Professional Documents
Culture Documents
Cyber Security
No of Students 25
certification/
Linux Foundation
https://training.linuxfoundation.org/resources/
Cisco Adaptive Security Appliances
https://www.cisco.com/c/en/us/solutions/industries/education/educa
tor-resource-center/networking-academy.html
Cisco Next Generation Firewall
https://learningnetwork.cisco.com/s/next-generation-firewall-training-
videos
Cisco Web Security
https://learningnetwork.cisco.com/s/web-security-training-videos
Cyber Security
Scheduled Module Title Days Hours Learning Units Remarks
Week
Cyber Security
Enumeration Day 2 Hour#1 OS, Application, Server, Hardware,
Version, information gathering • Task -
3
• Task -
4
• Task -
5
• Task - 6
Cyber Security
Hour#2 Task 5, Task 6 and Task 7 to be practiced Task -
by students 7
Task –
8
Task – 9
Task –
Day 4 Hour#1 Network Foot printing
14
Hour # 2- Task 12 to be practiced by students Task -
3 15
Hour#4 Concepts of Enumeration
Introduction to Enumeration tools
Week 3 Vulnerability Day 1 Hour#1 Success stories (For further detail please • Task -
Assessment, see Page No: 3& 4) 16
Operating System Hour#2 Concept of Vulnerability
(Linux) • Task -
Fundamentals Hour#3 Introduction to Vulnerability Assessment 17
Tools
Use Nikto for Vulnerability Scanning • Task -
Hour#4 Task 16 to be practiced by students 18
Day 2 Hour#1 Vulnerability research using vulnerability
scoring systems and databases • Task –
19
Cyber Security
• Task –
Hour#2 Lynis for System Vulnerability Scanning 20
Week 4 Operating Day 1 Hour#1 Success stories (For further detail please • Task –
System see Page No: 3& 4) 22
(Linux) Hour#2 Managing Files and their permissions.
Fundament • Task –
als, Social Hour # 3-4 Task 22 to be practiced by Students 23
Engineering
Exploits Day 2 Hour#1 File Ownership
• Task –
Hour#2 Task 23 to be practiced by Students 24
Cyber Security
Describe Phishing and Pharming be seen at
Annexure-I
Hour # 3-4 Task 28 and Task 29 to be practiced by
Students 1st
Monthly
test
Week 5 System Hacking & Day 1 Hour#1 Motivational Lecture (For further detail • Task –
Manipulation. please see Page No: 3& 4) 30
Sniffing
Techniques & Hour#2 System Hacking Concepts
• Task –
Attacks Hour#3 Performing Online Password Attacks 31
Hour#4 Task 30 to be practiced by Students
Day 2 Hour#1 Gain Access of remote system using • Task –
Armitage 32
Hour#2 Task 31 to be practiced by Students
• Task –
Hour#3 Hide data using steganography 33
Hour#4 Task 32 to be practiced by Students
• Task –
Day 3 Hour#1 Sniffing Concepts
34
Hour#2 Use of Sniffing tool (Wireshark Network
Analyzer) • Task –
Hour # 3-4 Task 33 to be practiced by Students 35
Day 4 Hour#1 Sniffing using MAC Flooding
• Task –
Hour#2 Task 34 to be practiced by Students
36
Hour#3 Sniffing Technique: DHCP Starvation using
Yersinia • Task –
Hour#4 Task 35 to be practiced by Students 37
Week 6 Denial of Service, Day 1 Hour#1 Motivational Lecture (For further detail • Task –
Session Hijacking, please see Page No: 3& 4) 38
Hacking Web Hour#2 DOS/ DDoS concepts
Applications • Task –
Hour#3 Perform SYN Flooding Attack using hping3
39
& Metasploit
Hour#4 Task 38 and Task 39 to be practiced by
• Task –
Students
Cyber Security
Day 2 Hour#1 Using different attacking tools, perform 40
ICMP Flood Attack / Ping of Death Attack
/ DDoS Attack • Task –
Hour # 2-3 Task 40, Task 41 and Task 42 to be 41
practiced by Students
• Task –
Hour#4 DOS/DDoS Countermeasures 42
Day 3 Hour#1 Session Hijacking
Types of Session Hijacking • Task –
Spoofing 43
Hour#2 Network Level Hijacking – Capturing
• Task –
Cookie Sessions
44
Hour # 3-4 Task 43 to be practiced by Students
Day 4 Hour#1 Web Application Architecture • Task –
Web Application Threats 45
OWASP Top 10 Application Security
Risks – 2022
Hour#2 Web Application Security using WAF (F5
ASM)
Hour # 3-4 Task 44 to be practiced by Students
Day 5 Hour#1 • Web Application Hacking Methodology Details may
• Web API
Webhooks and Web Shell be seen at
Web API Hacking Methodology Annexure-I
Add Experience/Portfolio
Cyber Security
The duration of the project will be 6
weeks
Ideas may be generated via different sites
such as:
• https://1000projects.org/
https://nevonprojects.com/
