International Site


Protecting Against Malware Threats with Cisco AMP for Endpoints

This course is an instructor-led, lab-based, hands-on course offered by Cisco Learning Services. It is a lab-intensive course that introduces students to the powerful features of Cisco AMP for Endpoints software.  Day one of this 3-day virtual class covers modern threats, vulnerabilities, and Cisco Advanced Malware Protection (AMP) technologies.  Days two and three detail the Cisco AMP for Endpoints product architecture and how it can be used to protect against malware.

Course Contents

• Describe malware terminology and recognize malware categories 

• Describe the architecture and individual security features of Windows, Apple Mac, and Linux operating systems and the concept of vulnerabilities   

• Describe the components and behavior of exploit kits and botnets            

• Describe modern attack vectors and trends             

• Recognize the key components and methodologies of Cisco Advanced Malware Protection 

• Recognize the key features and concepts of the AMP for Endpoints product      

• Navigate the AMP for Endpoints console interface and perform first - use setup tasks   

• Configure and customize AMP for Endpoints to perform malware detection       

• Create and configure a policy for AMP - protected endpoints       

• Plan, deploy, and trou bleshoot an AMP for Endpoints installation          

• Analyze files and events by using the AMP for Endpoints console and be able to produce threat reports          

• Use the AMP for Endpoints tools to analyze a malware attack      

• Describe all features of the Accounts menu for both public and private cloud installations

 Each participant will receive the original course documentation from Cisco in English language as a Cisco E-Book.

 Detailed table of contents

 Request your tailor-made course.

Target Group

This course is designed for technical professionals who need to know how to deploy and manage Cisco AMP for Endpoints software in their network environments. The primary audience for this course includes:
• Security administrators
• ecurity consultants
• Network administrators
• System engineers
• Technical support personnel
• Channel partners and resellers

Knowledge Prerequisites

It is recommended, but not required, that students have the following knowledge and skills before attending this course:  

• TCP/IP experience including the major protocols, common services, and basic network traffic routing

• General information security fundamentals

• Fundamentals of how operating systems work, including OS configuration structures, file system I/O and basic OS usage and management