Choose ASA Perimeter Security technologies/features to implement HLD based on given security requirements Choose the correct ASA model to implement HLD based on given performance requirements Create and test initial ASA appliance configurations using CLI Determine which ASA licenses will be required based on given requirements
Complex Operations Support:
Optimize ASA Perimeter Security features performance, functions, and configurations Create complex ASA security perimeter policies such as ACLs, NAT/PAT, L3/L4/L7 stateful inspection, QoS policies, cut-thru proxy, threat detection, botnet detection/filter using CLI and/or ASDM Perform initial setup on the AIP-SSM and CSC-SSM using CLI and/or ASDM Configure, verify and troubleshoot High Availability ASAs (A/S and A/An FO) operations using CLI and/or ASDM Configure, verify and troubleshoot static routing and dynamic routing protocols on the ASA using CLI and/or ASDM Configure, verify and troubleshoot ASA transparent firewall operations using CLI Configure, verify and troubleshoot management access/protocols on the ASA using CLI and/or ASDM Describe Advanced Troubleshooting Advanced ASA security perimeter configuration/software/hardware troubleshooting using CLI and/or ASD fault finding and repairing Duration: 1 Month
Subscribe Our Newsletter
For new awesome courses & special promotion campaign!