HBFITES Data Center, Collaboration, Security, Storage, Wireless, Telepresence Training +91-9738931649 info@hbfites.com

SSFIPS v1.0 - Securing Cisco Networks with Sourcefire Intrusion Prevention System


Securing Cisco Networks with Sourcefire Intrusion Prevention System (IPS) is an instructor-led, lab-intensive course that introduces students to the powerful features of the Cisco Sourcefire System, including FireSIGHT technology, in-depth event analysis, IPS tuning and configuration, and the Snort rules language.You will learn how to use and configure next-generation Sourcefire technology, including application control, firewall, and routing and switching capabilities. Users will also learn to properly tune your system for better performance and greater network intelligence while taking full advantage of powerful tools for more efficient event analysis, including file type and network-based malware detection. This course combines lecture materials and hands-on labs throughout to make sure that you are able to successfully deploy and manage the Sourcefire System.


Upon completion of this course, you should be able to:

  • Understand the Sourcefire System infrastructure
  • Navigate the UI and administrative features of the Sourcefire System, including reporting functionality to properly assess threats
  • Understand how to deploy and manage the Sourcefire device
  • Understand the role FireSIGHT technology plays in the Sourcefire System
  • Understand, create, and implement objects for use in access control policies
  • Understand advanced policy configuration and Sourcefire System configuration options
  • Analyze events
  • Write and configure several basic rules


  • Technical understanding of TCP/IP networking and network architecture
  • Basic familiarity with the concepts of intrusion detection systems (IDS) and IPS

Who Should Attend

This course is designed for technical professionals who need to know how to deploy and/or manage a Sourcefire System in your network environment. The primary audience for this course includes:

  • Security administrators
  • Security consultants
  • Network administrators
  • System engineers
  • Technical support personnel
  • Channel partners and resellers


  • Module 1: Sourcefire System Overview and Classroom Setup
  • Module 2: Device Management
  • Module 3: Object Management
  • Module 4: Access Control Policy
  • Module 5: Network-based Malware Detection
  • Module 6: FireSIGH Technology
  • Module 7: Correlation Policies
  • Module 8: IPS Policy Basics
  • Module 9: Advanced IPS Polcity Configurations
  • Module 10: User Account Management
  • Module 11: Event Anlaysis
  • Module 12: Reporting
  • Module 13: Basic Rule Syntax and Usage
  • Module 14: Case Studies in Rule Writing and Packet Analysis
  • Lab 1: Verifying the License
  • Lab 2: Testing the Environment by Running Attack PCAPs
  • Lab 3: Viewing Events
  • Lab 4: Layer 2 and 3 Simulation
  • Lab 5: Inline Interface Configuration
  • Lab 6: Creating Objects
  • Lab 7: Creating an Access Control Policy (Port Inspection)
  • Lab 8: Creating an Access Control Policy (Application Awareness)
  • Lab 9: URL Filtering
  • Lab 10: Including an IPS Policy in Access Control Rules
  • Lab 11: Creating a File Policy
  • Lab 12: Tunning the Network Discovery Policy
  • Lab 13: Viewing FireSIGHT Data
  • Lab 14: User Discovery
  • Lab 15: Creating a Correlation Policy Based on Connection Data
  • Lab 16: White Lists
  • Lab 17: Working with Connection Data and Traffic Profiles
  • Lab 18: Creating an Intrusion Policy
  • Lab 19: Including FireSIGHT Recommendations in an Intrusion Policy
  • Lab 20: Tunning Your HTTP_Inspect Preprocessor
  • Lab 21: Apply and Test Your Policy and Varriable Set
  • Lab 22: Create User Accounts and Configure the UI Timeout Value
  • Lab 23: Testing Exempt and Non Exempt Users
  • Lab 24: Permission Escalation
  • Lab 25: Working with External Accounts
  • Lab 26: Analysis Lab
  • Lab 27: Tunning Events
  • Lab 28: Context Explorer
  • Lab 29: Comparing Trends with Reports
  • Lab 30: Writing Custom Rules
  • Lab 31: Research and Packet Analysis
  • Lab 32: Revisiting the Kaminsky Vulnerability