https://www.freestudentprojects.co
m/
• https://technofizi.net/bestcomputer-
science-and-engineeringcse-project-
topics-ideas-forstudents/
Week 8 SQL Injections, Day 1 Hour#1 Motivational Lecture (For further detail • Task –
Hacking Wireless please see Page No: 3& 4) 46
Networks, Hour#2 SQL Injection
Hacking Web Types of SQL injection • Task –
Servers Hour#3 Task 46 to be practiced by Students 47
Hour#4 SQL Injection Methodology SQL
Injection Tools • Task –
Day 2 Hour#1 Launch a SQL Injection Attack Enumerate 48
number of columns in database
• Task –
Hour#2 Task 47 to be practiced by Students 49
Hour#3 Blind SQL Injection Attack
Bypass Website Logins Using SQL Injection • Task –
50
Hour#4 Task 48 to be practiced by Students
• Task –
Day 3 Hour#1 SQL Injection Detection Tools
51
Use WebCruiser to Detect SQL Injection
Hour#2 Task 49 to be practiced by Students • Task –
Hour # 3-4 • Wireless Terminology 51a
Wireless Networks
• Wireless Encryption
Wireless Threats
Wireless Hacking Methodology
Day 4 Hour # 1-2 Wi-Fi Encryption Cracking
WEP/WPA/WPA2 Cracking Tools
Hour # 3-4 Task 50 to be practiced by Students
Details may
Day 5 Hour # 1-2 Website Defacement be seen at
Web Cache Poisoning Attack Annexure-I
Web Server Attack Methodology
Web Server Attack Tools
Cyber Security
Web Server Security Tools
Week 9 Cloud Computing Day 1 Hour#1 Motivational Lecture (For further detail • Task –
& Security please see Page No: 3& 4) 52
Hour#2 Cloud Computing Concepts
Hour#3 Cloud Computing Service / Deployment • Task –
Models 53
Hour#4 Creating free-tier account on AWS by
Students • Task –
Day 2 Hour#1 AWS Account Security, Identity and 54
Access Management
Hour#2 Task 52 to be practiced by Students • Task –
Hour#3 AWS Management Console / SDK / CLI
55
access
Hour#4 Task 53 to be practiced by Students • Task –
56
Day 3 Hour#1 Compute Services (EC2, AMI,
Containers, • Task –
Dockers, Kubernetes) 57
Serverless Computing
Hour # 2-3 Task 54 to be practiced by Students
Hour#4 Container and Kubernetes
Vulnerabilities Cloud Attacks
Day 4 Hour#1 Components of Virtual Private Cloud in
AWS Details may
Hour#2 Task 55 to be practiced by Students
be seen at
Hour#3 Cloud Network Security (Security Annexure-I
Groups, Network ACLs, AWS Network
Firewall)
Hour#4 Task 56 to be practiced by Students
Details may
be seen at
Annexure-I
Week 11 Next Generation Day 1 Hour#1 Motivational Lecture (For further detail • Task –
Firewall (USG please see Page No: 3& 4) 67
6000v), Hour#2 Evolution / Need for NGFW
Data Center Deployment Models • Task –
Advanced 68
Hour#3 Initial Setup / Boot strapping of Huawei
Architecture and
USG6000v Firewall
implementation • Task –
of Web Security. Hour#4 Task 67 to be practiced by Students
69
Day 2 Hour#1 • Traffic flow
• Security Policy Components
Security Zones • Task –
Creating Individual Objects and Groups 70
Cyber Security
Hour#2 Task 68 to be practiced by Students
Hour#3 Filtering based on Application Visibility • Task –
and Control 71
Hour#4 Task 69 to be practiced by Students
• Task –
Day 3 Hour#1 Filtering based on Web URLs 72
File Blocking
Hour#2 Task 70 to be practiced by Students • Task –
Hour#3 Intrusion Detection and Prevention 73
(IPS) / SNORT Rules
Hour#4 Task 71 to be practiced by Students • Task –
Day 4 Hour#1 SSL Decryption 74
Cyber Security
be seen at
Day 5 Hour#1 Features and Functionality of Cisco WSA Annexure-I
Implementation / Bootstrapping
Self-employment
Cyber Security
Hour#3 Exploring Freelancing Sites
Hour#4 Fundamentals of Business Development
Day 2 Hour#1 Entrepreneurship
Hour#2 Startup Funding
Hour#3 Business Incubation and Acceleration
Business Value Statement
Cyber Security
Search for jobs by:
• Company
• Category
• Location
• All jobs
• Agency
• Industry
Day 5 Hour # 1-4 Final Assessment / Closing Address
Cyber Security
Project Employable ● Motivational Lecture( For further detail
Project/Assignment please see Page No: 3& 4)
(6 weeks i.e. 7-13) in ● Guidelines to the Trainees for selection
addition of regular of students employable project like final
classes. year project (FYP)
OR ● Assign Independent project to each
On job training ( 2 Trainee
weeks) ● A project based on trainee’s aptitude
and acquired skills.
