Securing The Web With Cisco Web Security Appliance (SWSA)

2y ago
38 Views
3 Downloads
554.57 KB
6 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Jacoby Zeller
Transcription

Course overviewSecuring the Web with Cisco Web SecurityAppliance (SWSA) v3.0What you’ll learn in this courseThe Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement,use, and maintain Cisco Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protectionfor business email and control against web security threats. Through a combination of expert instruction andhands-on practice, you’ll learn how to deploy proxy services, use authentication, implement policies to controlHTTPS traffic and access, implement use control settings and policies, use the solution’s anti-malware features,implement data security and data loss prevention, perform administration of Cisco WSA solution, and more.This course helps you prepare to take the exam, Securing the Web with Cisco Web Security Appliance(300-725 SWSA), which leads to CCNP Security and the Cisco Certified Specialist - Web ContentSecurity. This course also earns you 16 Continuing Education (CE) credits towards recertification.Course duration Instructor-led training: 2 days in the classroom with hands-on lab practice Virtual instructor-led training: 2 days of web-based classes with hands-on lab practice E-learning: Equivalent of 2 days of instruction with videos, practice, and challengesHow you’ll benefitThis class will help you: Implement Cisco WSA to secure web gateways, provide malware protection, and use policy controls toaddress the challenges of securing and controlling web traffic Gain valuable hands-on skills focused on web security Earn 16 CE credits toward recertificationWhat to expect in the examThis exam certifies your knowledge of Cisco Web Security Appliance including proxy services, authentication,decryption policies, differentiated traffic access policies and identification policies, acceptable use controlsettings, malware defense, and data security and data loss prevention.After you pass 300-725 SWSA: You earn the Cisco Certified Specialist - Web Content Security certification. You will have satisfied the concentration exam requirement for new the CCNP Security certification.To complete CCNP Security, you also need to pass the Implementing and Operating Cisco SecurityCore Technologies (350-701 SCOR) exam or its equivalent.

Course overviewWho should enroll Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible forweb security Cisco integrators and partnersHow to enrollE-learning To buy a single e-learning license, visit the Cisco Learning Network Store. For more than one license, or a learning library subscription, contact us at learning-bdm@cisco.com.Instructor-led training Find a class at the Cisco Learning Locator.Technology areas SecurityCourse detailsObjectivesAfter taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshootingPrerequisitesTo fully benefit from this course, you should have knowledge of these topics: TCP/IP services, including Domain Name System (DNS), Secure Shell (SSH), FTP, Simple NetworkManagement Protocol (SNMP), HTTP, and HTTPS IP routingPage2 of 6

Course overviewYou are expected to have one or more of the following basic technical competencies or equivalent knowledge: Cisco certification (CCENT certification or higher) Relevant industry certification [International Information System Security Certification Consortium ((ISC)2),Computing Technology Industry Association (CompTIA) Security , International Council of ElectronicCommerce Consultants (EC-Council), Global Information Assurance Certification (GIAC), ISACA] Cisco Networking Academy letter of completion (CCNA 1 and CCNA 2) Windows expertise: Microsoft [Microsoft Specialist, Microsoft Certified Solutions Associate (MCSA),Microsoft Certified Solutions Expert (MCSE)], CompTIA (A , Network , Server )You should have the following skills and knowledge prior to taking this course: Web Security Training resources at https://www.cisco.com/c/m/en ine Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) PagesPage3 of 6

Course overview Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive IntelligencePage4 of 6

Course overview Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface References Comparing Cisco WSA Models Comparing Cisco SMA Models Overview of Connect, Install, and Configure Deploying the Cisco Web Security Appliance Open Virtualization Format (OVF) Template Mapping Cisco Web Security Appliance Virtual Machine (VM) Ports to Correct Networks Connecting to the Cisco Web Security Virtual Appliance Enabling Layer 4 Traffic Monitor (L4TM) Accessing and Running the System Setup Wizard Reconnecting to the Cisco Web Security Appliance High Availability Overview Hardware Redundancy Introducing Common Address Redundancy Protocol (CARP) Configuring Failover Groups for High Availability Feature Comparison Across Traffic Redirection Options Architecture Scenarios When Deploying Cisco AnyConnect Secure MobilityPage5 of 6

Course overviewLab outline Configure the Cisco Web Security Appliance Deploy Proxy Services Configure Proxy Authentication Configure HTTPS Inspection Create and Enforce a Time/Date-Based Acceptable Use Policy Configure Advanced Malware Protection Configure Referrer Header Exceptions Utilize Third-Party Security Feeds and MS Office 365 External Feed Validate an Intermediate Certificate View Reporting Services and Web Tracking Perform Centralized Cisco AsyncOS Software Upgrade Using Cisco SMACourse content is dynamic and subject to change without notice. 2020 Cisco and/or its affiliates. All rights reserved.SWSA 3-0C22-742148-0509/20Page6 of 6

The Securing the Web with Cisco Web . use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution’s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA

Related Documents:

May 02, 2018 · D. Program Evaluation ͟The organization has provided a description of the framework for how each program will be evaluated. The framework should include all the elements below: ͟The evaluation methods are cost-effective for the organization ͟Quantitative and qualitative data is being collected (at Basics tier, data collection must have begun)

Silat is a combative art of self-defense and survival rooted from Matay archipelago. It was traced at thé early of Langkasuka Kingdom (2nd century CE) till thé reign of Melaka (Malaysia) Sultanate era (13th century). Silat has now evolved to become part of social culture and tradition with thé appearance of a fine physical and spiritual .

Dr. Sunita Bharatwal** Dr. Pawan Garga*** Abstract Customer satisfaction is derived from thè functionalities and values, a product or Service can provide. The current study aims to segregate thè dimensions of ordine Service quality and gather insights on its impact on web shopping. The trends of purchases have

On an exceptional basis, Member States may request UNESCO to provide thé candidates with access to thé platform so they can complète thé form by themselves. Thèse requests must be addressed to esd rize unesco. or by 15 A ril 2021 UNESCO will provide thé nomineewith accessto thé platform via their émail address.

̶The leading indicator of employee engagement is based on the quality of the relationship between employee and supervisor Empower your managers! ̶Help them understand the impact on the organization ̶Share important changes, plan options, tasks, and deadlines ̶Provide key messages and talking points ̶Prepare them to answer employee questions

Cisco ASA 5505 Cisco ASA 5505SP Cisco ASA 5510 Cisco ASA 5510SP Cisco ASA 5520 Cisco ASA 5520 VPN Cisco ASA 5540 Cisco ASA 5540 VPN Premium Cisco ASA 5540 VPN Cisco ASA 5550 Cisco ASA 5580-20 Cisco ASA 5580-40 Cisco ASA 5585-X Cisco ASA w/ AIP-SSM Cisco ASA w/ CSC-SSM Cisco C7600 Ser

Supported Devices - Cisco SiSi NetFlow supported Cisco devices Cisco Catalyst 3560 Cisco 800 Cisco 7200 Cisco Catalyst 3750 Cisco 1800 Cisco 7600 Cisco Catalyst 4500 Cisco 1900 Cisco 12000 Cisco Catalyst 6500 Cisco 2800 Cisco ASR se

Cisco Nexus 1000V Cisco Nexus 1010 Cisco Nexus 4000 Cisco MDS 9100 Series Cisco Nexus 5000 Cisco Nexus 2000 Cisco Nexus 6000 Cisco MDS 9250i Multiservice Switch Cisco MDS 9700 Series Cisco Nexus 7000/7700 Cisco Nexus 3500 and 3000 CISCO NX-OS: From Hypervisor to Core CISCO DCNM: Single