SlideShare a Scribd company logo
Building Up Network Security
Catherine Paquet, MBA (MIS)
CCSI, CICSI, CCNP Sec, CCNP R&S
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 2
About the presenter - Catherine Paquet
 Cisco security instructor
 Cisco Press author
 Cisco Systems emerging
countries guest speaker
 Graduate of Royal Military
College and York University
 Previously: DND WAN Manager
 Lives in Toronto
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 3
Topics: Building Up Network Security
 Current state of Network Security
 Firewall
 IPS and Sourcefire
 Identity Services and Cisco ISE
 Network Access Control
 Guest Services and BYOD
 Profiling and Posturing
 VPN and Site-to-Site
 Remote Access VPN and AnyConnect
 Email and Web Security
State of Network Security
Facts
Evolution
ROSI
Topology
Facts
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 6
Cisco Annual Security Report 2015: Findings
 Users unknowingly aiding cyber attacks
 Email exploits
 250% increase in spam and malvertising exploits
 Snowshoe Spam: low volumes of email from a large set of IP addresses
 Web exploits
 Less common kits used
 Malicious combinations: exploit over two files ex: flash + javascript
Source: www.cisco.com/go/securityreport
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 7
Cisco Annual Security Report 2015 - Actions
 Security must:
 support the business
 work with existing architecture – and be usable
 be transparent and informative
 enable visibility and appropriate action
 be viewed as a "people problem"
Source: www.cisco.com/go/securityreport
Evolution of Security Philosophy
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 9
Recent Shift in Security Approach
 Past → role-based control
 Present → rule-based control
CONTEXT
Who, What, Where, When, How
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 10
CONTEXT IS EVERYTHING
 Who: Jane Doe, member of the sales group
 What: Corporate laptop
 Where: HQ 2nd floor
 When: July 16th, 2016 at 13:27
 How: Wired Ethernet with 802.1X
IF….., THEN….., and sometimes, ELSE…...
User CustomLocationDevice Type TimePosture Access Method
Terminology
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 12
Glossary
AAA: Authentication, Authorization, Accounting
AD: Active Directory
AES: Advanced Encryption Standard
AMP: Advanced Malware Protection
AP: Access Point
ASA: Adaptive Security Appliance (firewall)
BYOD: Bring Your Own Device
CDA: Cisco Directory Agent
CWA: Centralized Web Authentication
DES: Digital Encryption Standard
DHCP: Dynamic Host Configuration Protocol
DMZ: Demilitarized Zone
DART: Diagnostic And Reporting Tool AnyConnect
DC: Domain Controller
ESA: Email Security Appliance
FSMC: FireSIGHT Mgmt Center (formerly SFDC)
IDS: Intrusion Detection System
IP: Internet Protocol
IPS: Intrusion Prevention System
ISE: Identity Services Engine
ISR: Integrated Services Router
LAN: Local Area Network
LDAP: Light Directory Access Protocol
MAB: MAC Authentication Bypass
MAC: Media Access Control
Malvertising: Malware hidden in advertisement
MD5: Message Digest 5
MDM: Mobile Device Management
NAC: Network Admission Control
NAD: Network Access Device
NIC: Network Interface Card
NGFW: Next Generation Firewall
NGIPS: Next Generation IPS
PKI: Public Key Infrastructure
RADIUS: Remote Authentication Dial-In User Service
ROI: Return on Investment
ROSI: Return on Security Investment
SaaS: Security-as-a-Service
SAML: Security Assertion Markup Language
SSID: Service Set Identifier
SF: Sourcefire
SFDC: Sourcefire Defense Center
SHA: Secure Hash Algorithm
SIO: Security Intelligence Operations (Cisco)
SSL: Secure Session Layer
SYN: Synchronization flag and stage of TCP
TALOS: Cisco SIO + Sourcefire VRT
TCP: Transmission Control Protocol
VPN: Virtual Private Network
VRT: Vulnerability Research Team (Sourcefire)
WAN: Wide Area Network
WLAN: Wireless Local Area Network
WLC: Wireless LAN controller
WMI: Windows Management Instrumentation
WSA: Web Security Appliance
Security Roadmap
Topology
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 14
Firewall
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 16
Most Bang for Your Buck: The Firewall
Basic Moderate Comprehensive
Security Expenditure
Risk
$
} residual risk
More on the subject of synergistic controls:
Business Case for Network Security, The: Advocacy, Governance, and ROI
By Catherine Paquet, Cisco Press, 2005. ISBN ISBN-10: 1-58720-121-6
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 17
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 18
ASA Firewall Capabilities
 Stateful Firewall with AIC