● Designed by keeping in view the
emerging trends in the local market as
well as across the globe.
● The project idea may be based on
Entrepreneur.
● Leading to the successful employment.
● The duration of the project will be 6
weeks
● Ideas may be generated via different
sites such as: https://1000projects.org/
https://nevonprojects.com/
https://www.freestudentprojects.com/
https://technofizi.net/best-computer-
science-and-engineering-cse-project-
topics-ideas-for-students/
• Final viva/assessment will be conducted
on project assignments.
• At the end of session the project will be
presented in skills competition
• The skill competition will be conducted
on zonal, regional and National level.
• The project will be presented in front of
Industrialists for commercialization
• The best business idea will be placed in
NAVTTC business incubation center for
commercialization.
OR
On job training for 2 weeks:
• Aims to provide 2 weeks industrial
training to the Trainees as part of overall
training program
• Ideal for the manufacturing trades
• As an alternate to the projects that
involve expensive equipment
• Focuses on increasing Trainee’s
motivation, productivity, efficiency and
quick learning approach.
Tasks For Cyber Security Annexure-I
Cyber Security
Task
Task Description Remarks
No.
Cyber Security
Open Source As a professional Ethical Hacker or Pen Tester, your first step
Information Gathering will be to check for the reachability of a computer in the target
using Windows network. Operating systems offer several utilities that you
Command Line can readily use for primary information – gathering.
Utilities
Windows command-line utilities such as ping nslookup. And
1
tracert gather important information like IP address,
maximum Packet Fame size, etc., about a target network of
system that form a base for security assessment and pen
test.
Cyber Security
Collecting Information Collect information on the target website and extract the
About a Target
source code of the web pages built in HMII, Java Script,
Website using
Firebug CSS script etc. This activity may reveal potential
vulnerabilities in the web application that can be exploited
5
later in the security assessment phases. This lab will
demonstrate how to reveal source code and collect
information about a target website.
8 Scanning Live Nmap allows you to scan your network and discover not
Systems and Open
only everything connected to it, but also a wide variety of
ports using Nmap
information about what's connected, what services each
host is operating. It allows a large number of scanning
techniques, such as UDP, TCP connect (), TCP SYN
(halfopen), and FTP.
Cyber Security
steps.
DNS Foot printing You have collected a lot of information using the Whois
database. The next task that you need to perform is to
11 Footprinting using Search engines can provide a wealth of information about the
Search Engines target organizations. You can simply type the name of the
organization in the search field. The search results can
provide information, such as physical location of
organization’s offices, contact information, email addresses
and employee names. An attacker can use all this information
to initiate an attack. For example, an attacker can initiate a
social engineering attack using contact information,
telephone, or mobile numbers.
