0% found this document useful (0 votes)
45 views4 pages

Cisco SWSA Course Overview

The Securing the Web with Cisco Web Security Appliance (SWSA) course teaches participants how to implement, use, and maintain Cisco Web Security Appliance (WSA) for advanced web security. Targeted at security architects, network administrators, and engineers, the course covers deploying proxy services, managing policies, and protecting against malware. Participants will gain hands-on skills and knowledge necessary for securing web gateways and controlling web traffic effectively.

Uploaded by

dr8341549
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views4 pages

Cisco SWSA Course Overview

The Securing the Web with Cisco Web Security Appliance (SWSA) course teaches participants how to implement, use, and maintain Cisco Web Security Appliance (WSA) for advanced web security. Targeted at security architects, network administrators, and engineers, the course covers deploying proxy services, managing policies, and protecting against malware. Participants will gain hands-on skills and knowledge necessary for securing web gateways and controlling web traffic effectively.

Uploaded by

dr8341549
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Securing the Web with Cisco Web Security Appliance (SWSA)

ID CI-SWSA Duración 2 días

Quién debería asistir (SWSA) v3.0 course shows you how to implement, use, and
maintain Cisco® Web Security Appliance (WSA), powered by
Security architects Cisco Talos, to provide advanced protection for business email
System designers
and control against web security threats. Through a
Network administrators
Operations engineers combination of expert instruction and hands-on practice, you’ll
Network managers, network or security technicians, learn how to deploy proxy services, use authentication,
and security engineers and managers responsible for implement policies to control HTTPS traffic and access,
web security implement use control settings and policies, use the solution’s
Cisco integrators and partners anti-malware features, implement data security and data loss
prevention, perform administration of Cisco WSA solution, and
Este curso es parte de las siguientes Certificaciones more.

Cisco Certified Network Professional Security (CCNP This class will help you:
SECURITY)
Implement Cisco WSA to secure web gateways,
Prerrequisitos
provide malware protection, and use policy controls to
address the challenges of securing and controlling web
To fully benefit from this course, you should have knowledge of traffic
these topics: Gain valuable hands-on skills for high-demand
responsibilities focused on web security
TCP/IP services, including Domain Name System
(DNS), Secure Shell (SSH), FTP, Simple Network After taking this course, you should be able to:
Management Protocol (SNMP), HTTP, and HTTPS
IP routing Describe Cisco WSA
Deploy proxy services
You are expected to have one or more of the following basic Utilize authentication
technical competencies or equivalent knowledge: Describe decryption policies to control HTTPS traffic
Understand differentiated traffic access policies and
Cisco certification (CCENT certification or higher) identification profiles
Relevant industry certification [International Information Enforce acceptable use control settings
System Security Certification Consortium (ISC2), Defend against malware
Computing Technology Industry Association (CompTIA) Describe data security and data loss prevention
Security+, International Council of Electronic Perform administration and troubleshooting
Commerce Consultants (EC-Council), Global
Information Assurance Certification (GIAC), ISACA]
Cisco Networking Academy letter of completion (CCNA Contenido del curso
1 and CCNA 2)
Windows expertise: Microsoft [Microsoft Specialist, Describing Cisco WSA
Microsoft Certified Solutions Associate (MCSA), Deploying Proxy Services
Microsoft Certified Solutions Expert (MCSE)], CompTIA Utilizing Authentication
(A+, Network+, Server+) Creating Decryption Policies to Control HTTPS Traffic
Understanding Differentiated Traffic Access Policies
and Identification Profiles
Objetivos del curso Defending Against Malware
Enforcing Acceptable Use Control Settings
Data Security and Data Loss Prevention
The Securing the Web with Cisco Web Security Appliance
Performing Administration and Troubleshooting

Página 1/4
Securing the Web with Cisco Web Security Appliance (SWSA)

