Cisco Channel Partner Securing Email with Cisco Email Security Appliance v2.1 (PASESA)

Cisco Channel Partner Securing Email with Cisco Email Security Appliance v2.1 (PASESA)

Overview

Duration : 2 Days

PASESA v2.1 is an intensive two-day hands-on training course that prepares Cisco Channel Partner Field Engineers to install, configure, operate, maintain, and perform troubleshooting of the Cisco Email Security Appliance (ESA), support customer deployments of the ESA, and understand and meet customers’ email security requirements. PASESA v2.1 helps to prepare Cisco Channel Partner Field Engineers to pass the Email Security Field Engineer (ESFE) Exam.

Objectives

Upon completion of this course, you will be able to:

  • Perform Email Security Evaluations and Cisco ESA Installations
  • Configure ESA Sender and Recipient Groups
  • Understand Centralized Quarantine, Message Tracking, and Reporting 
  • Features of the ESA
  • Configure ESA Content Filters
  • Implement Data Loss Prevention
  • Encrypt Outgoing Mail
  • Configure Lightweight Directory Access Protocol (LDAP) on the ESA
  • Troubleshoot the Cisco ESA in a variety of customer environments

Course Outline

Module 1: Reviewing the Cisco Email Security Appliance

  • Lesson 1-1: Reviewing the Cisco Security Management Appliance
  • Lesson 1-2: Defining an SMTP Conversation
  • Lesson 1-3: Identifying Terms and Definitions
  • Lesson 1-4: Examining the Pipeline
  • Lesson 1-5: Describing Cisco Email Security Appliance Models and Licensing
  • Lesson 1-6: Installing and Verifying the Cisco Email Security Appliance
  • Lesson 1-7: Module Summary

 

Module 2: Performing an Evaluation

  • Lesson 2-1: Describing Cisco AsyncOS
  • Lesson 2-2: Describing the Listener
  • Lesson 2-3: Module Summary

 

Module 3: Administering the Cisco Email Security Appliance

  • Lesson 3-1: Configuring Localized Message Tracking and Reporting
  • Lesson 3-2: Configuring Centralized Tracking and Reporting
  • Lesson 3-3: Tracking and Reporting Messages
  • Lesson 3-4: Administering the Cisco Email Security Appliance
  • Lesson 3-5: Managing Log Files
  • Lesson 3-6: Creating and Using Administrator Accounts
  • Lesson 3-7: Module Summary

 

Module 4: Controlling Sender and Recipient Domains

  • Lesson 4-1: Configuring Public and Private Listeners
  • Lesson 4-2: Describing the HAT
  • Lesson 4-3: Describing the RAT
  • Lesson 4-4: Describing Email Authentication Methods
  • Lesson 4-5: Defining Domain-Based Message Authentication
  • Lesson 4-6: Troubleshooting with Mail Logs
  • Lesson 4-7: Module Summary

 

Module 5: Controlling Spam with Cisco SensorBase and Antispam

  • Lesson 5-1: Describing SensorBase
  • Lesson 5-2: Configuring Antispam
  • Lesson 5-3: Quarantining Spam on the Cisco Email Security Appliance
  • Lesson 5-4: Describing Safelist and Blocklist
  • Lesson 5-5: Quarantining Spam on the Cisco Security Management Appliance
  • Lesson 5-6: Configuring Bounce Verification
  • Lesson 5-7: Describing Web Reputation Filters
  • Lesson 5-8: Defining Outbreak Filters
  • Lesson 5-9: Module Summary

 

Module 6: Using Antivirus, Advanced Malware Protection, and Virus Outbreak Filter

  • Lesson 6-1: Enabling Antivirus Engines
  • Lesson 6-2: Using Outbreak Filters
  • Lesson 6-3: Using Advanced Malware Protection
  • Lesson 6-4: Module Summary

 

Module 7: Using Mail Policies

  • Lesson 7-1: Describing Email Security Manager
  • Lesson 7-2: Creating User-Based Mail Policies
  • Lesson 7-3: Using Message Splintering
  • Lesson 7-4: Module Summary

 