12 Network Footprinting If you manage a small network, it is much easier to keep track
using Network
of connected devices. However, as a network grows to
Topology Mapper and
Advanced IP Scanner instead include hundreds or thousands of connected devices,
it becomes nearly impossible to track them manually. You may
have to track and map them, but a manual discovery can be
a daunting task. You can use various tools to automatically
draw a network, eliminating this issue. In this exercise, you
will learn about Network Topology Mapper and Advanced IP
Scanner
Cyber Security
13 NetBIOS Enumeration In Windows, you have a utility named Nbtstat that helps you
using Nbtstat and obtain NetBIOS information, such as NetBIOS name tables
Nmap and NetBIOS name cache. It is a pretty easy-to-use utility
14 SNMP Enumeration Several devices are configured to use the Simple Network
using IP network
Management Protocol (SNMP), which helps an administrator
Browser and
SNMPCheck manage them and get their current status. An attacker can
perform SNMP enumeration by using the default community
string and extracting a lot of information from the device. The
information can include ARP and routing tables. In this
exercise, you will learn to perform SNMP enumeration using
IP network browser and SNMP-Check utility
Cyber Security
15 NTP, DNS and FTP Network Time Protocol (NTP) is used for time
Enumeration synchronization. It can provide information to connect users
to an NTP server, system names, and operating systems.
Systems internal to a network can use either an internal or
external NTP server. Even though the NTP service is not a
concern for many network administrators, if exploited, it can
provide a wealth of information to the attacker. DNS plays a
vital role on the Internet. There are several tools that the
attacker can use to perform a zone transfer. Some of the key
tools are nslookup, dig, and DNSRecon. The host command
can also provide a lot of information, such as SOA records of
the authoritative nameservers or print the IP addresses of a
specific domain.
16 Use Nikto for Nikto is a vulnerability scanner that is part of Kali Linux.
Vulnerability Scanning Ethical hackers, penetration testers widely use it, and hackers
to find the vulnerabilities in web applications.
17 Use Lynis for System Lynis is a built-in multi-purpose tool in Kali Linux. It is
Vulnerability Scanning designed to perform tasks like security auditing, compliance
testing, penetration testing, vulnerability detection and system
hardening.
Cyber Security
19 Installation of Ubuntu Kali Linux is a famous distribution for Hackers, Pentesters,
Linux and Kali Linux Forensics Investigators and Security Researchers that comes
pre-configured with already installed hacking tools that you
can use.
20 Basic Shell commands A shell is a special user program that provides an interface to
of Linux the user to use operating system services. Shell accepts
human-readable commands from the user and converts them
into something which the kernel can understand. It is a
command language interpreter that executes commands read
from input devices such as keyboards or from files. In this lab
exercise, we will learn/practice basic terminal commands of
Linux.
21 Managing users and In Linux, every user is assigned an individual account which
group accounts, contains all the files, information, and data of the user. You
partitions can create multiple users in a Linux operating system using
Linux user commands. Users and groups are used to control
access to files and resources.
22 Managing Files and Linux is a multi-user system. Every file and directory in your
their Permissions account can be protected from or made accessible to other
Cyber Security
users by changing its access permissions. Every user has
responsibility for controlling access to their files.
23 File Ownership All Linux files belong to an owner and a group. When
permissions and users are represented by letters, that is
called symbolic mode. For users, u stands for user owner, g
for group owner, and o for others. For permissions, r stands
for read, w for write, and x for execute.
24 Working with Bash / A shell script is an executable file containing multiple shell
Shell Scripts commands that are executed sequentially. Linux Shell
scripting is writing a series of command for the shell to
execute. Shell variables store the value of a string or a
number for the shell to read. Shell scripting in Linux can help
you create complex programs containing conditional
statements, loops, and functions.
26 Apache Server on Linux As a Web server, Apache is responsible for accepting directory
(HTTP) requests from Internet users and sending them their
desired information in the form of files and Web pages.
Apache is the most commonly used Web server on Linux
systems. Web servers are used to serve Web pages
requested by client computers. Clients typically request and
view Web pages using Web browser applications such as
Firefox, Opera, Chromium, or Internet Explorer.
27 FTP/SMB/DHCP/DNS/M Domain Name System (DNS) is used to resolve (translate)
Cyber Security
ail Servers on Linux hostnames to internet protocol (IP) addresses and vice versa.
A DNS server, also known as a nameserver, maps IP
addresses to hostnames or domain names. We can use linux
distribution for building other common services like
FTP/SMB/DHCP/Apache and Mail services.
32 Hide Data using Steganography is the technique of hiding secret data within
Steganography an ordinary, non-secret, file or message in order to avoid
detection; the secret data is then extracted at its destination.
The use of steganography can be combined with encryption
as an extra step for hiding or protecting data. Hide’N’Send is
one of the best image Steganography tools. It includes
encryption and hiding of data under an image file (JPEG
format). It encrypts the data using the F5 steganography
algorithm. Hiding of data is done using the LSB (Least
Significant Bit) algorithm for Image Steganography. Instead
of hiding in a file structure, these algorithms hide the data
inside the image.