 Botnet detection
 IPS built in capability with service module
 SYN flood protection
 Scanning threat detection and prevention
 Decryption and inspection of specific protocols
 Modular Policy Framework
 Remote-Access VPN: IPsec and SSL
 Site-to-Site VPN
 Identity-Based Firewall
 DHCP server and client
 Dynamic Routing
 Static Route Tracking
 Transparent and Routed modes
 Redundant interfaces
 EtherChannel
 Multimode aka virtualization
 Clustering
 Strong management with AAA
 OOB Management
 Failover
 Zero Downtime Upgrade
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 19
Intrusion Prevention Systems
Sourcefire
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 21
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 22
Sourcefire Acquisition
 Mid-2013
 $2.7B
 Hardware and software
 Based on Snort IPS
 File thumbprints, sandboxing
 Protection beyond point-in-time
 Visibility through dashboards
 Analysis of behaviours
 Containment
 Martin Roesch created Snort, on open-based IDS, in 1998 and founded Sourcefire in 2001
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 23
Integrated and Standalone Platforms
 AMP appliance
 ASA module
 ESA
 WSA
 CWS
 AMPfire (Desktop: AnyConnect 4.1 AMP Enabler)
Cisco AMP 8140 (hardware)
Cisco WSA with AMP (software)
HQ-ASA# show module sfr details
Getting details from the Service Module, please wait...
Card Type: FirePOWER Services Software Module
Model: ASA5515
Hardware version: N/A
Serial Number: FCH180278XU
Cisco ASA with Sourcefire (software)
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 24
The Sourcefire Advantage
 AMP* everywhere, with real before, during, after
* Advanced Malware Protection
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 25
Sourcefire Visibility and Management
 FireSIGHT Management Center*
* formerly Sourcefire Defense Center
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 26
Network File Trajectory
Identity Services
ISE
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 28
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 29
ISE Capabilities
 Authentication*
 802.1X
 MAB
 Web Authentication
 Authorization*
 Guest Services
 BYOD
 MDM
 Profiling
 Posturing
 CA server
ISE
Source: Cisco Blog > Security> BYOD Presentations at Cisco Live Cancun 2012* ISE is a RADIUS server
Network Access Control
802.1X / MAB
Web Authentication
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 31
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 32
Authentication and Authorization: ISE RADIUS server
ISE
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 33
802.1X / MAB Authentication
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 34
Centralized Web Authentication
Source: Cisco Identity Services Engine User Guide, Release 1.2
Guest Services and BYOD
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 36
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 37
Guest Services
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 38
Guests: Access to Internet
ISE
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 39
BYOD: For employees not visitors
Source: Cisco SISE 1.1 Courseware
Before BYOD:
With BYOD - Onboarding:
ISE recognizes that an employee authenticated on AD through Guest Portal
1. CA Certificate installation
2. Device Registration
3. Certificate Enrollment
4. WIFI Profile installation
Profiling and Posturing
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 41
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 42
Advantages of Profiling
 Discover and locate endpoints
 Maintain a learnt inventory
 Determine endpoint capabilities and identity group
 Attributes are used in authentication and authorization conditions
Source: Cisco SISE 1.1 courseware
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 43
Profiling
If Device: Apple-iPad, then apply Authorization Policies: Tablets
Source: Cisco SISE 1.1 courseware
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 44
Profiling Results: Endpoints database in ISE
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 45
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 46
ISE Posturing policies
 Provisioning
 Posturing
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 47
MDM: Posturing for Mobile Devices
Source: Cisco Identity Services Engine Administrator Guide, Release 1.4
VPN
Site-to-Site
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 49
VPN
 Confidentiality: Encryption
 AES
 3DES
 Integrity: Hashing
 MD5
 SHA
 Authenticity: Authentication
 Pre-shared Key
 PKI
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 50
VPN
Site-to-Site