Module 8: Using Content Filters

  • Lesson 8-1: Describing Content Filtering
  • Lesson 8-2: Configuring Basic Content Filtering
  • Lesson 8-3: Applying Content Filter Applications
  • Lesson 8-4: Describing and Configuring Message Filtering
  • Lesson 8-5: Module Summary

 

Module 9: Preventing Data Loss

  • Lesson 9-1: Identifying the Data Loss Problem
  • Lesson 9-2: Choosing a Cisco DLP Solution
  • Lesson 9-3: Implementing DLP Configuration
  • Lesson 9-4: Describing the RSA Engine
  • Lesson 9-5: Module Summary

 

Module 10: Using LDAP

  • Lesson 10-1: Describing LDAP Features
  • Lesson 10-2: Describing Query Tokens and Operators
  • Lesson 10-3: Configuring LDAP Profiles
  • Lesson 10-4: Configuring SMTP Call-Ahead
  • Lesson 10-5: Reviewing Case Studies
  • Lesson 10-6: Using LDAP Group Queries
  • Lesson 10-7: Module Summary

 

Module 11: Using Authentication and Encryption

  • Lesson 11-1: Configuring Cisco Registered Envelope Service
  • Lesson 11-2: Describing TLS
  • Lesson 11-3: Authenticating Email with SPF
  • Lesson 11-4: Module Summary

 

Module 12: Understanding Clustering

  • Lesson 12-1: Creating a Clustered Environment
  • Lesson 12-2: Joining an Existing Cluster
  • Lesson 12-3: Managing a Clustered Environment
  • Lesson 12-4: Administering a Cluster from the GUI
  • Lesson 12-5: Module Summary

 

Lab Details:

1. Discovery 1: Customize Mail Policies for Your End Users

2. Discovery 2: Configure DLP

3. Discovery 3: Configure LDAP Accept

4. Discovery 4: Configure SMTP Call-Ahead

  • Hardware Challenge Lab 1: Access the Cisco Remote Lab
  • Hardware Challenge Lab 2: Install Your Cisco Email Security Appliance
  • Hardware Challenge Lab 3: Plan the Cisco Email Security Appliance
  • Hardware Challenge Lab 4: Perform Administration
  • Hardware Challenge Lab 5: Test Your Listener Settings
  • Hardware Challenge Lab 6: Prevent Domain Spoofing with DMARC
  • Hardware Challenge Lab 7: Defend Against Spam with SensorBase and Antispam
  • Hardware Challenge Lab 8: Defend Against Viruses
  • Hardware Challenge Lab 9: Prevent Advanced Persistent Threats with Advanced Malware Protection
  • Hardware Challenge Lab 10: Customize Mail Policies for Your End Users
  • Hardware Challenge Lab 11: Enforce Your Business Policies in Email Delivery
  • Hardware Challenge Lab 12: Manage High-Volume Mail Flow
  • Hardware Challenge Lab 13: Configure DLP
  • Hardware Challenge Lab 14: Configure LDAP Accept
  • Hardware Challenge Lab 15: Configure SMTP Call-Ahead
  • Hardware Challenge Lab 16: Accommodate Multiple Domains Using LDAP Accept Bypass and Domain Assignments
  • Hardware Challenge Lab 17: Control Mail Policies with LDAP Group Queries
  • Hardware Challenge Lab 18: Configure Envelope Encryption
  • Hardware Challenge Lab 19: Encrypt Email with TLS
  • Hardware Challenge Lab 20: Configure Clusters
This course is part of the following Certifications:

Security

The knowledge and skills that a learner must have before attending this course are as follows:

  • Basic computer literacy, including the use of general office software, such as Microsoft Office
  • Basic Microsoft Windows navigation and keyboard proficiency skills
  • Basic Internet usage skills, including use of a browser and search tools
  • Basic email usage skills
  • Moderate knowledge of TCP/IP fundamentals
  • Experience with Internet-based messaging, including SMTP, Internet message formats, and MIME message formats
Course ID:
PASESA


Show Schedule for:

Please provide as much information as possible for us to help you with your enquiry.