36 Sniffing Technique: DNS poisoning intends to forge the DNS records so that the
DNS Poisoning victim can be redirected to the malicious sites. The attacker
adds the fake or forged records into the DNS resolver cache,
which the DNS uses to respond to the DNS queries received
from the clients. In this task, you will learn to perform DNS
poisoning using DNSChef
37 Sniffing detection and Various methods can be used against sniffing, which usually
countermeasures using takes place using weak protocols, such as HTTP and FTP. As
XArp utility a basic precaution, you would avoid using weak protocols. It
is always advisable to use protocols that encrypt traffic.
Encryption also prevents the attacker from reading data in
transmission. In this exercise, you will learn to prevent sniffing
attacks using XArp utility
38 SYN Flooding a Target A SYN flood is a form of denial – of – service attack in which
Host using Metasploit an attacker sends a succession of SYN requests to a target
machine in an attempt to exhaust its resources and make it
unresponsive to legitimate in incoming traffic
39 SYN Flooding a Target A SYN flood is a form of denial – of – service attack in which
Host using hping3 an attacker sends a succession of SYN requests to the
target’s system to consume enough server resources to make
the system unresponsive to legitimate traffic. Hs A SYN flood
attack works by not responding to the server with the
expected ACK code. The malicious client can either not send
the expected ACK, or spoof the source IP address in the SYN,
causing the server to send the SYN – ACK to a falsified IP
address – which will not send an ACK because it
Cyber Security
“knows” that it never sent a SYN. The server will wait for the
acknowledgment for some time, as simple network
congestion could also be the cause of the missing ACK, but
in an attack increasingly large numbers of half – open
connections will bind resources on the server until no new
connections is made , resulting in a denial of service to
legitimate traffic, Some systems may also malfunction badly
or even crash
41 Perform Ping of Death Using the ping command, you can perform a Ping of Death
Attack attack. You can send data packets of a size of 65500
indefinitely to a target system. While it may not bring down a
system, it will impact the target system’s performance. In this
task, you will perform the Ping of Death attack.
42 Performing Distributed A distributed denial of service (DDoS) attack involves a
Denial of Service Attack
using HOIC group of compromised systems usually infected with Trojans
used to perform a DoS attack on a target system or network.
43 Network Level Session In network level hijacking, you are looking to identify the
Hijacking – Capture session id or cookie that identifies a user’s session with a
Cookie Sessions server. This information can be used later in application level
hijacking to take over a session. In this exercise, you will
capture cookies using Burp Suite.
44 Web Application
Security using WAF (F5
F5 BIG-IP® Application Security Manager™ (ASM) is a
ASM)
flexible web application firewall that secures web applications
in traditional, virtual, and private cloud environments. In this
exercise, you will explore different
Cyber Security
strategies to use F5 ASM.
45 Web Application AWS WAF is a web application firewall that helps protect apps
Security using AWS and APIs against bots and exploits that consume resources,
WAF skew metrics, or cause downtime. An AWS WAF rule defines
how to inspect HTTP(S) web requests and the action to take
on a request when it matches the inspection criteria. In this
exercise, you will learn how to define rules in AWS WAF for
effective defense against Web application exploits.
46 SQL Injection Attacks SQL Injection is one of the most common and perilous attacks
on MSSQL Database that website’s software experience. This attack is performed
on SQL databases that have weak codes and this vulnerability
can be used by an attacker to execute database queries to
collect sensitive information, modify the database entrics or
attach a malicious code resulting in total compromise of the
most sensitive data. As an Expert Penetration Tester and
Security Administrator, you need to test web applications
running on the MS SQL Server database for vulnerabilities
and flaws.
47 SQL Injection Attack to There are many specific SQL injection attacks. In this task,
enumerate number of you enumerate the database to see how many columns are
columns in database in the database. This gives us information for other types of
SQL injection attacks.
48 Blind SQL Injection The SQL Injection — Blind — Boolean-Based attack is similar
Attack, Bypass Website to an SQL Injection attack. The only difference is that in a
Logins Blind — Boolean attack, you get answers in the form of true
or false. In this task, you will learn to launch a SQL Injection
— Blind — Boolean attack. Using SQL Injection, you can
bypass web application logins. Each web application that
uses an authentication mechanism requires a database in the
backend to authenticate users. Before you
Cyber Security
plan to bypass web application authentication, you need to
find Websites that can be prone to such attacks.
