Tetration Firewall Enforcement Agents, Data Flow Mapping, & Advanced Policy Deployment (TETADV)

Price
$4,495.00 USD

Duration
5 Days

 

Delivery Methods
Virtual Instructor Led
Private Group

Course Objectives

  • Describe how the Cisco Tetration Firewall Agent works to enforce security policy
  • Describe how to deploy the Cisco Tetration Firewall Agent
  • Describe how to Manage and Troubleshoot Cisco Tetration Firewall Agent policies
  • Review administrative and management tasks necessary to operate, support and manage Tetration
  • Describe how Tetration telemetry data is utilized in the Flows Corpus
  • Construct effective policies based on discovered flows and Application Dependency Mapping (ADM)
    • Top-rated instructors: Our crew of subject matter experts have an average instructor rating of 4.8 out of 5 across thousands of reviews.
    • Authorized content: We maintain more than 35 Authorized Training Partnerships with the top players in tech, ensuring your course materials contain the most relevant and up-to date information.
    • Interactive classroom participation: Our virtual training includes live lectures, demonstrations and virtual labs that allow you to participate in discussions with your instructor and fellow classmates to get real-time feedback.
    • Post Class Resources: Review your class content, catch up on any material you may have missed or perfect your new skills with access to resources after your course is complete.
    • Private Group Training: Let our world-class instructors deliver exclusive training courses just for your employees. Our private group training is designed to promote your team’s shared growth and skill development.
    • Tailored Training Solutions: Our subject matter experts can customize the class to specifically address the unique goals of your team.

    Course Prerequisites

  • Knowledge of cloud and (virtual) data center architecture or cloud basic networking concepts
  • Familiarity with Cisco basic networking security concepts and application security concepts
  • High-level familiarity with basic telemetry protocols and Big Data analytics
  • Agenda

    1 - Cisco Tetration Firewall Agent

    • How the Cisco Tetration Firewall Agent Enforces Firewall Rules
    • Deploying and Managing Linux Enforcement Agents
    • Deploying and Managing Windows Enforcement Agents
    • Deploying and Managing AIX Enforcement Agents

    2 - Tetration Enforcement Agent Components, Messaging, and Interaction

    • Enforcement Front End
    • Firewall and Catch-all Rules
    • The Preserve Rules Option
    • Agent Config Intents
    • Stateful Enforcement

    3 - Tetration Enforcement Agent UI Configurations and Troubleshooting

    • Agent UI Configuration
    • Monitoring Agents
    • Platform Specific Enforcement Features and Requirements
    • Known Limitations
    • Troubleshooting Inbound and Outbound Firewall Rules

    4 - Tetration Secure Connector, Edge and Ingest Appliances

    • Tetration Secure Connector Overview
    • Tetration Secure Connector features and configuration
    • Tetration Edge Appliance Overview
    • Tetration Edge Appliance configuration
    • Tetration Ingest Appliance Overview
    • Tetration Ingest appliance features and configurations

    5 - Application Dependency Mapping

    • Application Management Workflow Cycle
    • Tetration Application Insight
    • ADM Process
    • ADM Run Results
    • Cluster Confidence

    6 - Tetration Policy Analysis

    • Enable Policy Analysis
    • Live Policy Analysis
    • Backdated Policy Experiments
    • Quick Policy Analysis
    • Diagnosis Using Policy Analysis

    7 - Cisco Tetration Analytics Policy Enforcement Overview

    • Policy Global Ordering & Conflict Resolution
    • Scope Priorities
    • Troubleshooting Policy Enforcement

    8 - Cisco Tetration Flow Search

    • Understanding the Flow Corpus
    • Using Scopes to Filter Results
    • Searching with Conjunctions
    • Correlating Flow Data with Hosts and Processes
    • Leveraging Annotations

    9 - Using Tetration Forensics

    • Forensic Signals
    • Configuring Forensics
    • Forensics Visualization and Alerts
    • ForensicsScoring
    • Network and Process Hash Anomaly Detection

    10 - Tetration Apps and API

    • App Store
    • User Apps
    • Visualize Data Sources
    • Bring your own Data
    • OpenAPI
     

    Get in touch to schedule training for your team
    We can enroll multiple students in an upcoming class or schedule a dedicated private training event designed to meet your organization’s needs.

     



    Do You Have Additional Questions? Please Contact Us Below.

    contact us contact us 
    Contact Us about Starting Your Business Training Strategy with New Horizons