Module 1: Reviewing the Cisco Email Security Appliance
- Lesson 1-1: Reviewing the Cisco Security Management Appliance
- Lesson 1-2: Defining an SMTP Conversation
- Lesson 1-3: Identifying Terms and Definitions
- Lesson 1-4: Examining the Pipeline
- Lesson 1-5: Describing Cisco Email Security Appliance Models and Licensing
- Lesson 1-6: Installing and Verifying the Cisco Email Security Appliance
- Lesson 1-7: Module Summary
Module 2: Performing an Evaluation
- Lesson 2-1: Describing Cisco AsyncOS
- Lesson 2-2: Describing the Listener
- Lesson 2-3: Module Summary
Module 3: Administering the Cisco Email Security Appliance
- Lesson 3-1: Configuring Localized Message Tracking and Reporting
- Lesson 3-2: Configuring Centralized Tracking and Reporting
- Lesson 3-3: Tracking and Reporting Messages
- Lesson 3-4: Administering the Cisco Email Security Appliance
- Lesson 3-5: Managing Log Files
- Lesson 3-6: Creating and Using Administrator Accounts
- Lesson 3-7: Module Summary
Module 4: Controlling Sender and Recipient Domains
- Lesson 4-1: Configuring Public and Private Listeners
- Lesson 4-2: Describing the HAT
- Lesson 4-3: Describing the RAT
- Lesson 4-4: Describing Email Authentication Methods
- Lesson 4-5: Defining Domain-Based Message Authentication
- Lesson 4-6: Troubleshooting with Mail Logs
- Lesson 4-7: Module Summary
Module 5: Controlling Spam with Cisco SensorBase and Antispam
- Lesson 5-1: Describing SensorBase
- Lesson 5-2: Configuring Antispam
- Lesson 5-3: Quarantining Spam on the Cisco Email Security Appliance
- Lesson 5-4: Describing Safelist and Blocklist
- Lesson 5-5: Quarantining Spam on the Cisco Security Management Appliance
- Lesson 5-6: Configuring Bounce Verification
- Lesson 5-7: Describing Web Reputation Filters
- Lesson 5-8: Defining Outbreak Filters
- Lesson 5-9: Module Summary
Module 6: Using Antivirus, Advanced Malware Protection, and Virus Outbreak Filter
- Lesson 6-1: Enabling Antivirus Engines
- Lesson 6-2: Using Outbreak Filters
- Lesson 6-3: Using Advanced Malware Protection
- Lesson 6-4: Module Summary
Module 7: Using Mail Policies
- Lesson 7-1: Describing Email Security Manager
- Lesson 7-2: Creating User-Based Mail Policies
- Lesson 7-3: Using Message Splintering
- Lesson 7-4: Module Summary
Module 8: Using Content Filters
- Lesson 8-1: Describing Content Filtering
- Lesson 8-2: Configuring Basic Content Filtering
- Lesson 8-3: Applying Content Filter Applications
- Lesson 8-4: Describing and Configuring Message Filtering
- Lesson 8-5: Module Summary
Module 9: Preventing Data Loss
- Lesson 9-1: Identifying the Data Loss Problem
- Lesson 9-2: Choosing a Cisco DLP Solution
- Lesson 9-3: Implementing DLP Configuration
- Lesson 9-4: Describing the RSA Engine
- Lesson 9-5: Module Summary
Module 10: Using LDAP
- Lesson 10-1: Describing LDAP Features
- Lesson 10-2: Describing Query Tokens and Operators
- Lesson 10-3: Configuring LDAP Profiles
- Lesson 10-4: Configuring SMTP Call-Ahead
- Lesson 10-5: Reviewing Case Studies
- Lesson 10-6: Using LDAP Group Queries
- Lesson 10-7: Module Summary
Module 11: Using Authentication and Encryption
- Lesson 11-1: Configuring Cisco Registered Envelope Service
- Lesson 11-2: Describing TLS
- Lesson 11-3: Authenticating Email with SPF
- Lesson 11-4: Module Summary
Module 12: Understanding Clustering
- Lesson 12-1: Creating a Clustered Environment
- Lesson 12-2: Joining an Existing Cluster
- Lesson 12-3: Managing a Clustered Environment
- Lesson 12-4: Administering a Cluster from the GUI
- Lesson 12-5: Module Summary
Lab Details:
- Discovery 1: Customize Mail Policies for Your End Users
- Discovery 2: Configure DLP
- Discovery 3: Configure LDAP Accept
- Discovery 4: Configure SMTP Call-Ahead
- Hardware Challenge Lab 1: Access the Cisco Remote Lab
- Hardware Challenge Lab 2: Install Your Cisco Email Security Appliance
- Hardware Challenge Lab 3: Plan the Cisco Email Security Appliance
- Hardware Challenge Lab 4: Perform Administration
- Hardware Challenge Lab 5: Test Your Listener Settings
- Hardware Challenge Lab 6: Prevent Domain Spoofing with DMARC
- Hardware Challenge Lab 7: Defend Against Spam with SensorBase and Antispam
- Hardware Challenge Lab 8: Defend Against Viruses
- Hardware Challenge Lab 9: Prevent Advanced Persistent Threats with Advanced Malware Protection
- Hardware Challenge Lab 10: Customize Mail Policies for Your End Users
- Hardware Challenge Lab 11: Enforce Your Business Policies in Email Delivery
- Hardware Challenge Lab 12: Manage High-Volume Mail Flow
- Hardware Challenge Lab 13: Configure DLP
- Hardware Challenge Lab 14: Configure LDAP Accept
- Hardware Challenge Lab 15: Configure SMTP Call-Ahead
- Hardware Challenge Lab 16: Accommodate Multiple Domains Using LDAP Accept Bypass and Domain Assignments
- Hardware Challenge Lab 17: Control Mail Policies with LDAP Group Queries
- Hardware Challenge Lab 18: Configure Envelope Encryption
- Hardware Challenge Lab 19: Encrypt Email with TLS
- Hardware Challenge Lab 20: Configure Clusters