Remote Access IPsec
SSL Client
Clientless
Client VPN Client (legacy)
AnyConnect
Port Forwarding
Plug-ins
Smart Tunnels
Thin client
IPsec*
** AnyConnect 3.x offers IPSec IKEv2
* On Cisco Routers, Site-to-Site VPN can also be achieved with DMVPN and GET
VPN Technologies
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 51
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 52
Site-to-Site VPN
Source: Cisco SIMOS courseware
Remote-Access VPN
AnyConnect
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 54
VPN
Site-to-Site
Remote Access IPsec
SSL Client
Clientless
Client VPN Client (legacy)
AnyConnect
Port Forwarding
Plug-ins
Smart Tunnels
Thin client
IPsec*
** AnyConnect 3.x offers IPSec IKEv2
* On Cisco Routers, Site-to-Site VPN can also be achieved with DMVPN and GET
VPN Technologies
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 55
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 56
What comes to mind when you hear AnyConnect?
SSL VPN
 IPsec
AnyConnect replaces:
 VPN Client
 Secure Services Client
 AnyWhere+
 NAC Agent
 Host Scan
 Phone Home
 DART
 AMP*
 Cloud Web Security
 Network Access Manager
 ISE Posture NEW: next slide
* Released with AnyConnect 4.1
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 57
AnyConnect for ISE Posture
 No need for NAC client anymore
Email and Web Security
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 59
Cisco and Email/Web Security
 Cisco is not commonly known for a focus on proxies
 In 2007, Cisco paid $830M for IronPort Application Security Gateways:
 Email Security Appliance
 Web Security Appliance
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 60
The Artist Formerly Known as: Ironport
 So, why paying so much for server?
 SenderBase – Reputation Score
SensorBase
SIO
TALOS
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 61
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 62
Hygiene Pipeline of Cisco ESA
Source: Cisco SESA 2.1 courseware
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 63
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 64
Web Security
 Old adage: HTTP is the new TCP
 Many applications and services now run overtop HTTP and HTTPS
 Filtering and inspecting web traffic is becoming a requirement:
 Compliance
 Peace of mind
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 65
WSA Acceptable Usage Policies
 URL filtering
 Anti-malware security
 Bandwidth controls
 Application controls
 Identity-based security
 HTTPS inspection
 Data Loss protection
 SaaS Access Control
Q & A
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 67
Conclusion
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 69
Cisco Security Courses
 CCNA Security e-Camp
 IINS - Implementing Cisco IOS Network Security
 SAEXS - Cisco ASA Express Security
 SENSS - Implementing Cisco Edge Network Security
Solutions
 SIMOS - Implementing Cisco Secure Mobility
Solutions
 SISAS - Implementing Cisco Secure Access
Solutions
 SITCS - Implementing Cisco Threat Control Solution
 ASA Lab Camp v9.0
 SASAA - Implementing Advanced Cisco ASA
Security
 SASAC - Implementing Core Cisco ASA Security
 ACS - Cisco Secure Access Control System
 SISAS - Implementing Cisco Secure Access
Solutions
 SISE - Implementing and Configuring Cisco Identity
Services Engine
 SESA - Securing Email with Cisco Email Security
Appliance
 SWSA - Securing the Web with Cisco Web Security
Appliance
 Cisco FirePOWER Services and Cloud Web Security
Workshop v1.0
 SSFAMP - Securing Cisco Networks with Sourcefire
FireAMP Endpoints
 SSFIPS - Securing Cisco Networks with Sourcefire
Intrusion Prevention System
 SSFRULES - Securing Cisco Networks with Snort
Rule Writing Best Practices
 SSFSNORT - Securing Cisco Networks with Open
Source Snort
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 70
Sources
 Cisco Security Blog
 Cisco SAFE Design Guide
 Cisco Identity Services Engine User Guide
 Cisco PKI Service for Large Scale IPsec Aggregation Design Guide
 Cisco Live presentations (CCO login required)
 BRKSEC-1030 San Diego 2015
 Cisco courseware SIMOS / SISE / SESA / SWSA / SASAA / SASAC
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 71
GK Cisco Training Exclusives
 6 months of
 Anytime access to Cisco Practice Labs
 Anytime Access to Boson Practice Exams
 On-Demand Access to Searchable Class Recordings of Your Virtual Class
 Unlimited Retakes of Your Class
 Free Cisco Certification Exam Voucher
© Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 72
Find Out More
www.globalknowledge.ca
On-demand & live webinars, white papers, blog...
www.globalknowledge.ca/security
Courses

