Cisco Secure Workload Training



Delivery: Instructor Led Training
Type: Lecture + Hands-On Lab, In-Person Delivery, Live via WebEx
OBJECTIVES
- Describe the components of CSW
- Configure CSW for use in a customer environment
- Install and manage hardware and software agents
- Conduct automated application dependency mapping
- Manage and enforce application policies on a live network
- Describe how to integrate CSW telemetry with operational systems
PREREQUISITES
- Good grasp of networking concepts
- Knowledge of Firewall and Load Balancer Principles
- Fundamental Understanding of Network Protocols
- Familiarity with the Linux command line
WHO BENEFITS FROM THIS TRAINING
- Network Engineers
- Systems Engineers
- Solution Architects
- Systems Integrators
- Application Owners
- Data Center & Cloud Infrastructure Engineers
- Network Engineers
- DevOps Teams Engineers
COURSE OUTLINE
Module 1: Introduction
Module 2: CSW Overview
- Lab 0: Accessing the Lab
- Lab 1: CSW Overview with Security Dashboard
Module 3:
- Architecture Overview
- Data Collection
- Analytics Engine
- Open Access
Module 4: Planning and Development
- Create Scopes, Roles, Users
- Sensor Types and Uses
- Lab 2: Software Agent Installation
Module 5: Application Dependency Mapping
- Overview
- Analysis
- Use Cases
- Lab 3: Segmentation Compliance with Policy
Module 6: Whitelist Policy Enforcement
- Policy Today
- Capturing Intent
- Rules and Enforcement
- Policy Simulation & Compliance
- Lab 4: Segmentation Compliance with Policy
Module 7: Whitelist Policy Analysis
- Overview
- Enable Policy Analysis
- Live Policy Analysis
- Backdated Policy Experiments
- Quick Policy Analysis
- Lab 5: Segmentation Compliance Analysis
Module 8: Network Performance Monitoring and Diagnostics
Module 9: Prevention - Before the Attacks
- Lab 6: Identifying Malware & Vulnerable Hosts
- Lab 7: Minimizing Attack Surfaces
Module 10: Quarantine and Remediation
- Lab 8: Vulnerability Quarantine and Remediation
Module 11: Detection - During the Attacks
- Lab 9: Identifying Data Leaks
- Lab 10: Attack Detection and Quarantine
Module 12: Remediation - After the Attacks
- Lab 11: Security Forensics
Module 13: CSW Platform Monitoring
Module 14: Alerts & External Integrations
- CSW Overview
- User Apps
Module 15: CSW Implementation Review
FAQs
It is the guided deployment of Cisco Secure Workload, including architecture setup, agent configuration, policy modeling, and Zero Trust enforcement.
Because CSW requires precise configuration, dependency mapping, and simulation to avoid downtime and ensure accurate segmentation.
Timelines vary by environment size, but BTA accelerates adoption using proven methods, automation libraries, and enforcement modeling.
Application mapping, workload onboarding, policy creation, simulation testing, enforcement, and Zero Trust alignment.
BTA uses simulation and staged deployment to avoid production impact and ensure continuity.
Yes. CSW supports on-prem, hybrid, public cloud, and containerized architectures.
BTA brings field-tested experience, automation tools, architectural guidance, and Zero Trust governance to ensure successful deployment.
.png?width=225&height=90&name=Logos%20BTA%20(500%20x%20200%20px).png)