In the past, manufacturers would build a tool to monitor a domain element. A business would then...
CSW Implementation
Cisco Secure Workload Training
CSW Implementation Training Overview
FOR CUSTOMERS & END-USERS. CSW Analytics is the platform that discovers and monitors your applications - enabling the Zero Trust Model. This course will introduce Engineers and Operators to CSW, and prepare them to implement it in their own networks. Students will discover, manage and monitor applications on a live lab environment.
CSW Implementation Prerequisites
-
Good grasp of networking concepts
-
Knowledge of Firewall and Load Balancer Principles
-
Fundamental Understanding of Network Protocols
-
Familiarity with the Linux command line
Get In Touch
CSW Implementation Objectives
-
Describe the components of CSW
-
Configure CSW for use in a customer environment
-
Install and manage hardware and software agents
-
Conduct automated application dependency mapping
-
Manage and enforce application policies on a live network
-
Describe how to integrate CSW telemetry with operational systems
TARGET AUDIENCE
-
Network Engineers
-
Systems Engineers
-
Solution Architects
-
Systems Integrators
-
Application Owners
-
Data Center & Cloud Infrastructure Engineers
-
Network Engineers
-
DevOps Teams
Delivery : Instructor Led Training
Type: Lecture + Hands-On Lab, In-Person Delivery, Live via WebEx
COURSE OUTLINE
Module 1: Introduction
Module 2: CSW Overview
- Lab 0: Accessing the Lab
- Lab 1: CSW Overview with Security Dashboard
Module 3:
- Architecture Overview
- Data Collection
- Analytics Engine
- Open Access
Module 4: Planning and Development
- Create Scopes, Roles, Users
- Sensor Types and Uses
- Lab 2: Software Agent Installation
Module 5: Application Dependency Mapping
- Overview
- Analysis
- Use Cases
- Lab 3: Segmentation Compliance with Policy
Module 6: Whitelist Policy Enforcement
- Policy Today
- Capturing Intent
- Rules and Enforcement
- Policy Simulation & Compliance
- Lab 4: Segmentation Compliance with Policy
Module 7: Whitelist Policy Analysis
- Overview
- Enable Policy Analysis
- Live Policy Analysis
- Backdated Policy Experiments
- Quick Policy Analysis
- Lab 5: Segmentation Compliance Analysis
Module 8: Network Performance Monitoring and Diagnostics
Module 9: Prevention - Before the Attacks
- Lab 6: Identifying Malware & Vulnerable Hosts
- Lab 7: Minimizing Attack Surfaces
Module 10: Quarantine and Remediation
- Lab 8: Vulnerability Quarantine and Remediation
Module 11: Detection - During the Attacks
- Lab 9: Identifying Data Leaks
- Lab 10: Attack Detection and Quarantine
Module 12: Remediation - After the Attacks
- Lab 11: Security Forensics
Module 13: CSW Platform Monitoring
Module 14: Alerts & External Integrations
- CSW Overview
- User Apps
Module 15: CSW Implementation Review