Securing the Web with Cisco Web Security Appliance
Course CI-SWSA
Course CI-SWSA
This training shows you how to implement, use, and maintain the Cisco® Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you'll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement usage control settings and policies, use the solution's anti-malware features, implement data security and data loss prevention, perform management of the Cisco WSA solution, and more.
Describing Cisco WSA |
- Technology Use Case |
- Cisco WSA Solution |
- Cisco WSA Features |
- Cisco WSA Architecture |
- Proxy Service |
- Integrated Layer 4 Traffic Monitor |
- Data Loss Prevention |
- Cisco Cognitive Intelligence |
- Management Tools |
- Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration |
- Cisco Content Security Management Appliance (SMA) |
Deploying Proxy Services |
- Explicit Forward Mode vs. Transparent Mode |
- Transparent Mode Traffic Redirection |
- Web Cache Control Protocol |
- Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow |
- Proxy Bypass |
- Proxy Caching |
- Proxy Auto-Config (PAC) Files |
- FTP Proxy |
- Socket Secure (SOCKS) Proxy |
- Proxy Access Log and HTTP Headers |
- Customizing Error Notifications with End User Notification (EUN) Pages |
Utilising Authentication |
- Authentication Protocols |
- Authentication Realms |
- Tracking User Credentials |
- Explicit (Forward) and Transparent Proxy Mode |
- Bypassing Authentication with Problematic Agents |
- Reporting and Authentication |
- Re-Authentication |
- FTP Proxy Authentication |
- Troubleshooting Joining Domains and Test Authentication |
- Integration with Cisco Identity Services Engine (ISE) |
Creating Decryption Policies to Control HTTPS Traffic |
- Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview |
- Certificate Overview |
- Overview of HTTPS Decryption Policies |
- Activating HTTPS Proxy Function |
- Access Control List (ACL) Tags for HTTPS Inspection |
- Access Log Examples |
Understanding Differentiated Traffic Access Policies and Identification Profiles |
- Overview of Access Policies |
- Access Policy Groups |
- Overview of Identification Profiles |
- Identification Profiles and Authentication |
- Access Policy and Identification Profiles Processing Order |
- Other Policy Types |
- Access Log Examples |
- ACL Decision Tags and Policy Groups |
- Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications |
Defending Against Malware |
- Web Reputation Filters |
- Anti-Malware Scanning |
- Scanning Outbound Traffic |
- Anti-Malware and Reputation in Policies |
- File Reputation Filtering and File Analysis |
- Cisco Advanced Malware Protection |
- File Reputation and Analysis Features |
- Integration with Cisco Cognitive Intelligence |
Enforcing Acceptable Use Control Settings |
- Controlling Web Usage |
- URL Filtering |
- URL Category Solutions |
- Dynamic Content Analysis Engine |
- Web Application Visibility and Control |
- Enforcing Media Bandwidth Limits |
- Software as a Service (SaaS) Access Control |
- Filtering Adult Content |
Data Security and Data Loss Prevention |
- Data Security |
- Cisco Data Security Solution |
- Data Security Policy Definitions |
- Data Security Logs |
Performing Administration and Troubleshooting |
- Monitor the Cisco Web Security Appliance |
- Cisco WSA Reports |
- Monitoring System Activity Through Logs |
- System Administration Tasks |
- Troubleshooting |
- Command Line Interface |
References |
- Comparing Cisco WSA Models |
- Comparing Cisco SMA Models |
- Overview of Connect, Install, and Configure |
- Deploying the Cisco Web Security Appliance Open Virtualization Format (OVF) Template |
- Mapping Cisco Web Security Appliance Virtual Machine (VM) Ports to Correct Networks |
- Connecting to the Cisco Web Security Virtual Appliance |
- Enabling Layer 4 Traffic Monitor (L4TM) |
- Accessing and Running the System Setup Wizard |
- Reconnecting to the Cisco Web Security Appliance |
- High Availability Overview |
- Hardware Redundancy |
- Introducing Common Address Redundancy Protocol (CARP) |
- Configuring Failover Groups for High Availability |
- Feature Comparison Across Traffic Redirection Options |
- Architecture Scenarios When Deploying Cisco AnyConnect® Secure Mobility |
Lab Outline |
- Configure the Cisco Web Security Appliance |
- Deploy Proxy Services |
- Configure Proxy Authentication |
- Configure HTTPS Inspection |
- Create and Enforce a Time/Date-Based Acceptable Use Policy |
- Configure Advanced Malware Protection |
- Configure Referrer Header Exceptions |
- Utilize Third-Party Security Feeds and MS Office 365 External Feed |
- Validate an Intermediate Certificate |
- View Reporting Services and Web Tracking |
- Perform Centralized Cisco AsyncOS Software Upgrade Using Cisco SMA |
Security Architects
- System Designers
- Network Administrators
- Operation Engineers
- Network Managers
- Network or Security Technicians and Security Engineers and Managers
- Cisco integrators and partners
You should have knowledge in these areas:
We conduct this training together with ExpertTeach.
SoftwareONE
IT CAMPUS
Customer Training Solutions