Securing Email with Cisco Email Security Appliance

3 Day Course
Hands On
Official Curriculum

Book Now - 3 Delivery Methods Available:

Classroom Virtual Classroom Private Group - Virtual Self-Paced Online


The Securing Email with Cisco Email Security Appliance (SESA) v3.0 course shows you how to deploy and use Cisco® Email Security Appliance to establish protection for your email systems against phishing, business email compromise, and ransomware, and to help streamline email security policy management. This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention.


After you complete this course you should be able to:

  • Describe and administer the Cisco Email Security Appliance (ESA)
  • Control sender and recipient domains
  • Control spam with Talos SenderBase and anti-spam
  • Use anti-virus and outbreak filters
  • Use mail policies
  • Use content filters
  • Use message filters to enforce email policies
  • Prevent data loss
  • Perform LDAP queries
  • Authenticate Simple Mail Transfer Protocol (SMTP) sessions
  • Authenticate email
  • Encrypt email
  • Use system quarantines and delivery methods
  • Perform centralized management using clusters
  • Test and troubleshoot

Target Audience

Individuals responsible for messaging implementations such as Enterprise messaging managers and system administrators, Email system designers, architects or Network managers.

Training Partners

We work with the following best of breed training partners using our bulk buying power to bring you a wider range of dates, locations and prices.


Hide all

Reviewing the Cisco ESA (6 topics)

  • Reviewing the Cisco Security Management Appliance
  • Defining an SMTP Conversation
  • Identifying Terms and Definitions
  • Examining the Pipeline
  • Describing Cisco Email Security Appliance Models and Licensing
  • Installing and Verifying the Cisco Email Security Applicance

Administering the Cisco Email Security Appliance (6 topics)

  • Configuring Localized Message Tracking and Reporting
  • Configuring Centralized Tracking and Reporting
  • Tracking and Reporting Messages
  • Administering the Cisco Email Security Appliance
  • Managing Log Files
  • Creating and Using Administrator Accounts

Controlling Sender and Recipient Domains (6 topics)

  • Configure Public and Private Listeners
  • Describing the Host Access Table (HAT)
  • Describing the Recipient Access Table (RAT)
  • Describing Email Authentication Methods
  • Defining Domain-Based Message Authentication
  • Troubleshooting with Mail Logs

Controlling Spam with Cisco SensorBase and Antispam (9 topics)

  • Describing SensorBase
  • Configure Antispam
  • Quarantining Spam on the Cisco Email Security Appliance
  • Describing Safelist and Blocklist
  • Quarantining Spam on the Cisco Security Management Appliance
  • Configuring Bounce Verification
  • Describing Web Reputation Filters
  • Defining Outbreak Filters
  • Using Antivirus, Virus Outbreak Filters, and Advanced Malware

Protection (3 topics)

  • Enabling Antivirus Engines
  • Using Outbreak Filters
  • Using Advanced Malware Protection

Using Mail Policies (3 topics)

  • Describing Email Security Manager
  • Creating User-Based Mail Policies
  • Using Message Splintering

Using Content Filters (4 topics)

  • Describing Content Filtering
  • Configuring Basic Content Filtering
  • Applying Content Filter Applications
  • Describing and Configuring Message Filtering

Preventing Data Loss (4 topics)

  • Identifying the Data Loss Problem
  • Choosing a Cisco DLP Solution
  • Implementing DLP Configuration
  • Describing the RSA Engine

Using LDAP (6 topics)

  • Describing LDAP Features
  • Describing Query Tokens and Operators
  • Configuring LDAP Profiles
  • Configuring SMTP Call-Ahead
  • Reviewing Case Studies
  • Using LDAP Group Queries

Using Authentication and Encryption (3 topics)

  • Configuring Cisco Registered Envelope Service
  • Describing TLS
  • Authenticating Email with SPF

Using Message Filters (3 topics)

  • Identifying Mesage Filters
  • Describing Regular Expressions Basics
  • Applying Message Filters

Using System Quarantines and Delivery Methods (5 topics)

  • Describing Quarantines
  • Describing Policy, Virus and Outbreak Quarantines
  • Setting Delivery Limits
  • Creating Virtual Gateways
  • Configuring Bounce Profiles

Clustering (4 topics)

  • Creating a Clustered Environment
  • Joining an Existing Cluster
  • Managing a Clustered Environment
  • Administering a Cluster from the GUI

Troubleshooting (4 topics)

  • Identifying Appliance-Related Problems
  • Monitoring the System
  • Diagnosing Problems
  • Locating Common Problems and Solutions

Labs (23 topics)

  • Hardware Challenge Lab 1: Access the Cisco Remote Lab
  • Hardware Challenge Lab 2: Install Your Cisco Email Security Appliance
  • Hardware Challenge Lab 3: Perform Administration
  • Hardware Challenge Lab 4: Test Your Listener Settings
  • Hardware Challenge Lab 5: Prevent Domain Spoofing with DMARC
  • Hardware Challenge Lab 6: Defend Against Spam with SensorBase and Antispam
  • Hardware Challenge Lab 7: Defend Against Viruses
  • Hardware Challenge Lab 8: Prevent Advanced Persistent Threats with Advanced Malware Protection
  • Hardware Challenge Lab 9: Customize Mail Policies for Your End Users
  • Hardware Challenge Lab 10: Enforce Your Business Policies in Email Delivery
  • Hardware Challenge Lab 11: Manage High-Volume Mail Flow
  • Hardware Challenge Lab 12: Configure DLP
  • Hardware Challenge Lab 13: Configure LDAP Accept
  • Hardware Challenge Lab 14: Configure SMTP Call-Ahead
  • Hardware Challenge Lab 15: Accommodate Multiple Domains Using LDAP Accept Bypass and Domain Assignments
  • Hardware Challenge Lab 16: Control Mail Policies with LDAP Group Queries
  • Hardware Challenge Lab 17: Configure Envelope Encryption
  • Hardware Challenge Lab 18: Encrypt Email with TLS
  • Hardware Challenge Lab 19: Verify SIDF and SPF
  • Hardware Challenge Lab 20: Redirect Mail with Message Filters
  • Hardware Challenge Lab 21: Configure Virtual Gateways
  • Hardware Challenge Lab 22: Configure Clusters
  • Hardware Challenge Lab 23: Troubleshoot


To fully benefit from this course, you should have one or more of the following basic technical competencies:

  • Cisco certification (Cisco CCENT® certification or higher)
  • Relevant industry certification, such as (ISC)2, CompTIA Security+, EC-Council, Global Information Assurance Certification (GIAC), and ISACA
  • Cisco Networking Academy letter of completion (CCNA® 1 and CCNA 2)
  • Windows expertise: Microsoft [Microsoft Specialist, Microsoft Certified Solutions Associate (MCSA), Microsoft Certified Systems Engineer (MCSE)], CompTIA (A+, Network+, Server+)

The knowledge and skills that a student must have before attending this course are:

  • TCP/IP services, including Domain Name System (DNS), Secure Shell (SSH), FTP, Simple Network Management Protocol (SNMP), HTTP, and HTTPS
  • Experience with IP routing

Relevant Certifications

Scheduled Dates

Please select from the dates below to make an enquiry or booking.


Different pricing structures are available including special offers. These include early bird, late availability, multi-place, corporate volume and self-funding rates. Please arrange a discussion with a training advisor to discover your most cost effective option.

Code Location Duration Price Aug Sep Oct Nov Dec Jan
Virtual Classroom (Virtual On-Line)
4 Days $3,015
Zoom Virtual Centre
4 Days $2,775

Course PDF


Share this Course


Recommend this Course