More Related Content

What's hot

Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Erin Sweeney
 

What's hot (20)

Talos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the NoiseTalos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the Noise
 
Presentation cisco iron port e-mail security solution
Presentation   cisco iron port e-mail security solutionPresentation   cisco iron port e-mail security solution
Presentation cisco iron port e-mail security solution
 
Two for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content ProtectionTwo for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content Protection
 
Cisco ASA con fire power services
Cisco ASA con fire power services Cisco ASA con fire power services
Cisco ASA con fire power services
 
IronPort
IronPortIronPort
IronPort
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto Presentation
 
Cisco's 2016 Annual Security report
Cisco's 2016 Annual Security reportCisco's 2016 Annual Security report
Cisco's 2016 Annual Security report
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013
 
My Final Year Project
My Final Year ProjectMy Final Year Project
My Final Year Project
 
Understanding ransomware
Understanding ransomwareUnderstanding ransomware
Understanding ransomware
 
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
Cisco connect winnipeg 2018   stealthwatch whiteboard session and cisco secur...Cisco connect winnipeg 2018   stealthwatch whiteboard session and cisco secur...
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
 
Sourcefire Webinar - NEW GENERATION IPS
Sourcefire Webinar -  NEW GENERATION IPSSourcefire Webinar -  NEW GENERATION IPS
Sourcefire Webinar - NEW GENERATION IPS
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
SourceFire IPS Overview
SourceFire IPS OverviewSourceFire IPS Overview
SourceFire IPS Overview
 
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
Cisco ThreatGrid:  Malware Analysis and Threat IntelligenceCisco ThreatGrid:  Malware Analysis and Threat Intelligence
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
 
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
 
IPS Best Practices
IPS Best PracticesIPS Best Practices
IPS Best Practices
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 

Similar to Building Up Network Security: An Introduction

Ccnsp course outline
Ccnsp course outlineCcnsp course outline
Ccnsp course outline
Ralbary
 
Ccnsp course outline
Ccnsp course outlineCcnsp course outline
Ccnsp course outline
Ralbary
 

Similar to Building Up Network Security: An Introduction (20)

Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaProteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
 
Protegendo sua rede
Protegendo sua redeProtegendo sua rede
Protegendo sua rede
 
Cisco Network Insider Series: Securing Your Branch for DIA
Cisco Network Insider Series: Securing Your Branch for DIACisco Network Insider Series: Securing Your Branch for DIA
Cisco Network Insider Series: Securing Your Branch for DIA
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...
 
Achieving Visibility, Security and Real-Time Actionable Alerts Using VPC Flow...
Achieving Visibility, Security and Real-Time Actionable Alerts Using VPC Flow...Achieving Visibility, Security and Real-Time Actionable Alerts Using VPC Flow...
Achieving Visibility, Security and Real-Time Actionable Alerts Using VPC Flow...
 
AWS Summit Singapore 2019 | Learn How to Achieve Complete Visibility, Strong ...
AWS Summit Singapore 2019 | Learn How to Achieve Complete Visibility, Strong ...AWS Summit Singapore 2019 | Learn How to Achieve Complete Visibility, Strong ...
AWS Summit Singapore 2019 | Learn How to Achieve Complete Visibility, Strong ...
 
SAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
SAE 2014 - Cyber Security: Mission Critical for the Internet of CarsSAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
SAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
 
Monetizing The Enterprise: Borderless Networks
Monetizing The Enterprise: Borderless NetworksMonetizing The Enterprise: Borderless Networks
Monetizing The Enterprise: Borderless Networks
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
 
Breakfast Briefing- Natilik & Cisco Introducing The Network. Intuitive.
Breakfast Briefing- Natilik & Cisco Introducing The Network. Intuitive.Breakfast Briefing- Natilik & Cisco Introducing The Network. Intuitive.
Breakfast Briefing- Natilik & Cisco Introducing The Network. Intuitive.
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
 
DEVNET-1123 CSTA - Cisco Security Technical Alliances, New Program for Ecosys...
DEVNET-1123	CSTA - Cisco Security Technical Alliances, New Program for Ecosys...DEVNET-1123	CSTA - Cisco Security Technical Alliances, New Program for Ecosys...
DEVNET-1123 CSTA - Cisco Security Technical Alliances, New Program for Ecosys...
 
