centralized Management Using Clusters
    • Cluster Organization
    • Creating and Joining a Cluster
    • Managing Clusters
    • Cluster Communication
    • Loading a Configuration in Clustered Appliances
    • Best Practices

    Testing and Troubleshooting

    • Debugging Mail Flow Using Test Messages: Trace
    • Using the Listener to Test the Appliance
    • Troubleshooting the Network
    • Troubleshooting the Listener
    • Troubleshooting Email Delivery
    • Troubleshooting Performance
    • Web Interface Appearance and Rendering Issues
    • Responding to Alerts
    • Troubleshooting Hardware Issues
    • Working with Technical Support

    References

    • Model Specifications for Large Enterprises
    • Model Specifications for Midsize Enterprises and Small-to-Midsize Enterprises or Branch Offices
    • Cisco Email Security Appliance Model Specifications for Virtual Appliances
    • Packages and Licenses

    Kategorien


    Mehr Artikel