300-725 SWSA: Securing the Web with Cisco Web Security Appliance

Level
Advanced
Duration
60 hours
Course Fee
₹15000

The Cisco Web Security Appliance training is targeted to engineers and technical personnel involved in deploying, implementing, operating, and optimizing Web security in enterprise environments. The Cisco SWSA v3.0 course shows you how to implement, use, and maintain Cisco Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats.

Training Type
Classroom Online Corporate
Batch Timings

For the latest training schedule, please check the Schedules.

Weekdays
  • Early Morning
  • Morning
  • Afternoon
  • Evening
  • Fastrack
Weekdays
  • Morning
  • Afternoon
  • Evening
  • Sat / Sun
  • Sunday Only

Training is available in small groups as well as on one-to-one basis. Get in touch.

300-725 SWSA: Securing the Web with Cisco Web Security Appliance

Level
Advanced
Duration
60 hrs.
Course Fee
₹15000

The Cisco Web Security Appliance training is targeted to engineers and technical personnel involved in deploying, implementing, operating, and optimizing Web security in enterprise environments. The Cisco SWSA v3.0 course shows you how to implement, use, and maintain Cisco Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats.

Training Type
Classroom Online Corporate
Batch Timings

For the latest training schedule, please check the Schedules.

Weekdays
  • Early Morning
  • Morning
  • Afternoon
  • Evening
  • Fastrack
Weekdays
  • Morning
  • Afternoon
  • Evening
  • Sat / Sun
  • Sunday Only

Training is available in small groups as well as on one-to-one basis. Get in touch.

Course Introduction

This course certifies your knowledge of Cisco Web Security Appliance including proxy services, authentication, decryption policies, differentiated traffic access policies and identification policies, acceptable use control settings, malware defense, and data security and data loss prevention.

The key to a high success rate is based on the program’s objectives as follows:

  • Course contents are based on Cisco WSA course outlines.
  • Dedicated Monitoring to evaluate and report candidates progress
  • Extensive hands-on lab exercises
  • Industry-acclaimed, experienced and certified instructors
Course Highlights
  • Project manager can be assigned to track candidates’ performance
  • Curriculum based on course outlines defined by Cisco.
  • This Instructor-led classroom course is designed with an aim to build theoretical knowledge supplemented by ample hands-on lab exercises
  • Facility of Lab on cloud available (based on booking)
  • Courseware includes reference material to maximize learning.
  • Assignments and test to ensure concept absorption.
  • Courseware includes reference material to maximize learning.
  • Assignments and test to ensure concept absorption.
  • Repeating of lectures allowed (based on seat availability)
Course Objectives
  • Describe Cisco WSA
  • Deploy proxy services
  • Utilize authentication
  • Describe decryption policies to control HTTPS traffic
  • Understand differentiated traffic access policies and identification profiles
  • Defend against malware
  • Describe data security and data loss prevention
  • Perform administration and troubleshooting
Course Topics

This course is created to impart knowledge and skills related to Cisco WSA.