Idc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian AronIdc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian Aron
 
Ccnsp course outline
Ccnsp course outlineCcnsp course outline
Ccnsp course outline
 
Ccnsp course outline
Ccnsp course outlineCcnsp course outline
Ccnsp course outline
 
Gain visibility & real-time actionable security alerts with VPC Flow Logs & A...
Gain visibility & real-time actionable security alerts with VPC Flow Logs & A...Gain visibility & real-time actionable security alerts with VPC Flow Logs & A...
Gain visibility & real-time actionable security alerts with VPC Flow Logs & A...
 
SkypeShield - Securing Skype for Business
SkypeShield - Securing Skype for BusinessSkypeShield - Securing Skype for Business
SkypeShield - Securing Skype for Business
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
 

More from Global Knowledge Training

More from Global Knowledge Training (20)

Taking Advantage of Microsoft PowerShell
Taking Advantage of Microsoft PowerShell Taking Advantage of Microsoft PowerShell
Taking Advantage of Microsoft PowerShell
 
PAN-OS - Network Security/Prevention Everywhere
PAN-OS - Network Security/Prevention EverywherePAN-OS - Network Security/Prevention Everywhere
PAN-OS - Network Security/Prevention Everywhere
 
The Basics of Computer Networking
The Basics of Computer NetworkingThe Basics of Computer Networking
The Basics of Computer Networking
 
How To Troubleshoot Group Policy in Windows 10
How To Troubleshoot Group Policy in Windows 10How To Troubleshoot Group Policy in Windows 10
How To Troubleshoot Group Policy in Windows 10
 
Accelerating with Ansible
Accelerating with AnsibleAccelerating with Ansible
Accelerating with Ansible
 
Why Pentesting is Vital to the Modern DoD Workforce
Why Pentesting is Vital to the Modern DoD WorkforceWhy Pentesting is Vital to the Modern DoD Workforce
Why Pentesting is Vital to the Modern DoD Workforce
 
How to Maximize Your Training Budget
How to Maximize Your Training BudgetHow to Maximize Your Training Budget
How to Maximize Your Training Budget
 
Develop Your Skills with Unlimited Access to Red Hat Online Learning
Develop Your Skills with Unlimited Access to Red Hat Online LearningDevelop Your Skills with Unlimited Access to Red Hat Online Learning
Develop Your Skills with Unlimited Access to Red Hat Online Learning
 
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
 
What’s Next For Your Azure Certification Journey
What’s Next For Your Azure Certification JourneyWhat’s Next For Your Azure Certification Journey
What’s Next For Your Azure Certification Journey
 
Cisco's Intent-Based Networking and the Journey to Software Defined Networks
Cisco's Intent-Based Networking and the Journey to Software Defined NetworksCisco's Intent-Based Networking and the Journey to Software Defined Networks
Cisco's Intent-Based Networking and the Journey to Software Defined Networks
 
How to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity TeamHow to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity Team
 
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
 
How to Build a Web Server with AWS Lambda
How to Build a Web Server with AWS LambdaHow to Build a Web Server with AWS Lambda
How to Build a Web Server with AWS Lambda
 
The Essence of DevOps: What it Can Mean for You and Your Organization
The Essence of DevOps: What it Can Mean for You and Your OrganizationThe Essence of DevOps: What it Can Mean for You and Your Organization
The Essence of DevOps: What it Can Mean for You and Your Organization
 
How to Migrate a Web App to AWS
How to Migrate a Web App to AWSHow to Migrate a Web App to AWS
How to Migrate a Web App to AWS
 
How to Make Agile Project Management Work in Your Organization
How to Make Agile Project Management Work in Your OrganizationHow to Make Agile Project Management Work in Your Organization
How to Make Agile Project Management Work in Your Organization
 
What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?
 
