SlideShare a Scribd company logo
1 of 2
Download to read offline
2019 Cisco Systems, Inc. This document is Cisco Public. Page 1
Securing Networks with Cisco Firepower v1.0 (300-710)
Exam Description: Securing Networks with Cisco Firepower v1.0 (SNCF 300-710) is a 90-minute exam
associated with the CCNP Security Certification. This exam tests a candidate's knowledge of Cisco
Firepower® Threat Defense and Firepower®, including policy configurations, integrations, deployments,
management and troubleshooting. These courses, Securing Networks with Cisco Firepower, and
Securing Networks with Cisco Firepower Next-Generation Intrusion Prevention System helps candidates
prepare for this exam.
The following topics are general guidelines for the content likely to be included on the exam. However,
other related topics may also appear on any specific delivery of the exam. To better reflect the contents
of the exam and for clarity purposes, the guidelines below may change at any time without notice.
30% 1.0 Deployment
1.1 Implement NGFW modes
1.1.a Routed mode
1.1.b Transparent mode
1.2 Implement NGIPS modes
1.2.a Passive
1.2.b Inline
1.3 Implement high availability options
1.3.a Link redundancy
1.3.b Active/standby failover
1.3.c Multi-instance
1.4 Describe IRB configurations
30% 2.0 Configuration
2.1 Configure system settings in Cisco Firepower Management Center
2.2 Configure these policies in Cisco Firepower Management Center
2.2.a Access control
2.2.b Intrusion
2.2.c Malware and file
2.2.d DNS
2.2.e Identity
2.2.f SSL
2.2.g Prefilter
2.3 Configure these features using Cisco Firepower Management Center
2.3.a Network discovery
2.3.b Application detectors (Open AppID)
2019 Cisco Systems, Inc. This document is Cisco Public. Page 2
2.3.c Correlation
2.3.d Actions
2.4 Configure objects using Firepower Management Center
2.4.a Object Management
2.4.b Intrusion Rules
2.5 Configure devices using Firepower Management Center
2.5.a Device Management
2.5.b NAT
2.5.c VPN
2.5.d QoS
2.5.e Platform Settings
2.5.f Certificates
25% 3.0 Management and Troubleshooting
3.1 Troubleshoot with FMC CLI and GUI
3.2 Configure dashboards and reporting in FMC
3.3
3.4
Troubleshoot using packet capture procedures
Analyze risk and standard reports
15% 4.0 Integration
4.1 Configure Cisco AMP for Networks in Firepower Management Center
4.2 Configure Cisco AMP for Endpoints in Firepower Management Center
4.3 Implement Threat Intelligence Director for third-party security intelligence feeds
4.4 Describe using Cisco Threat Response for security investigations
4.5 Describe Cisco FMC PxGrid Integration with Cisco Identify Services Engine (ISE)
4.6 Describe Rapid Threat Containment (RTC) functionality within Firepower Management
Center

More Related Content

Similar to 300-710-SNCF.pdf

Interconnecting_Cisco_Networking_Devices.pdf
Interconnecting_Cisco_Networking_Devices.pdfInterconnecting_Cisco_Networking_Devices.pdf
Interconnecting_Cisco_Networking_Devices.pdfDaginni78
 
pcnsa-blueprint_PAN-OS_v11.0-1__0012.pdf
pcnsa-blueprint_PAN-OS_v11.0-1__0012.pdfpcnsa-blueprint_PAN-OS_v11.0-1__0012.pdf
pcnsa-blueprint_PAN-OS_v11.0-1__0012.pdfAzzeddine Salem
 
WWTC_implementation_plan_Group5_FINAL
WWTC_implementation_plan_Group5_FINALWWTC_implementation_plan_Group5_FINAL
WWTC_implementation_plan_Group5_FINALJohn Bernal
 
CISCO 200 125-ccna-v3
CISCO 200 125-ccna-v3CISCO 200 125-ccna-v3
CISCO 200 125-ccna-v3Leo Juntilla
 
200-125-ccna-v3
200-125-ccna-v3200-125-ccna-v3
200-125-ccna-v3Ibby Nuj
 
Google GCP-PCSE Certificate Is Your Best Choice
Google GCP-PCSE Certificate Is Your Best ChoiceGoogle GCP-PCSE Certificate Is Your Best Choice
Google GCP-PCSE Certificate Is Your Best ChoiceAmaaira Johns
 
Ccna security
Ccna securityCcna security
Ccna securitydkaya
 
Cisco Certifications and Career Opportunities with Average Salary
Cisco Certifications and Career Opportunities with Average SalaryCisco Certifications and Career Opportunities with Average Salary
Cisco Certifications and Career Opportunities with Average SalaryUninets Consulting
 
