Cisco Stealthwatch for System Administrators (SSA)
Improve your security defenses, add actionable security intelligence, and increase your network visibility with Cisco Stealthwatch training courses.
This course focuses on a step-by-step framework for completing initial configuration tasks and getting Cisco Stealthwatch System up and running in the network. You will experience lab-intensive activities that focus on critical initial configuration steps that allow the Cisco Stealthwatch System to monitor flows and network behavior, and provide you with data you can use to determine next steps such as what policies (tuning) are necessary to put in place to manage the amount of data presented.
Duration: 2 Days
Price: $3,000
Objectives:
After taking this course, you should be able to:
- Validate network configuration of Cisco Stealthwatch appliances
- Set base SMC configuration values
- Use SMC documents and reports, to determine if exporters are properly setup
- Use SMC documents and reports, to determine IP addresses that belong to your organization
- Properly place hosts into appropriate host groups
- Define services and applications
- Organize network devices into the BY Function host group
- Define basic concepts of policy management and apply policy to host groups
- Add Cisco Stealthwatch users with specific roles
- Create custom documents
- Establish response management rules, triggers and actions
- And much more
Prerequisites include:
All students should have completed the following (minimum) prerequisites:
- Flow Basics
- Cisco Stealthwatch Overview and Components
- Cisco Stealthwatch SMC Web App Interface Overview
- Cisco Stealthwatch SMC Client Interface Overview
Who Should Attend:
- Customers whose role is to complete the initial configuration of the Cisco Stealthwatch System into their network
- Channel partners responsible for completing the initial configuration of the Cisco Stealthwatch System into a customer network
- Employees responsible for completing the initial configuration of the Cisco Stealthwatch System into a customer network
Outline:
Day One
- Welcome
- Why Stealthwatch?
- The Many User Inter”Faces” of Stealthwatch
- Stealthwatch Appliance Validation
- Demo: Stealthwatch Appliance Validation
- Lab: Validate/Change Appliance Configuration
- Management Console: Basic Setup
- Lab: SMC Basic Setup
- Lunch
- Demo: Host Groups
- Lab: Host Groups
- Demo: Classify Services and Applications
- Lab: Classify Services and Applications
- Demo: Classify Network Scanners
- Lab: Network Devices and the By Function Host Group
- Demo: Policy Management
- Lab: Policy Management
- Hosts and Host Groups
- Classify Services and Applications
- Network Devices and the By Function Host Group
- Policy Management
Day Two
- Day One Review
- User and Role Management
- Demo: User and Role Management
- Lab: User and Role Management
- Custom Documents
- Demo: Custom Document
- Lab: Custom Documents
- Demo: Response Management
- Lab: Response Management
- Response Management
- Lunch
- Review the Web Application: What’s New?
- Wrap Up