Call : (+91) 968636 4243
Mail :

Integrated Threat Defense Investigation and Mitigation (SECUR202)

( Duration: 2 Days )

This Integrated Threat Defense Investigation and Mitigation (SECUR202) training course will provide skills to identify, isolate, and mitigate network threats using the Cisco Integrated Threat Defense solution platforms.

By attending Integrated Threat Defense Investigation and Mitigation (SECUR202) workshop, delegates will learn to:

  • Describe the stages of the network attack lifecycle and identify ITD solution platform placement based on a given stage
  • Detail how to locate and mitigate email malware attacks
  • Describe email phishing attacks and the steps taken to locate and mitigate them on the network
  • Identify and mitigate data exfiltration threats on the network
  • Identify malware threats on the network and mitigate those threats after investigation

  • Technical understanding of TCP/IP networking and network architecture
  • Technical understanding of security concepts and protocols
  • Familiarity with Cisco Identity Services Engine, Cisco Stealthwatch, Cisco Firepower, and Cisco AMP for Endpoints is an advantage

The Integrated Threat Defense Investigation and Mitigation (SECUR202) class is ideal for:

  • Technical professionals who need to know how to use a deployed Integrated Threat Defense (ITD) network solution to identify, isolate, and mitigate network threats. The primary audience for this course includes:
    • Network analysts
    • Network investigators



Network Threat Investigation Introduction

  • Network Attack Introduction
  • Hunting Network Threats in the Enterprise

Investigation and Mitigation of Email Malware Threats

  • Examining Email Malware Threats
  • Investigating and Verifying Email Malware Threat Mitigation

Investigation and Mitigation of Email Phishing Threats

  • Examining Email Phishing Attacks
  • Configuring Cisco ESA for URL and Content Filtering
  • Investigating and Verifying Email Phishing Threat Mitigation

Investigation and Mitigation of Data Exfiltration Threats

  • Exploiting Vulnerable Network Servers
  • Investigating Data Exfiltration Threats
  • Mitigating and Verifying Data Exfiltration Threats

Investigation and Mitigation of Malware Threats

  • Examining Endpoint Malware Protection
  • Investigating and Mitigating Endpoint Malware Threats

Encarta Labs Advantage

  • One Stop Corporate Training Solution Providers for over 6,000 various courses on a variety of subjects
  • All courses are delivered by Industry Veterans
  • Get jumpstarted from newbie to production ready in a matter of few days
  • Trained more than 50,000 Corporate executives across the Globe
  • All our trainings are conducted in workshop mode with more focus on hands-on sessions

View our other course offerings by visiting

Contact us for delivering this course as a public/open-house workshop/online training for a group of 10+ candidates.