Enroll TODAY!

Securing the Web with Cisco Web Security Appliance (SWSA v3.0)

Price
$995.00 USD

Duration
2 Days | Mon – Fri, Daytime
4 Days | Mon – Thur, Evenings

Cisco Learning Credit (CLC) Eligible

Delivery Methods
Virtual Instructor Led
Private Group

Excellence

At DSDT, we recognize that every professional arriving at our program possesses unique aspirations that demand nothing less than excellent training. Our CAREER SKILLS+â„¢ program is designed to not only meet but exceed your educational expectations, ensuring a robust path to career advancement.

Empowerment

Gain practical empowerment with hands-on training in the latest industry best practices, guided by seasoned experts. Our courses are structured to integrate seamlessly into your existing professional schedule, providing flexible yet comprehensive learning experiences.

Certification

Upon the successful completion of your coursework and real-world projects, DSDT will award you with a professional certificate, affirming your new skills and preparing you for further professional achievements.

Support

We provide round-the-clock support to all our participants, ensuring that every question is answered and every opportunity for excellence is seized. Our team is dedicated to your success in the program and beyond, helping you achieve outstanding results in your certification exams.

Securing the Web with Cisco Web Security Appliance (SWSA v3.0)

The Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement, use, and maintain Cisco® Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you’ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution’s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more.

 Course Objectives

Describe Cisco WSA
Deploy proxy services
Utilize authentication
Describe decryption policies to control HTTPS traffic
Understand differentiated traffic access policies and identification profiles
Enforce acceptable use control settings
Defend against malware
Describe data security and data loss prevention
Perform administration and troubleshooting

Who Should Attend?

Security architects
System designers
Network administrators
Operations engineers
Network managers, network or security technicians, and security engineers and managers responsible for web security
Cisco integrators and partners

Course Prerequisites

To fully benefit from this course, you should have the following knowledge and skills:

TCP/IP services, including Domain Name System (DNS), Secure Shell (SSH), FTP, Simple Network Management Protocol (SNMP), HTTP, and HTTPS
IP routing
Cisco certification (CCENT certification or higher)
Relevant industry certification [International Information System Security Certification Consortium ((ISC)2), Computing Technology Industry Association (CompTIA) Security+, International Council of Electronic Commerce Consultants (EC-Council), Global Information Assurance Certification (GIAC), ISACA]
Cisco Networking Academy letter of completion (CCNA® 1 and CCNA 2)
Windows expertise: Microsoft [Microsoft Specialist, Microsoft Certified Solutions Associate (MCSA), Microsoft Certified Solutions Expert (MCSE)], CompTIA (A+, Network+, Server+)

Enterprise and individual training is available for this program. 

Key Features

Intensive Bootcamp

Our 5 or 10 day bootcamp offers rigorous, instructor-led training that can be attended online via Microsoft Teams or in person in various cities. These sessions are designed to fit seamlessly into your professional life, ensuring you receive comprehensive preparation without compromising your daily responsibilities.

Certification Preparedness

Complete this 5 or 10 day intensive program in preparation to test for the Securing the Web with Cisco Web Security Appliance (SWSA v3.0) certification. Each participant will also receive a completion certificate, affirming your enhanced skills and knowledgeable experience.

Interactive Classroom Engagement

Our virtual training includes live lectures, demonstrations and virtual labs that allow you to participate in discussions with your instructor and fellow classmates to get real-time feedback.

Flexible Learning Options

This 5 or 10 day program is available both in-person and via live online formats, offering flexible scheduling options to accommodate your busy calendar. Whether it's during the weekday or the weekend, we make it easy for you to engage and learn.

Expert Instructors

DSDT prides itself on partnering with certified subject matter experts who not only bring over 10 years of real-world experience to the table but also create dynamic, interactive learning environments. Our instructors are dedicated to your success and professional growth.

Continued Learning Resources:

Upon completion of the course, students gain access to extensive post-class materials. This support system is designed to help learners review concepts, catch up on missed sessions, or refine their skills, ensuring continuous professional development and mastery of new competencies.

Exclusive Corporate Training

DSDT offers bespoke group training sessions tailored to the specific needs of your organization. Conducted by our top-tier instructors, these private courses are aimed at fostering collective advancement and skill enhancement within your team, leveraging our strong connections to local industries and cutting-edge digital technology practices.

Guaranteed Course Availability

All scheduled sessions of our program are guaranteed to run as planned, whether in a classroom, live virtual, or in-house setting. We ensure that you can rely on us for your educational needs without disruption.