  • Describing Cisco WSA
    • Technology Use Case
    • Cisco WSA Solution
    • Cisco WSA Features
    • Cisco WSA Architecture
    • Proxy Service
    • Integrated Layer 4 Traffic Monitor
    • Data Loss Prevention
    • Cisco Cognitive Intelligence
    • Management Tools
    • Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration
    • Cisco Content Security Management Appliance (SMA)
  • Deploying Proxy Services
    • Explicit Forward Mode vs. Transparent Mode
    • Transparent Mode Traffic Redirection
    • Web Cache Control Protocol
    • Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow
    • Proxy Bypass
    • Proxy Caching
    • Proxy Auto-Config (PAC) Files
    • FTP Proxy
    • Socket Secure (SOCKS) Proxy
    • Proxy Access Log and HTTP Headers
    • Customizing Error Notifications with End User Notification (EUN) Pages
  • Utilizing Authentication
    • Authentication Protocols
    • Authentication Realms
    • Tracking User Credentials
    • Explicit (Forward) and Transparent Proxy Mode
    • Bypassing Authentication with Problematic Agents
    • Reporting and Authentication
    • Re-Authentication
    • FTP Proxy Authentication
    • Troubleshooting Joining Domains and Test Authentication
    • Integration with Cisco Identity Services Engine (ISE)
  • Creating Decryption Policies to Control HTTPS Traffic
    • Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview
    • Certificate Overview
    • Overview of HTTPS Decryption Policies
    • Activating HTTPS Proxy Function
    • Access Control List (ACL) Tags for HTTPS Inspection
    • Access Log Examples
  • Understanding Differentiated Traffic Access Policies and Identification Profiles
    • Overview of Access Policies
    • Access Policy Groups
    • Overview of Identification Profiles
    • Identification Profiles and Authentication
    • Access Policy and Identification Profiles Processing Order
    • Other Policy Types
    • Access Log Examples
    • ACL Decision Tags and Policy Groups
    • Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications
  • Defending Against Malware
    • Web Reputation Filters
    • Anti-Malware Scanning
    • Scanning Outbound Traffic
    • Anti-Malware and Reputation in Policies
    • File Reputation Filtering and File Analysis
    • Cisco Advanced Malware Protection
    • File Reputation and Analysis Features
    • Integration with Cisco Cognitive Intelligence
  • Enforcing Acceptable Use Control Settings
    • Controlling Web Usage
    • URL Filtering
    • URL Category Solutions
    • Dynamic Content Analysis Engine
    • Web Application Visibility and Control
    • Enforcing Media Bandwidth Limits
    • Software as a Service (SaaS) Access Control
    • Filtering Adult Content
  • Data Security and Data Loss Prevention
    • Data Security
    • Cisco Data Security Solution
    • Data Security Policy Definitions
    • Data Security Logs
  • Performing Administration and Troubleshooting
    • Monitor the Cisco Web Security Appliance
    • Cisco WSA Reports
    • Monitoring System Activity Through Logs
    • System Administration Tasks
    • Troubleshooting
    • Command Line Interface
  • References
    • Comparing Cisco WSA Models
    • Comparing Cisco SMA Models
    • Overview of Connect, Install, and Configure
    • Deploying the Cisco Web Security Appliance Open Virtualization Format (OVF) Template
    • Mapping Cisco Web Security Appliance Virtual Machine (VM) Ports to Correct Networks
    • Connecting to the Cisco Web Security Virtual Appliance
    • Enabling Layer 4 Traffic Monitor (L4TM)
    • Accessing and Running the System Setup Wizard
    • Reconnecting to the Cisco Web Security Appliance
    • High Availability Overview
    • Hardware Redundancy
    • Introducing Common Address Redundancy Protocol (CARP)
    • Configuring Failover Groups for High Availability
    • Feature Comparison Across Traffic Redirection Options
    • Architecture Scenarios When Deploying Cisco AnyConnect® Secure Mobility
Lab Topics

Followings labs will be performed by candidates during lab practice sessions:

Lab outline

  • Configure the Cisco Web Security Appliance
  • Deploy Proxy Services
  • Configure Proxy Authentication
  • Configure HTTPS Inspection
  • Create and Enforce a Time/Date-Based Acceptable Use Policy
  • Configure Advanced Malware Protection
  • Configure Referrer Header Exceptions
  • Utilize Third-Party Security Feeds and MS Office 365 External Feed
  • Validate an Intermediate Certificate
  • View Reporting Services and Web Tracking
  • Perform Centralized Cisco AsyncOS Software Upgrade Using Cisco SMA
Virtual Classroom
  • Instructor led online training is an ideal vehicle for delivering training to individuals anywhere in the world at any time.
  • This innovative approach presents live content with instructor delivering the training online.
  • Candidates will be performing labs remotely on our labs on cloud in presence of an online instructor.
  • Rstforum uses microsoft lync engine to deliver instructor led online training.
  • Advances in computer network technology, improvements in bandwidth, interactions, chat and conferencing, and realtime audio and video offers unparalleled training opportunities.
  • Instructor led online training can helps today’s busy professionals to perform their jobs and upgrade knowledge by integrating self-paced instructor led online training in their daily routines.
Miscellaneous
  • Minimum batch size required for batch is 10 participants in the this course.
  • The RST Forum reserves the right to cancel/postpone the class.
  • Course schedule will be provided before commencement of the course.
  • Certificate of participation will be awarded to participants with a minimum 90% attendance.
  • All attendees are to observe the Copyright Law on intellectual properties such as software and courseware from respective vendors.
  • The RST Forum reserves the right to include external participants in the program either for the entire course or individual courses.
  • The RST Forum reserves the right to change/alter the sequence of courses. RST FORUM published Book would be given at 50% discounted rate to the forum students.