SHI CSWOPS Workload Firewall Operations and Administration Course User Guide

June 15, 2024
SHI

SHI CSWOPS Workload Firewall Operations and Administration Course User Guide

SHI CSWOPS Workload Firewall Operations and Administration Course User
Guide

About this course

In this two-day course, Introduction to Cisco Secure Workload Firewall Operations and Administration, (CSWOPS) will familiarize you and help you understand how the Cisco Secure workload firewall platform enables efficient data center operations by providing pervasive visibility, Behavior-based application insight and migration to a zero-trust model.

Audience profile

The primary audience for this course is as follows:

  • Channel Partners
  • Systems Architects
  • Network Architects
  • Network Engineers
  • Systems Engineers
  • Administrators

At course completion

After completing this course, students will be able to:

  • Enables pervasive visibility of traffic across data center infrastructure
  • Uses long term data retention for forensics and analysis
  • Creates communication and dependencies for all applications within the data center
  • Empowers companies to get to a whitelist policy model
  • Identifies Behavior deviation in real time
  • Performs forensics operations

Course Outline

Module 1: Cisco Secure Workload Firewall Overview

  • Defining and Positioning Secure Workload Firewall Analytics
  • Telemetry
  • Platform
  • Intent-Based Policy
  • Machine Learning
  • Network Performance Monitoring and other Use Cases

Module 2: Cisco Secure Workload Firewall Components

  • Architecture
  • Data Collection
  • Sensors and Agents
  • Flow Collectors
  • Analytics Engine
  • Open Access

Module 3: Operational Concepts

  • Scopes
  • Tenants
  • RBAC
  • Annotations

Module 4: Cisco Secure Workload Firewall Setup and Deployment Models

  • On Premise Options
  • SaaS
  • Tetration-V
  • Installation Procedure
  • Creating Scopes, Roles, and Users
  • Deploy Hardware Sensors
  • Deploy NetFlow Sensors
  • Deploy ERSPAN Sensors

Module 5: Software Agents

  • Software Agents Overview
  • Software Agents Features
  • Software Agents Configuration

Module 6: Application Dependency Mapping

  • Why ADM?
  • Cisco Secure Workload Firewall Application Insight
  • ADM Process
  • ADM Run Results

Module 7: Cisco Secure Workload Firewall Analytics Policy Enforcement Overview
Module 8: Cisco Secure Workload Firewall Flow Search

  • Results Filtered by Scope
  • Searching with Conjunctions
  • Flow Explore Integrated
  • User Annotations

Module 9: Cisco Secure Workload Firewall Policy Analysis

  • Enable Policy Analysis
  • Live Policy Analysis
  •  Backdated Policy Experiments
  • Quick Policy Analysis

Module 10: Cisco Secure Workload Firewall Apps and API

  • App Store
  • User Apps
  • Visualize Data Sources
  • Bring your own Data
  •  Open API

Module 11: Cisco Secure Workload Firewall Ecosystem

  • Platform Integrations
    • ADCs
    • FW Management Tools
    • Phantom
    • Info Blox
    • ServiceNow
    • Splunk
    • Turbonomic
    • Veeam
  • Corvil and Extra Hop

Lab Outline

Labs are designed to assure learners a whole practical experience, through the following practical activities:

  • Lab 1: Exploring the GUI
  • Lab 2: Software Agent Installation
  • Lab 3: Application Dependency Mapping with Agents
  • Lab 4: Enforcement
  • Lab 5: Flow Search
  •  Lab 6: Advanced ADM Run
  • Lab 7: Policy Analysis

Read User Manual Online (PDF format)

Read User Manual Online (PDF format)  >>

Download This Manual (PDF format)

Download this manual  >>

SHI User Manuals

Related Manuals