49 Use WebCruiser to WebCruiser is an application vulnerability scanning tool. It can
Detect SQL Injection help you audit a web application for vulnerabilities that may
exist. It can scan for the common web application
vulnerabilities, such as SQL injection, cross-site scripting,
buffer overflow, and flash/flex application and Web 2.0
exposure scans. In this task, you will learn to use WebCruiser.
50 WiFi Packet Sniffing Wireless networks can be open to active or passive attacks.
using Microsoft
These attacks include Dos, MITM, spoofing, jamming, war
Network Monitor and
Wireshark driving, network hijacking, packet sniffing, and many more.
Passive attacks that take place on wireless networks are
common and are difficult to detect since the attacker usually
just collects information. Active attacks happen when a hacker
has gathered information about the network after a successful
passive attack. Sniffing is the act of monitoring the network
traffic using legitimate network analysis tools.
Hackers can use monitoring tools, including AiroPeck,
Ethereal, TCPDump, or Wireshark, to monitor the wireless
networks. These tools allow hackers to find an unprotected
network that they can hack. Your wireless network can be
protected against this type of attack by using strong
encryption and authentication methods In this lab, we use
Microsoft Network Monitor, a tool that an sniff network using
a wireless adapter. Because you are the ethical hacker and a
penetration tester of an organization, you need to check the
wireless security and evaluate weaknesses present in your
organization
51a Exploiting Parameter Though web applications enforce certain security policies,
Tampering and XSS they are vulnerable to attacks such as SQL injection, crosssite
Vulnerabilities in Web scripting, and session hijacking.
Applications
52 Identity and Access Identity and Access Management (IAM) is a security and
Management on AWS business discipline that includes multiple technologies and
business processes to help the right people or machines to
access the right assets at the right time for the right reasons,
while keeping unauthorized access and fraud at bay. In this
exercise, IAM users for accessing AWS resources would be
created by students.
53 Installation of AWS To access the services, you can use the AWS Management
CLIv2 and accessing Console (a simple intuitive user interface), the Command Line
resources via CLI Interface (CLI), or Software Development Kits (SDKs).In this
exercise, students will access AWS resources via AWS
management console and CLI
56 Cloud Network Security AWS Security Groups help you secure your cloud
using Security Groups, environment by controlling how traffic will be allowed into your
NACLs, AWS Network EC2 machines. With Security Groups, you can ensure that all
Firewall the traffic that flows at the instance level is only through your
established ports and protocols.
57 DDoS Protection design DDoS mitigation is included automatically with AWS services.
in AWS DDoS resilience can be improved further by using an AWS
architecture with specific services.
58 Cisco ASA Firewall Basic Firewall initialization using CLI/ASDM and Firewall
Initialization access control.
59 Firewall Access Control Configure appropriate security rules to regulate the traffic as
per company’s need.
60 NAT on Cisco ASA Configuring Object NAT and manual NAT with source &
destination-based schemes.
members.
66 Modular Policy Configuring MPF with security filtering. Implementation of
Framework ASA clustering with spanned ether-channel and interface
mode.
67 Deployment of Huawei Initial setup for Huawei USG 6000v and its bootstrapping
USG 6000v
68 Security Polices on Configuring various components of security policy with zones,
NGFW objects and groups.
70 Web Filtering and File Web filtering software monitors and manages the locations
Blocking where users are browsing on the Internet, enabling an
organization to either allow or block web traffic in order to
protect against potential threats and enforce corporate policy.
A File Blocking rule defines how IM Security blocks a file
based on file type, file or extension name, or file size.
71 Intrusion Prevention IPS policy allows you to view predefined signatures and
System Policy customize the intrusion prevention configuration at the
category as well as individual signature level. Categories are
signatures grouped together based on the application and
protocol vulnerabilities.
74 Cisco Web Security Bootstrapping Cisco WSA and deploy proxy services
Appliance
75 WSA Policies and Configuring WSA policies to enforce data security features
Enforcing Acceptable and defending against Malware.
use
76 Installation of Cisco Cisco Email Security Appliance is an email security gateway
Email Security product. It is designed to detect and block a wide variety of
Appliance email-borne threats, such as malware, spam and phishing
attempts.
79 Cisco ISE policies Implementing next generation NAC solution with Identity
(AAA, Profiling, management, profiling, posturing, BYOD access control and
Posturing, Guest guest services
Access)