How the Channel Can Break Down the Barriers to Cloud Success
How the Channel Can Break Down the Barriers to Cloud Success How the Channel Can Break Down the Barriers to Cloud Success
How the Channel Can Break Down the Barriers to Cloud Success
 
How to Avoid Cloud Migration Pitfalls
How to Avoid Cloud Migration PitfallsHow to Avoid Cloud Migration Pitfalls
How to Avoid Cloud Migration Pitfalls
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 

Building Up Network Security: An Introduction

  • 1. Building Up Network Security Catherine Paquet, MBA (MIS) CCSI, CICSI, CCNP Sec, CCNP R&S
  • 2. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 2 About the presenter - Catherine Paquet  Cisco security instructor  Cisco Press author  Cisco Systems emerging countries guest speaker  Graduate of Royal Military College and York University  Previously: DND WAN Manager  Lives in Toronto
  • 3. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 3 Topics: Building Up Network Security  Current state of Network Security  Firewall  IPS and Sourcefire  Identity Services and Cisco ISE  Network Access Control  Guest Services and BYOD  Profiling and Posturing  VPN and Site-to-Site  Remote Access VPN and AnyConnect  Email and Web Security
  • 4. State of Network Security Facts Evolution ROSI Topology
  • 6. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 6 Cisco Annual Security Report 2015: Findings  Users unknowingly aiding cyber attacks  Email exploits  250% increase in spam and malvertising exploits  Snowshoe Spam: low volumes of email from a large set of IP addresses  Web exploits  Less common kits used  Malicious combinations: exploit over two files ex: flash + javascript Source: www.cisco.com/go/securityreport
  • 7. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 7 Cisco Annual Security Report 2015 - Actions  Security must:  support the business  work with existing architecture – and be usable  be transparent and informative  enable visibility and appropriate action  be viewed as a "people problem" Source: www.cisco.com/go/securityreport
  • 9. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 9 Recent Shift in Security Approach  Past → role-based control  Present → rule-based control CONTEXT Who, What, Where, When, How
  • 10. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 10 CONTEXT IS EVERYTHING  Who: Jane Doe, member of the sales group  What: Corporate laptop  Where: HQ 2nd floor  When: July 16th, 2016 at 13:27  How: Wired Ethernet with 802.1X IF….., THEN….., and sometimes, ELSE…... User CustomLocationDevice Type TimePosture Access Method
  • 12. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 12 Glossary AAA: Authentication, Authorization, Accounting AD: Active Directory AES: Advanced Encryption Standard AMP: Advanced Malware Protection AP: Access Point ASA: Adaptive Security Appliance (firewall) BYOD: Bring Your Own Device CDA: Cisco Directory Agent CWA: Centralized Web Authentication DES: Digital Encryption Standard DHCP: Dynamic Host Configuration Protocol DMZ: Demilitarized Zone DART: Diagnostic And Reporting Tool AnyConnect DC: Domain Controller ESA: Email Security Appliance FSMC: FireSIGHT Mgmt Center (formerly SFDC) IDS: Intrusion Detection System IP: Internet Protocol IPS: Intrusion Prevention System ISE: Identity Services Engine ISR: Integrated Services Router LAN: Local Area Network LDAP: Light Directory Access Protocol MAB: MAC Authentication Bypass MAC: Media Access Control Malvertising: Malware hidden in advertisement MD5: Message Digest 5 MDM: Mobile Device Management NAC: Network Admission Control NAD: Network Access Device NIC: Network Interface Card NGFW: Next Generation Firewall NGIPS: Next Generation IPS PKI: Public Key Infrastructure RADIUS: Remote Authentication Dial-In User Service ROI: Return on Investment ROSI: Return on Security Investment SaaS: Security-as-a-Service SAML: Security Assertion Markup Language SSID: Service Set Identifier SF: Sourcefire SFDC: Sourcefire Defense Center SHA: Secure Hash Algorithm SIO: Security Intelligence Operations (Cisco) SSL: Secure Session Layer SYN: Synchronization flag and stage of TCP TALOS: Cisco SIO + Sourcefire VRT TCP: Transmission Control Protocol VPN: Virtual Private Network VRT: Vulnerability Research Team (Sourcefire) WAN: Wide Area Network WLAN: Wireless Local Area Network WLC: Wireless LAN controller WMI: Windows Management Instrumentation WSA: Web Security Appliance
  • 14. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 14
  • 16. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 16 Most Bang for Your Buck: The Firewall Basic Moderate Comprehensive Security Expenditure Risk $ } residual risk More on the subject of synergistic controls: Business Case for Network Security, The: Advocacy, Governance, and ROI By Catherine Paquet, Cisco Press, 2005. ISBN ISBN-10: 1-58720-121-6
