Course Summary

After taking this course, you will be able to:

• Describe and implement a Cisco-recommended structured design methodology
• Describe and implement industry standards, amendments, certifications, and Requests For Comments (RFCs)
• Describe and implement Cisco enhanced wireless features
• Describe and implement the wireless design process
• Describe and implement specific vertical designs
• Describe and implement site survey processes
• Describe and implement network validation processes

Module 1: SOC Operations and Responsibilities
• Types of SOC Service Coverage: Learn about different SOC service models, including monitoring, detection, and response.
• Operational Responsibilities: Understand the roles and duties within a SOC, including incident handling, forensics, and threat intelligence.

Module 2: Cloud Security Operations
• Cloud Security Considerations: Compare security operations across various cloud platforms (public, private, hybrid).
• Cloud Platform Challenges: Discuss unique security challenges and solutions specific to cloud environments.

Module 3: SOC Platform Management
• SOC Development and Management: Explore methodologies for developing and managing SOC platforms.
• Automation in SOC: Understand how automation and orchestration tools enhance SOC efficiency and response capabilities.

Module 4: Asset Controls and Protections
• Segmentation and Micro-Segmentation: Describe techniques for asset segmentation, network segregation, and micro-segmentation.
• Zero Trust Security: Explain Zero Trust principles and how they apply to asset protection and network security.

Module 5: Incident Investigation and Core Security Technologies
• Incident Investigation Tools: Learn to use SIEM and SOAR for effective incident investigation and management.
• Core Security Technology Platforms: Understand different security technologies for monitoring, investigation, and response.

Module 6: Threat Detection and Analysis
• Threat Detection Strategies: Analyze threat detection approaches and strategies during monitoring and response.
• Indicators of Compromise and Attack: Identify and interpret IOCs and IOAs.
• Attack Analysis and Anomalous Behavior: Interpret attack sequences and analyze anomalous user and entity behavior (UEBA).

Attendees should meet the following prerequisites: • General knowledge of networks • General knowledge of wireless networks • Routing and switching knowledge Recommended courses that help you prepare for this training: • CCNA - Implementing and Administering Cisco Solutions • WLFNDU - Understanding Cisco Wireless Foundations • ENCOR - Implementing and Operating Cisco Enterprise Network Core Technologies

300-425 ENWLSD Designing Cisco Enterprise Wireless Networks Duration: 90 minutes Languages: English

Following your booking, a confirmation message will be sent to all participants, ensuring you're well-informed of your successful enrollment. Calendar placeholders will also be dispatched to assist you in scheduling your commitments around the course. Rest assured, all course materials and access to necessary labs or platforms will be provided no later than one week before the course begins, allowing you ample time to prepare and engage fully with the learning experience ahead.

Our comprehensive training package includes all the necessary materials and resources to facilitate a full learning experience. Enrollees will be provided with detailed course content, encompassing a wide array of topics to ensure a thorough understanding of the subject matter. Additionally, participants will receive a certificate of completion to recognize their dedication and hard work. It's important to note that while the course fee covers all training materials and experiences, the examination fee for certification is not included but can be purchased separately.

Questions About This Course?