Securing the Web with Cisco Web Security Appliance

Course CI-SWSA

  • Duration:
    • 2 days

Dates:

  • Implementation guarantee - still places available
  • Implementation - probability high - still places available
  • There are no more seats available. For many courses, it may still be possible to participate online, via virtual classroom.
  • Course times: As a rule, our seminars are held from 10:00 am to 5:00 pm on day 1 and from 9:00 am to 4:00 pm on the following days. Changes are possible. The concrete seminar times you will find in the binding order confirmation.
  • Dates with this symbol are bookable both on-site and in the Virtual Classroom.
30.09.2024 - 01.10.2024 Frankfurt, Virtual Classroom
  • 1995 EUR / Person
German

This training shows you how to implement, use, and maintain the Cisco® Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you'll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement usage control settings and policies, use the solution's anti-malware features, implement data security and data loss prevention, perform management of the Cisco WSA solution, and more.

  • Describing Cisco WSA
  • Deploying Proxy Services
  • Utilizing Authentication
  • Creating Decryption Policies to Control HTTPS Traffic
  • Understanding Differentiated Traffic Access Policies and Identification Profiles
  • Defending Against Malware
  • Enforcing Acceptable Use Control Settings
  • Data Security and Data Loss Prevention
  • Performing Administration and Troubleshooting
  • References
    Describing Cisco WSA
    - Technology Use Case
    - Cisco WSA Solution
    - Cisco WSA Features
    - Cisco WSA Architecture
    - Proxy Service
    - Integrated Layer 4 Traffic Monitor
    - Data Loss Prevention
    - Cisco Cognitive Intelligence
    - Management Tools
    - Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration
    - Cisco Content Security Management Appliance (SMA)
    Deploying Proxy Services
    - Explicit Forward Mode vs. Transparent Mode
    - Transparent Mode Traffic Redirection
    - Web Cache Control Protocol
    - Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow
    - Proxy Bypass
    - Proxy Caching
    - Proxy Auto-Config (PAC) Files
    - FTP Proxy
    - Socket Secure (SOCKS) Proxy
    - Proxy Access Log and HTTP Headers
    - Customizing Error Notifications with End User Notification (EUN) Pages
    Utilising Authentication
    - Authentication Protocols
    - Authentication Realms
    - Tracking User Credentials
    - Explicit (Forward) and Transparent Proxy Mode
    - Bypassing Authentication with Problematic Agents
    - Reporting and Authentication
    - Re-Authentication
    - FTP Proxy Authentication
    - Troubleshooting Joining Domains and Test Authentication
    - Integration with Cisco Identity Services Engine (ISE)
    Creating Decryption Policies to Control HTTPS Traffic
    - Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview
    - Certificate Overview
    - Overview of HTTPS Decryption Policies
    - Activating HTTPS Proxy Function
    - Access Control List (ACL) Tags for HTTPS Inspection
    - Access Log Examples
    Understanding Differentiated Traffic Access Policies and Identification Profiles
    - Overview of Access Policies
    - Access Policy Groups
    - Overview of Identification Profiles
    - Identification Profiles and Authentication
    - Access Policy and Identification Profiles Processing Order
    - Other Policy Types
    - Access Log Examples
    - ACL Decision Tags and Policy Groups
    - Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications
    Defending Against Malware
    - Web Reputation Filters
    - Anti-Malware Scanning
    - Scanning Outbound Traffic
    - Anti-Malware and Reputation in Policies
    - File Reputation Filtering and File Analysis
    - Cisco Advanced Malware Protection
    - File Reputation and Analysis Features
    - Integration with Cisco Cognitive Intelligence
    Enforcing Acceptable Use Control Settings
    - Controlling Web Usage
    - URL Filtering
    - URL Category Solutions
    - Dynamic Content Analysis Engine
    - Web Application Visibility and Control
    - Enforcing Media Bandwidth Limits
    - Software as a Service (SaaS) Access Control
    - Filtering Adult Content
    Data Security and Data Loss Prevention
    - Data Security
    - Cisco Data Security Solution
    - Data Security Policy Definitions
    - Data Security Logs
    Performing Administration and Troubleshooting
    - Monitor the Cisco Web Security Appliance
    - Cisco WSA Reports
    - Monitoring System Activity Through Logs
    - System Administration Tasks
    - Troubleshooting
    - Command Line Interface
    References
    - Comparing Cisco WSA Models
    - Comparing Cisco SMA Models
    - Overview of Connect, Install, and Configure
    - Deploying the Cisco Web Security Appliance Open Virtualization Format (OVF) Template
    - Mapping Cisco Web Security Appliance Virtual Machine (VM) Ports to Correct Networks
    - Connecting to the Cisco Web Security Virtual Appliance
    - Enabling Layer 4 Traffic Monitor (L4TM)
    - Accessing and Running the System Setup Wizard
    - Reconnecting to the Cisco Web Security Appliance
    - High Availability Overview
    - Hardware Redundancy
    - Introducing Common Address Redundancy Protocol (CARP)
    - Configuring Failover Groups for High Availability
    - Feature Comparison Across Traffic Redirection Options
    - Architecture Scenarios When Deploying Cisco AnyConnect® Secure Mobility
    Lab Outline
    - Configure the Cisco Web Security Appliance
    - Deploy Proxy Services
    - Configure Proxy Authentication
    - Configure HTTPS Inspection
    - Create and Enforce a Time/Date-Based Acceptable Use Policy
    - Configure Advanced Malware Protection
    - Configure Referrer Header Exceptions
    - Utilize Third-Party Security Feeds and MS Office 365 External Feed
    - Validate an Intermediate Certificate
    - View Reporting Services and Web Tracking
    - Perform Centralized Cisco AsyncOS Software Upgrade Using Cisco SMA

Security Architects
- System Designers
- Network Administrators
- Operation Engineers
- Network Managers
- Network or Security Technicians and Security Engineers and Managers
- Cisco integrators and partners

You should have knowledge in these areas:

  • TCP/IP services, including Domain Name System (DNS), Secure Shell (SSH), FTP, Simple Network Management Protocol (SNMP), HTTP and HTTPS.
  • IP routing

    One or more of the following basic technical competencies or equivalent should be present:
  • Cisco certification (CCENT certification or higher)
  • Relevant industry certification [International Information System Security Certification Consortium ((ISC)2), Computing Technology Industry Association (CompTIA) Security+, International Council of Electronic Commerce Consultants (EC-Council), Global Information Assurance Certification (GIAC), ISACA].
  • Completion of the Cisco Networking Academy (CCNA® 1 and CCNA 2)
  • Windows expertise: Microsoft [Microsoft Specialist, Microsoft Certified Solutions Associate (MCSA), Microsoft Certified Solutions Expert (MCSE)], CompTIA (A+, Network+, Server+)

We conduct this training together with ExpertTeach.

Contact us

SoftwareONE

IT CAMPUS
Customer Training Solutions

Blochstraße 1
D-04329 Leipzig
*The services of SoftwareONE Deutschland GmbH directly serving school and educational purposes are predominantly VAT-exempt according to § 4 No. 21 a) bb) UStG. Contact us - we are happy to help!