Protecting against Malware Threats with Cisco AMP for Endpoints

4 days


This lab-intensive course introduces students to the powerful features of Cisco AMP for Endpoints software. A number of step by step attack scenarios will provide an understanding of the operational uses of the product.

Students will learn how to build and manage a Cisco AMP for Endpoints deployment, create policies for endpoint groups, and deploy connectors .The AMP for Endpoints console provides powerful tools that will enable you to analyze malware detections.



Technical professionals who need to know how to deploy and manage Cisco AMP for Endpoints software in their network environments.

Skills Gained

Module 1: Introduction to Cisco AMP Technologies

Module 2: AMP for Endpoints Overview and Architecture

Module 3: Console Interface and Navigation

Module 4: Using AMP for Endpoints

Module 5: Detecting an Attacker— A Scenario

Module 6: Modern Malware

Module 7: Analysis

Module 8: Analysis Case Studies

Module 9: Outbreak Control

Module 10: Endpoint Policies

Module 11: Groups and Deployment

Module 12: AMP REST API

Module 13: Accounts


  • Lab 1: Accessing AMP for Endpoints
  • Lab 2: Attack Scenario
  • Lab 3: Attack Analysis
  • Lab 4: Analysis Tools and Reporting
  • Lab 5: Zbot Analysis 
  • Lab 6: Outbreak Control
  • Lab 7: Endpoint Policies
  • Lab 8: Groups and Deployment
  • Lab 9: Testing Your Policy Configuration 
  • Lab 10: REST API
  • Lab 11: User Accounts (optional)


Attendees should meet the following prerequisites:

  • Technical understanding of TCP/IP networking and network architecture - ICND2 Recommended
  • Technical understanding of security concepts and protocols - IINS Recommended

Course Outline

After completing this course you should be able to:

  • Identify the key components and methodologies of Cisco Advanced Malware Protection (AMP)
  • Recognize the key features and concepts of the AMP for Endpoints product
  • Navigate the AMP for Endpoints console interface and perform first-use setup tasks
  • Identify and use the primary analysis features of AMP for Endpoints
  • Use the AMP for Endpoints tools to analyze a compromised host
  • Describe malware terminology and recognize malware categories
  • Analyze files and events by using the AMP for Endpoints console and be able to produce threat reports
  • Use the AMP for Endpoints tools to analyze a malware attack and a ZeroAccess infection
  • Configure and customize AMP for Endpoints to perform malware detection
  • Create and configure a policy for AMP-protected endpoints
  • Plan, deploy, and troubleshoot an AMP for Endpoints installation
  • Describe the AMP Representational State Transfer (REST) API and the fundamentals of its use
  • Describe all the features of the Accounts menu for both public and private cloud installations

Related Courses


Thinking about Onsite?

If you need training for 3 or more people, you should ask us about onsite training. Putting aside the obvious location benefit, content can be customised to better meet your business objectives and more can be covered than in a public classroom. It's a cost effective option.

Submit an enquiry from any page on this site, and let us know you are interested in the requirements box, or simply mention it when we contact you.

ITILv3, RESILIA, PRINCE2, PRINCE2 Agile, AgileSHIFT, MSP, M_o_R, P3M3, P3O, MoP, MoV courses on this page are offered by QA Affiliate of AXELOS Limited. ITIL, RESILIA, PRINCE2, PRINCE2 Agile, AgileSHIFT, MSP, M_o_R, P3M3, P3O,MoP, MoV are registered trademarks of AXELOS Limited. All rights reserved.

Upcoming Dates

  • GREEN This class is Guaranteed To Run.
  • SPVC - Self-Paced Virtual Class.
  • Click a Date to Enroll.
Course Location Days Cost Date
Virtual Virtual3 3000 £3000 2019-12-18
Virtual Virtual3 3000 £3000 2020-01-21
Virtual Virtual3 3000 £3000 2020-02-25
Virtual Virtual4 3000 £3000 2020-03-11