  • 17. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 17
  • 18. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 18 ASA Firewall Capabilities  Stateful Firewall with AIC  Botnet detection  IPS built in capability with service module  SYN flood protection  Scanning threat detection and prevention  Decryption and inspection of specific protocols  Modular Policy Framework  Remote-Access VPN: IPsec and SSL  Site-to-Site VPN  Identity-Based Firewall  DHCP server and client  Dynamic Routing  Static Route Tracking  Transparent and Routed modes  Redundant interfaces  EtherChannel  Multimode aka virtualization  Clustering  Strong management with AAA  OOB Management  Failover  Zero Downtime Upgrade
  • 19. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 19
  • 21. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 21
  • 22. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 22 Sourcefire Acquisition  Mid-2013  $2.7B  Hardware and software  Based on Snort IPS  File thumbprints, sandboxing  Protection beyond point-in-time  Visibility through dashboards  Analysis of behaviours  Containment  Martin Roesch created Snort, on open-based IDS, in 1998 and founded Sourcefire in 2001
  • 23. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 23 Integrated and Standalone Platforms  AMP appliance  ASA module  ESA  WSA  CWS  AMPfire (Desktop: AnyConnect 4.1 AMP Enabler) Cisco AMP 8140 (hardware) Cisco WSA with AMP (software) HQ-ASA# show module sfr details Getting details from the Service Module, please wait... Card Type: FirePOWER Services Software Module Model: ASA5515 Hardware version: N/A Serial Number: FCH180278XU Cisco ASA with Sourcefire (software)
  • 24. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 24 The Sourcefire Advantage  AMP* everywhere, with real before, during, after * Advanced Malware Protection
  • 25. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 25 Sourcefire Visibility and Management  FireSIGHT Management Center* * formerly Sourcefire Defense Center
  • 26. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 26 Network File Trajectory
  • 28. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 28
  • 29. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 29 ISE Capabilities  Authentication*  802.1X  MAB  Web Authentication  Authorization*  Guest Services  BYOD  MDM  Profiling  Posturing  CA server ISE Source: Cisco Blog > Security> BYOD Presentations at Cisco Live Cancun 2012* ISE is a RADIUS server
  • 30. Network Access Control 802.1X / MAB Web Authentication
  • 31. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 31
  • 32. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 32 Authentication and Authorization: ISE RADIUS server ISE
  • 33. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 33 802.1X / MAB Authentication
  • 34. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 34 Centralized Web Authentication Source: Cisco Identity Services Engine User Guide, Release 1.2
  • 36. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 36
  • 37. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 37 Guest Services
  • 38. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 38 Guests: Access to Internet ISE
  • 39. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 39 BYOD: For employees not visitors Source: Cisco SISE 1.1 Courseware Before BYOD: With BYOD - Onboarding: ISE recognizes that an employee authenticated on AD through Guest Portal 1. CA Certificate installation 2. Device Registration 3. Certificate Enrollment 4. WIFI Profile installation
  • 41. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 41
  • 42. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 42 Advantages of Profiling  Discover and locate endpoints  Maintain a learnt inventory  Determine endpoint capabilities and identity group  Attributes are used in authentication and authorization conditions Source: Cisco SISE 1.1 courseware
  • 43. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 43 Profiling If Device: Apple-iPad, then apply Authorization Policies: Tablets Source: Cisco SISE 1.1 courseware
  • 44. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 44 Profiling Results: Endpoints database in ISE
  • 45. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 45
  • 46. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 46 ISE Posturing policies  Provisioning  Posturing
  • 47. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 47 MDM: Posturing for Mobile Devices Source: Cisco Identity Services Engine Administrator Guide, Release 1.4
  • 49. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 49 VPN  Confidentiality: Encryption  AES  3DES  Integrity: Hashing  MD5  SHA  Authenticity: Authentication  Pre-shared Key  PKI