References Access Control List (ACL) Tags for HTTPS Inspection


Access Log Examples

Esquema Detallado del Curso Understanding Differentiated Traffic Access Policies and
Identification Profiles
Describing Cisco WSA
Overview of Access Policies
Technology Use Case Access Policy Groups
Cisco WSA Solution Overview of Identification Profiles
Cisco WSA Features Identification Profiles and Authentication
Cisco WSA Architecture Access Policy and Identification Profiles Processing
Proxy Service Order
Integrated Layer 4 Traffic Monitor Other Policy Types
Data Loss Prevention Access Log Examples
Cisco Cognitive Intelligence ACL Decision Tags and Policy Groups
Management Tools Enforcing Time-Based and Traffic Volume Acceptable
Cisco Advanced Web Security Reporting (AWSR) and Use Policies, and End User Notifications
Third-Party Integration
Cisco Content Security Management Appliance (SMA)
Defending Against Malware

Deploying Proxy Services Web Reputation Filters


Anti-Malware Scanning
Explicit Forward Mode vs. Transparent Mode Scanning Outbound Traffic
Transparent Mode Traffic Redirection Anti-Malware and Reputation in Policies
Web Cache Control Protocol File Reputation Filtering and File Analysis
Web Cache Communication Protocol (WCCP) Cisco Advanced Malware Protection
Upstream and Downstream Flow File Reputation and Analysis Features
Proxy Bypass Integration with Cisco Cognitive Intelligence
Proxy Caching
Proxy Auto-Config (PAC) Files
Enforcing Acceptable Use Control Settings
FTP Proxy
Socket Secure (SOCKS) Proxy Controlling Web Usage
Proxy Access Log and HTTP Headers URL Filtering
Customizing Error Notifications with End User URL Category Solutions
Notification (EUN) Pages Dynamic Content Analysis Engine
Web Application Visibility and Control
Utilizing Authentication Enforcing Media Bandwidth Limits
Software as a Service (SaaS) Access Control
Authentication Protocols Filtering Adult Content
Authentication Realms
Tracking User Credentials
Data Security and Data Loss Prevention
Explicit (Forward) and Transparent Proxy Mode
Bypassing Authentication with Problematic Agents Data Security
Reporting and Authentication Cisco Data Security Solution
Re-Authentication Data Security Policy Definitions
FTP Proxy Authentication Data Security Logs
Troubleshooting Joining Domains and Test
Authentication
Performing Administration and Troubleshooting
Integration with Cisco Identity Services Engine (ISE)
Monitor the Cisco Web Security Appliance
Creating Decryption Policies to Control HTTPS Traffic Cisco WSA Reports
Monitoring System Activity Through Logs
Transport Layer Security (TLS)/Secure Sockets Layer System Administration Tasks
(SSL) Inspection Overview Troubleshooting
Certificate Overview Command Line Interface
Overview of HTTPS Decryption Policies
Activating HTTPS Proxy Function

Página 2/4
Securing the Web with Cisco Web Security Appliance (SWSA)

References

Comparing Cisco WSA Models


Comparing Cisco SMA Models
Overview of Connect, Install, and Configure
Deploying the Cisco Web Security Appliance Open
Virtualization Format (OVF) Template
Mapping Cisco Web Security Appliance Virtual Machine
(VM) Ports to Correct Networks
Connecting to the Cisco Web Security Virtual Appliance
Enabling Layer 4 Traffic Monitor (L4TM)
Accessing and Running the System Setup Wizard
Reconnecting to the Cisco Web Security Appliance
High Availability Overview
Hardware Redundancy
Introducing Common Address Redundancy Protocol
(CARP)
Configuring Failover Groups for High Availability
Feature Comparison Across Traffic Redirection Options
Architecture Scenarios When Deploying Cisco
AnyConnect® Secure Mobility

Lab outline

Configure the Cisco Web Security Appliance


Deploy Proxy Services
Configure Proxy Authentication
Configure HTTPS Inspection
Create and Enforce a Time/Date-Based Acceptable
Use Policy
Configure Advanced Malware Protection
Configure Referrer Header Exceptions
Utilize Third-Party Security Feeds and MS Office 365
External Feed
Validate an Intermediate Certificate
View Reporting Services and Web Tracking
Perform Centralized Cisco AsyncOS Software Upgrade
Using Cisco SMA

Página 3/4
Securing the Web with Cisco Web Security Appliance (SWSA)

Centros de Entrenamiento Mundial

Página 4/4

Powered by TCPDF ([Link])

You might also like