Customized Training Solutions

Reflecting DSDT’s commitment to addressing specific industry demands, our subject matter experts develop customized training programs that focus on the particular objectives of your team. This approach not only enhances targeted skill development but also integrates practical, real-world applications essential for success in today’s digital landscape.

Agenda

1 – Describing Cisco WSA
Technology Use Case
Cisco WSA Solution
Cisco WSA Features
Cisco WSA Architecture
Proxy Service
Integrated Layer 4 Traffic Monitor
Data Loss Prevention
Cisco Cognitive Intelligence
Management Tools
Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration
Cisco Content Security Management Appliance (SMA)
2 – Deploying Proxy Services
Explicit Forward Mode vs. Transparent Mode
Transparent Mode Traffic Redirection
Web Cache Control Protocol
Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow
Proxy Bypass
Proxy Caching
Proxy Auto-Config (PAC) Files
FTP Proxy
Socket Secure (SOCKS) Proxy
Proxy Access Log and HTTP Headers
Customizing Error Notifications with End User Notification (EUN) Pages
3 – Utilizing Authentication
Authentication Protocols
Authentication Realms
Tracking User Credentials
Explicit (Forward) and Transparent Proxy Mode
Bypassing Authentication with Problematic Agents
Reporting and Authentication
Re-Authentication
FTP Proxy Authentication
Troubleshooting Joining Domains and Test Authentication
Integration with Cisco Identity Services Engine (ISE)
4 – Creating Decryption Policies to Control HTTPS Traffic
Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview
Certificate Overview
Overview of HTTPS Decryption Policies
Activating HTTPS Proxy Function
Access Control List (ACL) Tags for HTTPS Inspection
Access Log Examples
5 – Understanding Differentiated Traffic Access Policies and Identification Profiles
Overview of Access Policies
Access Policy Groups
Overview of Identification Profiles
Identification Profiles and Authentication
Access Policy and Identification Profiles Processing Order
Other Policy Types
Access Log Examples
ACL Decision Tags and Policy Groups
Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications
6 – Defending Against Malware
Web Reputation Filters
Anti-Malware Scanning
Scanning Outbound Traffic
Anti-Malware and Reputation in Policies
File Reputation Filtering and File Analysis
Cisco Advanced Malware Protection
File Reputation and Analysis Features
Integration with Cisco Cognitive Intelligence
7 – Enforcing Acceptable Use Control Settings
Controlling Web Usage
URL Filtering
URL Category Solutions
Dynamic Content Analysis Engine
Web Application Visibility and Control
Enforcing Media Bandwidth Limits
Software as a Service (SaaS) Access Control
Filtering Adult Content
8 – Data Security and Data Loss Prevention
Data Security
Cisco Data Security Solution
Data Security Policy Definitions
Data Security Logs
9 – Performing Administration and Troubleshooting
Monitor the Cisco Web Security Appliance
Cisco WSA Reports
Monitoring System Activity Through Logs
System Administration Tasks
Troubleshooting
Command Line Interface
10 – References
Comparing Cisco WSA Models
Comparing Cisco SMA Models
Overview of Connect, Install, and Configure
Deploying the Cisco Web Security Appliance Open Virtualization Format (OVF) Template
Mapping Cisco Web Security Appliance Virtual Machine (VM) Ports to Correct Networks
Connecting to the Cisco Web Security Virtual Appliance
Enabling Layer 4 Traffic Monitor (L4TM)
Accessing and Running the System Setup Wizard
Reconnecting to the Cisco Web Security Appliance
High Availability Overview
Hardware Redundancy
Introducing Common Address Redundancy Protocol (CARP)
Configuring Failover Groups for High Availability
Feature Comparison Across Traffic Redirection Options
Architecture Scenarios When Deploying Cisco AnyConnect® Secure Mobility
11 – Lab Outline
Configure the Cisco Web Security Appliance
Deploy Proxy Services
Configure Proxy Authentication
Configure HTTPS Inspection
Create and Enforce a Time/Date-Based Acceptable Use Policy
Configure Advanced Malware Protection
Configure Referrer Header Exceptions
Utilize Third-Party Security Feeds and MS Office 365 External Feed
Validate an Intermediate Certificate
View Reporting Services and Web Tracking
Perform Centralized Cisco AsyncOS Software Upgrade Using Cisco SMA

Should you have any questions, we have made it super convenient for you to contact us.

Click this number to call us:

 

888-688-4234

This page is Amazing