Medical grade network_campus
Medical grade network_campusMedical grade network_campus
Medical grade network_campusJonathan Dender
 
ccnp-enterprise-core-networking-encor-product-overview.pptx
ccnp-enterprise-core-networking-encor-product-overview.pptxccnp-enterprise-core-networking-encor-product-overview.pptx
ccnp-enterprise-core-networking-encor-product-overview.pptxssuserff1f40
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco Service Provider
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco Service Provider
 
Resume Of Ifthekharul Islam_2016_V1.5
Resume Of Ifthekharul Islam_2016_V1.5Resume Of Ifthekharul Islam_2016_V1.5
Resume Of Ifthekharul Islam_2016_V1.5Ifthekharul Islam
 
200-301 CCNA Implementing and Administering Cisco Solutions By CertsWarrior.pptx
200-301 CCNA Implementing and Administering Cisco Solutions By CertsWarrior.pptx200-301 CCNA Implementing and Administering Cisco Solutions By CertsWarrior.pptx
200-301 CCNA Implementing and Administering Cisco Solutions By CertsWarrior.pptxCerts Warrior
 

Similar to 300-710-SNCF.pdf (20)

Interconnecting_Cisco_Networking_Devices.pdf
Interconnecting_Cisco_Networking_Devices.pdfInterconnecting_Cisco_Networking_Devices.pdf
Interconnecting_Cisco_Networking_Devices.pdf
 
pcnsa-blueprint_PAN-OS_v11.0-1__0012.pdf
pcnsa-blueprint_PAN-OS_v11.0-1__0012.pdfpcnsa-blueprint_PAN-OS_v11.0-1__0012.pdf
pcnsa-blueprint_PAN-OS_v11.0-1__0012.pdf
 
WWTC_implementation_plan_Group5_FINAL
WWTC_implementation_plan_Group5_FINALWWTC_implementation_plan_Group5_FINAL
WWTC_implementation_plan_Group5_FINAL
 
Ccna security
Ccna security Ccna security
Ccna security
 
CCNA 2016 SYLLABUS
CCNA 2016 SYLLABUSCCNA 2016 SYLLABUS
CCNA 2016 SYLLABUS
 
200 125-ccna-v3
200 125-ccna-v3200 125-ccna-v3
200 125-ccna-v3
 
CISCO 200 125-ccna-v3
CISCO 200 125-ccna-v3CISCO 200 125-ccna-v3
CISCO 200 125-ccna-v3
 
200-125-ccna-v3
200-125-ccna-v3200-125-ccna-v3
200-125-ccna-v3
 
Google GCP-PCSE Certificate Is Your Best Choice
Google GCP-PCSE Certificate Is Your Best ChoiceGoogle GCP-PCSE Certificate Is Your Best Choice
Google GCP-PCSE Certificate Is Your Best Choice
 
Ccna security
Ccna securityCcna security
Ccna security
 
Cisco Certifications and Career Opportunities with Average Salary
Cisco Certifications and Career Opportunities with Average SalaryCisco Certifications and Career Opportunities with Average Salary
Cisco Certifications and Career Opportunities with Average Salary
 
Medical grade network_campus
Medical grade network_campusMedical grade network_campus
Medical grade network_campus
 
santanuresume
santanuresumesantanuresume
santanuresume
 
ccnp-enterprise-core-networking-encor-product-overview.pptx
ccnp-enterprise-core-networking-encor-product-overview.pptxccnp-enterprise-core-networking-encor-product-overview.pptx
ccnp-enterprise-core-networking-encor-product-overview.pptx
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design Guide
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design Guide
 
Mapping document
Mapping documentMapping document
Mapping document
 
CCNA-Syllabus-compressed.pdf
CCNA-Syllabus-compressed.pdfCCNA-Syllabus-compressed.pdf
CCNA-Syllabus-compressed.pdf
 
Resume Of Ifthekharul Islam_2016_V1.5
Resume Of Ifthekharul Islam_2016_V1.5Resume Of Ifthekharul Islam_2016_V1.5
Resume Of Ifthekharul Islam_2016_V1.5
 
200-301 CCNA Implementing and Administering Cisco Solutions By CertsWarrior.pptx
200-301 CCNA Implementing and Administering Cisco Solutions By CertsWarrior.pptx200-301 CCNA Implementing and Administering Cisco Solutions By CertsWarrior.pptx
200-301 CCNA Implementing and Administering Cisco Solutions By CertsWarrior.pptx
 

More from tadeseguchi

Adaptable SLA-Aware Consistency_Ayantu Debebe Ejeta.pdf
Adaptable SLA-Aware Consistency_Ayantu Debebe Ejeta.pdfAdaptable SLA-Aware Consistency_Ayantu Debebe Ejeta.pdf
Adaptable SLA-Aware Consistency_Ayantu Debebe Ejeta.pdftadeseguchi
 
