<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=4393876&amp;fmt=gif">

Cisco Secure Workload Training

For Customers & End Users. CSW Analytics is the platform that discovers and monitors your applications - enabling the Zero Trust Model. This course will introduce Engineers and Operators to CSW, and prepare them to implement it in their own networks. Students will discover, manage and monitor applications on a live lab environment.
15-1
1000
100-1

Delivery: Instructor Led Training

Type: Lecture + Hands-On Lab, In-Person Delivery, Live via WebEx

OBJECTIVES

  • Describe the components of CSW
  • Configure CSW for use in a customer environment
  • Install and manage hardware and software agents
  • Conduct automated application dependency mapping
  • Manage and enforce application policies on a live network
  • Describe how to integrate CSW telemetry with operational systems

PREREQUISITES

  • Good grasp of networking concepts
  • Knowledge of Firewall and Load Balancer Principles
  • Fundamental Understanding of Network Protocols
  • Familiarity with the Linux command line

WHO BENEFITS FROM THIS TRAINING

  • Network Engineers
  • Systems Engineers
  • Solution Architects
  • Systems Integrators
  • Application Owners
  • Data Center & Cloud Infrastructure Engineers
  • Network Engineers
  • DevOps Teams Engineers

COURSE OUTLINE

Module 1: Introduction

Module 2: CSW Overview

  • Lab 0: Accessing the Lab
  • Lab 1: CSW Overview with Security Dashboard

Module 3:

  • Architecture Overview
  • Data Collection
  • Analytics Engine
  • Open Access

Module 4: Planning and Development

  • Create Scopes, Roles, Users
  • Sensor Types and Uses
  • Lab 2: Software Agent Installation

Module 5: Application Dependency Mapping

  • Overview
  • Analysis
  • Use Cases
  • Lab 3: Segmentation Compliance with Policy

Module 6: Whitelist Policy Enforcement

  • Policy Today
  • Capturing Intent
  • Rules and Enforcement
  • Policy Simulation & Compliance
  • Lab 4: Segmentation Compliance with Policy

Module 7: Whitelist Policy Analysis

  • Overview
  • Enable Policy Analysis
  • Live Policy Analysis
  • Backdated Policy Experiments
  • Quick Policy Analysis
  • Lab 5: Segmentation Compliance Analysis

Module 8: Network Performance Monitoring and Diagnostics

Module 9: Prevention - Before the Attacks

  • Lab 6: Identifying Malware & Vulnerable Hosts
  • Lab 7: Minimizing Attack Surfaces

Module 10: Quarantine and Remediation

  • Lab 8: Vulnerability Quarantine and Remediation

Module 11: Detection - During the Attacks

  • Lab 9: Identifying Data Leaks
  • Lab 10: Attack Detection and Quarantine

Module 12: Remediation - After the Attacks

  • Lab 11: Security Forensics

Module 13: CSW Platform Monitoring

Module 14: Alerts & External Integrations

  • CSW Overview
  • User Apps

Module 15: CSW Implementation Review

Ready to Transform Your IT?

Submit the form to connect with our team and discover how BTA can simplify your IT and deliver impactful results.


Register Today

FAQs

What is CSW implementation?

It is the guided deployment of Cisco Secure Workload, including architecture setup, agent configuration, policy modeling, and Zero Trust enforcement.

Why do organizations need CSW implementation support?

Because CSW requires precise configuration, dependency mapping, and simulation to avoid downtime and ensure accurate segmentation.

How long does CSW implementation typically take?

Timelines vary by environment size, but BTA accelerates adoption using proven methods, automation libraries, and enforcement modeling.

What does CSW implementation include?

Application mapping, workload onboarding, policy creation, simulation testing, enforcement, and Zero Trust alignment.

Does CSW implementation require downtime?

BTA uses simulation and staged deployment to avoid production impact and ensure continuity.

Can CSW implementation support multi-cloud workloads?

Yes. CSW supports on-prem, hybrid, public cloud, and containerized architectures.

What value does BTA add to CSW implementation?

BTA brings field-tested experience, automation tools, architectural guidance, and Zero Trust governance to ensure successful deployment.