Threat defense

5.5 Describe components of network security design

📘CCNP Encore (350-401-ENCORE-v1.1)


Threat defense is a core part of network security design. Its goal is to protect the network and its devices from attacks, malware, and unauthorized access. Cisco teaches a structured approach to threat defense to secure the entire IT environment.

Here’s a detailed breakdown:


1. What is Threat Defense?

Threat defense is a set of strategies and technologies that detect, prevent, and respond to security threats across a network. Threats can come from:

  • Malware (viruses, worms, ransomware)
  • Unauthorized access (hackers, rogue users)
  • Network attacks (DDoS, spoofing)
  • Exploits targeting vulnerabilities in software or hardware

The goal is to stop attacks before they damage the network or data and to limit the impact if an attack occurs.


2. Components of Threat Defense

Cisco breaks threat defense into several key components. These work together to provide multi-layered security.

a) Firewalls

  • Firewalls control what traffic is allowed in or out of the network.
  • Cisco devices use stateful inspection to track connections and make smart decisions about traffic.
  • Modern Cisco firewalls often include Next-Generation Firewall (NGFW) features:
    • Application awareness (blocks specific apps, not just ports)
    • User identity awareness (applies rules per user)
    • Threat intelligence integration

Exam tip: Understand the difference between traditional firewalls (port/protocol-based) and NGFWs (application and user-based).


b) Intrusion Prevention Systems (IPS)

  • IPS monitors traffic to detect and block malicious activity.
  • It can stop attacks in real-time using predefined signatures and anomaly detection.
  • Cisco devices often integrate IPS into their security appliances or firewalls (e.g., Firepower Threat Defense).

Key points to remember:

  • IPS is proactive—it doesn’t just alert; it can block attacks.
  • It works at the network layer and sometimes the application layer.

c) Malware Defense

  • Protects the network from viruses, ransomware, spyware, and other malicious software.
  • Uses technologies like:
    • Antivirus scanning of files and emails
    • Sandboxing: opening suspicious files in a safe environment to see if they are malicious
    • Advanced malware protection (AMP) from Cisco

Example for IT environment: If an employee downloads a malicious file from the internet, AMP can detect it and prevent it from spreading to servers or endpoints.


d) URL Filtering and Web Security

  • Controls access to websites and online services.
  • Helps prevent users from visiting malicious or unauthorized websites.
  • Often part of NGFW or Cisco Umbrella solutions.

Exam tip: Know that URL filtering can be policy-based—e.g., blocking social media, gambling sites, or known malware-hosting domains.


e) Email and Content Security

  • Protects users from phishing, spam, and malicious attachments.
  • Uses tools like Cisco Email Security Appliance (ESA).
  • Inspects email headers, attachments, and URLs in emails to detect threats.

f) Threat Intelligence

  • Threat intelligence gathers information about new attacks from external sources or internal monitoring.
  • Helps security devices identify and block new threats quickly.
  • Cisco Talos is Cisco’s threat intelligence organization.

Important concept: Threat intelligence allows the network to react faster than traditional static defenses.


g) Network Segmentation

  • Dividing a network into separate zones (e.g., internal, DMZ, guest) limits the spread of attacks.
  • Firewalls and access control policies enforce which devices or users can access each zone.

3. Layers of Threat Defense (Defense in Depth)

Cisco emphasizes defense in depth, which means multiple security layers protect the network:

  1. Perimeter defense: Firewalls, NGFWs, IPS
  2. Endpoint defense: Antivirus, AMP
  3. Email/web defense: Email filtering, URL filtering
  4. Segmentation: VLANs, internal firewalls
  5. Intelligence & monitoring: Threat intelligence, logging, SIEM

Exam tip: Understand that relying on one defense layer is risky. Combining multiple layers provides stronger protection.


4. How Threat Defense Works in IT Environments

  • Traffic comes into the network through firewalls and is inspected.
  • IPS scans for suspicious patterns and can block attacks in real-time.
  • Files and emails are scanned by AMP and email security appliances.
  • URL filtering blocks access to malicious websites.
  • Threat intelligence feeds all security devices with the latest attack data.
  • Segmentation ensures that if an attack occurs, it is contained within a limited part of the network.

Example for IT context:

  • A user clicks a malicious link in an email:
    1. Email security blocks the link or quarantines the message.
    2. If the user somehow bypasses this, URL filtering stops access to the site.
    3. If malware downloads, AMP detects and isolates it.
    4. IPS monitors for unusual traffic patterns and can block network spread.

5. Key Exam Takeaways

  • Understand all threat defense components: firewalls, IPS, AMP, URL filtering, email security, and segmentation.
  • Know how defense-in-depth works and why multiple layers are important.
  • Recognize Cisco-specific tools like NGFW, AMP, and Talos.
  • Be able to describe how threats are prevented, detected, and mitigated in a network.
  • Focus on IT-relevant examples, like malware, phishing, and network attacks.

Summary Table: Threat Defense Components

ComponentFunction
Firewall / NGFWControls traffic, blocks unauthorized access, inspects apps & users
IPSDetects and blocks attacks in real-time
AMP / Malware DefenseScans files, prevents malware, uses sandboxing
URL FilteringBlocks access to malicious websites
Email SecurityFilters spam, phishing, malicious attachments
Threat IntelligenceProvides updated threat info to prevent attacks
Network SegmentationLimits attack spread within network zones

This structure ensures students can clearly explain what threat defense is, why it matters, and how it works—everything necessary for the 5.5.a section of the exam.


Buy Me a Coffee