Unmaintained-Design-Icons_v2.0.pptx
Unmaintained-Design-Icons_v2.0.pptxUnmaintained-Design-Icons_v2.0.pptx
Unmaintained-Design-Icons_v2.0.pptxtadeseguchi
 
200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020tadeseguchi
 
Operating system mc qs
Operating system mc qsOperating system mc qs
Operating system mc qstadeseguchi
 
300+ top database management system questions and answers 2020
300+ top database management system questions and answers 2020300+ top database management system questions and answers 2020
300+ top database management system questions and answers 2020tadeseguchi
 
200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020tadeseguchi
 
300+ top data structures and algorithms mc qs pdf 2020
300+ top data structures and algorithms mc qs pdf 2020300+ top data structures and algorithms mc qs pdf 2020
300+ top data structures and algorithms mc qs pdf 2020tadeseguchi
 

More from tadeseguchi (8)

Adaptable SLA-Aware Consistency_Ayantu Debebe Ejeta.pdf
Adaptable SLA-Aware Consistency_Ayantu Debebe Ejeta.pdfAdaptable SLA-Aware Consistency_Ayantu Debebe Ejeta.pdf
Adaptable SLA-Aware Consistency_Ayantu Debebe Ejeta.pdf
 
Unmaintained-Design-Icons_v2.0.pptx
Unmaintained-Design-Icons_v2.0.pptxUnmaintained-Design-Icons_v2.0.pptx
Unmaintained-Design-Icons_v2.0.pptx
 
200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020
 
Operating system mc qs
Operating system mc qsOperating system mc qs
Operating system mc qs
 
300+ top database management system questions and answers 2020
300+ top database management system questions and answers 2020300+ top database management system questions and answers 2020
300+ top database management system questions and answers 2020
 
200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020
 
300+ top data structures and algorithms mc qs pdf 2020
300+ top data structures and algorithms mc qs pdf 2020300+ top data structures and algorithms mc qs pdf 2020
300+ top data structures and algorithms mc qs pdf 2020
 
Getdataback
GetdatabackGetdataback
Getdataback
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

300-710-SNCF.pdf

  • 1. 2019 Cisco Systems, Inc. This document is Cisco Public. Page 1 Securing Networks with Cisco Firepower v1.0 (300-710) Exam Description: Securing Networks with Cisco Firepower v1.0 (SNCF 300-710) is a 90-minute exam associated with the CCNP Security Certification. This exam tests a candidate's knowledge of Cisco Firepower® Threat Defense and Firepower®, including policy configurations, integrations, deployments, management and troubleshooting. These courses, Securing Networks with Cisco Firepower, and Securing Networks with Cisco Firepower Next-Generation Intrusion Prevention System helps candidates prepare for this exam. The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. To better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice. 30% 1.0 Deployment 1.1 Implement NGFW modes 1.1.a Routed mode 1.1.b Transparent mode 1.2 Implement NGIPS modes 1.2.a Passive 1.2.b Inline 1.3 Implement high availability options 1.3.a Link redundancy 1.3.b Active/standby failover 1.3.c Multi-instance 1.4 Describe IRB configurations 30% 2.0 Configuration 2.1 Configure system settings in Cisco Firepower Management Center 2.2 Configure these policies in Cisco Firepower Management Center 2.2.a Access control 2.2.b Intrusion 2.2.c Malware and file 2.2.d DNS 2.2.e Identity 2.2.f SSL 2.2.g Prefilter 2.3 Configure these features using Cisco Firepower Management Center 2.3.a Network discovery 2.3.b Application detectors (Open AppID)
  • 2. 2019 Cisco Systems, Inc. This document is Cisco Public. Page 2 2.3.c Correlation 2.3.d Actions 2.4 Configure objects using Firepower Management Center 2.4.a Object Management 2.4.b Intrusion Rules 2.5 Configure devices using Firepower Management Center 2.5.a Device Management 2.5.b NAT 2.5.c VPN 2.5.d QoS 2.5.e Platform Settings 2.5.f Certificates 25% 3.0 Management and Troubleshooting 3.1 Troubleshoot with FMC CLI and GUI 3.2 Configure dashboards and reporting in FMC 3.3 3.4 Troubleshoot using packet capture procedures Analyze risk and standard reports 15% 4.0 Integration 4.1 Configure Cisco AMP for Networks in Firepower Management Center 4.2 Configure Cisco AMP for Endpoints in Firepower Management Center 4.3 Implement Threat Intelligence Director for third-party security intelligence feeds 4.4 Describe using Cisco Threat Response for security investigations 4.5 Describe Cisco FMC PxGrid Integration with Cisco Identify Services Engine (ISE) 4.6 Describe Rapid Threat Containment (RTC) functionality within Firepower Management Center