In the past, manufacturers would build a tool to monitor a domain element. A business would then...
Cisco Partner Training
Cisco Secure Workload Implementation
Cisco Partner Training: CSW Implementation
CSW ENABLEMENT CISCO PARTNER TRAINING
For Cisco and Cisco Partner Teams: CSW Analytics is the platform that discovers and monitors your applications - enabling the Zero Trust Model. This course will introduce technical Sales Teams to CSW, and prepare them to introduce it to their customers' networks. Students will discover, manage and monitor applications on a live lab environment. This Cisco partner training class is designed for Cisco and Cisco partner teams. A cisco.com or partner email address will be required for attendance.
PREREQUISITES
- Good grasp of networking concepts
-
Knowledge of Firewall and Load Balancer Principles
-
Fundamental Understanding of Network Protocols
- Familiarity with the Linux command line
Get In Touch
CSW ENABLEMENT CISCO PARTNER TRAINING OBJECTIVES
-
Describe the components of CSW Analytics
-
Configure CSW for use in a customer environment
-
Install and manage hardware and software agents
-
Understand how to position and sell CSW solutions
-
Conduct automated application dependency mapping
-
Manage and enforce application policies on a live network
-
Describe how to integrate CSW telemetry with operational systems
TARGET AUDIENCE
-
Technical Sales Teams
-
Network Engineers
-
Systems Engineers
-
Solution Architects
-
Systems Integrators
-
Application Owners
-
Data Center & Cloud Infrastructure Engineers
-
Network Engineers
-
DevOps Teams
Delivery: Instructor Led Training
Type: Lecture + Hands-On Lab, In-Person Delivery, Live via WebEx
COURSE OUTLINE
1: Introduction
2: CSW Overview
- Lab 0: Accessing the Lab
- Lab 1: CSW Overview with Security Dashboard
3: Workload Protection Solution Architecture
- Lab 2: Explore Application & Policy
4: Planning and Development
- Lab 3: Software Agent Installation
5: Application Dependency Mapping
- Lab 4: Whitelist Policy Creation using ADM with Software Agents
6: CSW Platform Monitoring
7: Whitelist Policy Enhancement
- Lab 5 Segmentation Compliance with Policy
8: Whitelist Policy Analysis
- Lab 6 Compliance Analysis & Policy Change Request
9: Prevention - Before the Attacks
- Lab 7: Identifying Malware & Vulnerable Hosts
- Lab 8: Minimizing Attack Surfaces
10: Quarantine and Remediation
- Lab 9: Vulnerability Quarantine and Remediation
11: Detection - During the Attacks
- Lab 10: Identifying Network Anomalies
- Lab 11: Attack Detection and Quarantine
12: Remediation - After the Attacks
- Lab 12: Security Forensics
13: Alterts & External Integrations
14: Positioning & Competitive
15: CSW Implementation Review