<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=4393876&amp;fmt=gif">

Cisco Secure Workload Training

For Customers & End Users. CSW Analytics is the platform that discovers and monitors your applications - enabling the Zero Trust Model. This course will introduce Engineers and Operators to CSW, and prepare them to implement it in their own networks. Students will discover, manage and monitor applications on a live lab environment.

Register Today

15-1
1000
100-1

Delivery: Instructor Led Training

Type: Lecture + Hands-On Lab, In-Person Delivery, Live via WebEx

OBJECTIVES

  • Describe the components of CSW
  • Configure CSW for use in a customer environment
  • Install and manage hardware and software agents
  • Conduct automated application dependency mapping
  • Manage and enforce application policies on a live network
  • Describe how to integrate CSW telemetry with operational systems

PREREQUISITES

  • Good grasp of networking concepts
  • Knowledge of Firewall and Load Balancer Principles
  • Fundamental Understanding of Network Protocols
  • Familiarity with the Linux command line

WHO BENEFITS FROM THIS TRAINING

  • Network Engineers
  • Systems Engineers
  • Solution Architects
  • Systems Integrators
  • Application Owners
  • Data Center & Cloud Infrastructure Engineers
  • Network Engineers
  • DevOps Teams Engineers

COURSE OUTLINE

Module 1: Introduction

Module 2: CSW Overview

  • Lab 0: Accessing the Lab
  • Lab 1: CSW Overview with Security Dashboard

Module 3:

  • Architecture Overview
  • Data Collection
  • Analytics Engine
  • Open Access

Module 4: Planning and Development

  • Create Scopes, Roles, Users
  • Sensor Types and Uses
  • Lab 2: Software Agent Installation

Module 5: Application Dependency Mapping

  • Overview
  • Analysis
  • Use Cases
  • Lab 3: Segmentation Compliance with Policy

Module 6: Whitelist Policy Enforcement

  • Policy Today
  • Capturing Intent
  • Rules and Enforcement
  • Policy Simulation & Compliance
  • Lab 4: Segmentation Compliance with Policy

Module 7: Whitelist Policy Analysis

  • Overview
  • Enable Policy Analysis
  • Live Policy Analysis
  • Backdated Policy Experiments
  • Quick Policy Analysis
  • Lab 5: Segmentation Compliance Analysis

Module 8: Network Performance Monitoring and Diagnostics

Module 9: Prevention - Before the Attacks

  • Lab 6: Identifying Malware & Vulnerable Hosts
  • Lab 7: Minimizing Attack Surfaces

Module 10: Quarantine and Remediation

  • Lab 8: Vulnerability Quarantine and Remediation

Module 11: Detection - During the Attacks

  • Lab 9: Identifying Data Leaks
  • Lab 10: Attack Detection and Quarantine

Module 12: Remediation - After the Attacks

  • Lab 11: Security Forensics

Module 13: CSW Platform Monitoring

Module 14: Alerts & External Integrations

  • CSW Overview
  • User Apps

Module 15: CSW Implementation Review