Course Objectives
Upon completing this course, the learner will be able to understand how Cisco Tetration Analytics:
Enables pervasive visibility of traffic across datacenter infrastructure
Uses long term data retention for forensics and analysis
Creates communication and dependencies for all applications within the datacenter
Empowers companies to get to a whitelist policy model
Identifies behavior deviation in real time
Performs forensics operations
Who Should Attend?
- Channel Partners
- Systems Architects
- Network Architects
- Network Engineers
- Systems Engineers
- Administrators
- Top-rated instructors: Our crew of subject matter experts have an average instructor rating of 4.8 out of 5 across thousands of reviews.
- Authorized content: We maintain more than 35 Authorized Training Partnerships with the top players in tech, ensuring your course materials contain the most relevant and up-to date information.
- Interactive classroom participation: Our virtual training includes live lectures, demonstrations and virtual labs that allow you to participate in discussions with your instructor and fellow classmates to get real-time feedback.
- Post Class Resources: Review your class content, catch up on any material you may have missed or perfect your new skills with access to resources after your course is complete.
- Private Group Training: Let our world-class instructors deliver exclusive training courses just for your employees. Our private group training is designed to promote your team’s shared growth and skill development.
- Tailored Training Solutions: Our subject matter experts can customize the class to specifically address the unique goals of your team.
Agenda
1 - Tetration Overview
- Defining and Positioning Cisco Tetration Analytics
- Telemetry
- Platform
- Intent-Based Policy
- Machine Learning
- Network Performance Monitoring and other Use Cases
2 - Tetration Components
- Architecture
- Data Collection
- Sensors and Agents
- Flow Collectors
- Analytics Engine
- Open Access
3 - Operational Concepts
- Scopes
- Tenants
- RBAC
- Annotations
4 - Tetration Setup and Deployment Models
- On Premise Options
- SaaS
- Tetration-V
- Installation Procedure
- Creating Scopes, Roles, and Users
- Deploy Hardware Sensors
- Deploy NetFlow Sensors
- Deploy ERSPAN Sensors
5 - Software Agents
- Software Agents Overview
- Software Agents Features
- Software Agents Configuration
6 - Application Dependency Mapping
- Why ADM?
- Tetration Application Insight
- ADM Process
- ADM Run Results
7 - Cisco Tetration Analytics Policy Enforcement Overview
8 - Cisco Tetration Flow Search
- Results Filtered by Scope
- Searching with Conjunctions
- Flow Explore Integrated
- User Annotations
9 - Tetration Policy Analysis
- Enable Policy Analysis
- Live Policy Analysis
- Backdated Policy Experiments
- Quick Policy Analysis
10 - Tetration Apps and API
- App Store
- User Apps
- Visualize Data Sources
- Bring your own Data
- OpenAPI
11 - Tetration Ecosystem
- Platform Integrations
- ADCs
- FW Management Tools
- Phantom
- InfoBlox
- ServiceNow
- Splunk
- Turbonomic
- Veeam
- Corvil and Extra Hop
12 - Lab Outline:
- Lab 1: Exploring the GUI
- Lab 2: Software Agent Installation
- Lab 3: Application Dependency Mapping with Agents
- Lab 4: Enforcement
- Lab 5: Flow Search
- Lab 6: Advanced ADM Run
- Lab 7: Policy Analysis