CSW Analytics Training
This Cisco CSW Analytics course following the CSW Implementation course is designed for Application, Security, and Network Engineers who operate the CSW Platform for Application and Security Operations. This course will cover material from an Operations perspective, discussing best practices, caveats and common issues. Topics will include Advanced ADM, ERSPAN Agents, Security Policy, Troubleshooting, and the Security Dashboard. THIS CLASS IS DESIGNED FOR EXISTING CSW CUSTOMERS.
Register Today



Delivery: Instructor Led Training
Type: Lecture + Hands-On Lab, In-Person Delivery, Live via WebEx
OBJECTIVES
After the course attendees will be able to:
- Understanding ACI policy based solutions and high level strategies for migrating applications to the ACI fabric
- Set-up, configurations of ACI fabrics, tenant, network profiles, contracts and endpoints
- Virtual Machine Manager Integration
- Connecting the fabric to external L2/L3 Networks and L4 - L7 services
- Automation strategies of the APICa
PREREQUISITES
- CSW Implementation class (or equivalent experience)
- Good grasp of networking concepts
- Knowledge of Firewall and Load Balancer Principles
- Fundamental Understanding of Network Protocols
- Familiarity with the Linux command line
WHO BENEFITS FROM THIS TRAINING
- Network Engineers
- Systems Engineers
- Solution Architects
- Systems Integrators
- Application Owners
- Data Center & Cloud Infrastructure Engineers
- Network Engineers
- • DevOps Teams
COURSE OUTLINE
Module 1: Advanced Application Dependency Mapping
-
Lab1: Advanced ADM
Module 2: ERSPAN Agents
-
Lab2: ERSPAN Agent ADM
Module 3: Security Policy
- Lab 3: Enforcing Security Policies
Module 4: Troubleshooting
- Lab 4: Segmentation Policy Violations
- Lab 5: Policy Conflict Resolution
- Lab 6: Security Rule Breaks Application
- Lab 7: What if? How to Handle Recurring Issues
Module 5: Flow Search
- Lab 8: Flow Search
Module 6: CSW Platform Monitoring 7. Security Dashboard Operations
- Lab 9: Security Dashboard Operations