  • 50. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 50 VPN Site-to-Site Remote Access IPsec SSL Client Clientless Client VPN Client (legacy) AnyConnect Port Forwarding Plug-ins Smart Tunnels Thin client IPsec* ** AnyConnect 3.x offers IPSec IKEv2 * On Cisco Routers, Site-to-Site VPN can also be achieved with DMVPN and GET VPN Technologies
  • 51. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 51
  • 52. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 52 Site-to-Site VPN Source: Cisco SIMOS courseware
  • 54. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 54 VPN Site-to-Site Remote Access IPsec SSL Client Clientless Client VPN Client (legacy) AnyConnect Port Forwarding Plug-ins Smart Tunnels Thin client IPsec* ** AnyConnect 3.x offers IPSec IKEv2 * On Cisco Routers, Site-to-Site VPN can also be achieved with DMVPN and GET VPN Technologies
  • 55. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 55
  • 56. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 56 What comes to mind when you hear AnyConnect? SSL VPN  IPsec AnyConnect replaces:  VPN Client  Secure Services Client  AnyWhere+  NAC Agent  Host Scan  Phone Home  DART  AMP*  Cloud Web Security  Network Access Manager  ISE Posture NEW: next slide * Released with AnyConnect 4.1
  • 57. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 57 AnyConnect for ISE Posture  No need for NAC client anymore
  • 58. Email and Web Security
  • 59. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 59 Cisco and Email/Web Security  Cisco is not commonly known for a focus on proxies  In 2007, Cisco paid $830M for IronPort Application Security Gateways:  Email Security Appliance  Web Security Appliance
  • 60. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 60 The Artist Formerly Known as: Ironport  So, why paying so much for server?  SenderBase – Reputation Score SensorBase SIO TALOS
  • 61. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 61
  • 62. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 62 Hygiene Pipeline of Cisco ESA Source: Cisco SESA 2.1 courseware
  • 63. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 63
  • 64. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 64 Web Security  Old adage: HTTP is the new TCP  Many applications and services now run overtop HTTP and HTTPS  Filtering and inspecting web traffic is becoming a requirement:  Compliance  Peace of mind
  • 65. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 65 WSA Acceptable Usage Policies  URL filtering  Anti-malware security  Bandwidth controls  Application controls  Identity-based security  HTTPS inspection  Data Loss protection  SaaS Access Control
  • 66. Q & A
  • 67. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 67
  • 69. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 69 Cisco Security Courses  CCNA Security e-Camp  IINS - Implementing Cisco IOS Network Security  SAEXS - Cisco ASA Express Security  SENSS - Implementing Cisco Edge Network Security Solutions  SIMOS - Implementing Cisco Secure Mobility Solutions  SISAS - Implementing Cisco Secure Access Solutions  SITCS - Implementing Cisco Threat Control Solution  ASA Lab Camp v9.0  SASAA - Implementing Advanced Cisco ASA Security  SASAC - Implementing Core Cisco ASA Security  ACS - Cisco Secure Access Control System  SISAS - Implementing Cisco Secure Access Solutions  SISE - Implementing and Configuring Cisco Identity Services Engine  SESA - Securing Email with Cisco Email Security Appliance  SWSA - Securing the Web with Cisco Web Security Appliance  Cisco FirePOWER Services and Cloud Web Security Workshop v1.0  SSFAMP - Securing Cisco Networks with Sourcefire FireAMP Endpoints  SSFIPS - Securing Cisco Networks with Sourcefire Intrusion Prevention System  SSFRULES - Securing Cisco Networks with Snort Rule Writing Best Practices  SSFSNORT - Securing Cisco Networks with Open Source Snort
  • 70. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 70 Sources  Cisco Security Blog  Cisco SAFE Design Guide  Cisco Identity Services Engine User Guide  Cisco PKI Service for Large Scale IPsec Aggregation Design Guide  Cisco Live presentations (CCO login required)  BRKSEC-1030 San Diego 2015  Cisco courseware SIMOS / SISE / SESA / SWSA / SASAA / SASAC
  • 71. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 71 GK Cisco Training Exclusives  6 months of  Anytime access to Cisco Practice Labs  Anytime Access to Boson Practice Exams  On-Demand Access to Searchable Class Recordings of Your Virtual Class  Unlimited Retakes of Your Class  Free Cisco Certification Exam Voucher
  • 72. © Global Knowledge Training LLC. All rights reserved. 7/22/2015 Page 72 Find Out More www.globalknowledge.ca On-demand & live webinars, white papers, blog... www.globalknowledge.ca/security Courses