For business inquiries : (+1) 438 601-1155

For special requests : (+1) 438 601-1155

A propos de la formation Securing the Web with Cisco Web Security Appliance

The "Securing the Web with Cisco Web Security Appliance" training equips participants with the knowledge and skills needed to implement, utilize, and maintain the Cisco® Web Security Appliance (WSA) to deliver advanced protection for corporate emails and control against web security threats. Through this training, attendees will learn how to deploy proxy services, implement authentication, enforce traffic and HTTPS access control policies, configure usage control settings, utilize anti-malware features, implement data security and data loss prevention measures, and perform administration tasks for the Cisco WSA solution.

Détails
Objectifs pédagogiques de la formation Securing the Web with Cisco Web Security Appliance
  • Describe the features and capabilities of Cisco WSA
  • Deploy proxy services for web security
  • Implement authentication mechanisms for user access control
  • Configure decryption policies to manage HTTPS traffic effectively
  • Understand and apply differentiated traffic access policies and identification profiles
  • Enforce acceptable use control settings to regulate web usage
  • Utilize anti-malware features to protect against malicious threats
  • Describe data security and data loss prevention measures implemented by Cisco WSA
  • Perform administration tasks and troubleshoot issues related to the Cisco WSA solution.

Qui devrait suivre cette formation Securing the Web with Cisco Web Security Appliance ?

Public visé par la formation Securing the Web with Cisco Web Security Appliance

This training is designed for individuals involved in the deployment, installation, and administration of a Cisco Web Security Appliance. It is suitable for network administrators, security professionals, and IT personnel responsible for ensuring web security within their organizations.

Prérequis de la formation Securing the Web with Cisco Web Security Appliance

Participants should have a basic understanding of networking concepts and familiarity with Cisco networking technologies. Prior experience with web security solutions and appliances is beneficial but not required.

Formations Similaires

  • NIST CyberSecurity Framework 2.0 Détails
  • Security Manager Détails
  • COBIT 2019 Détails
  • TOGAF 9.2 Détails
  • ISO 45001 Lead Auditor Détails
  • ISO 27001 Lead Auditor Détails
  • ISO 27001 Lead Implementer Course Détails
  • ISO 45001 Lead Implementer Détails
  • ISO 27001 Lead Auditor Training Course Détails
  • ISO 27005 Training Détails
  • ISO 27002 Foundation Détails
  • Offensive Security Certified Professional (OSCP) Détails
  • EBios Détails
  • TOGAF® 10 Détails
  • ISO 22301 Lead Implementer Détails
  • Stormshield Détails
  • Configuring BIG-IP - Application Security Manager (ASM) Détails
  • ForgeRock Détails
  • Spring Security 5 Détails
  • Certified Ethical Hacker (CEH) v12 Détails
  • Implementing PowerShell Security Détails
  • Veeam Backup and Replication v12 Détails
  • KL 002.104: Kaspersky Endpoint Security and Management. Fundamentals Détails
  • LPIC-3 Exam 303: Security Détails
  • SSO (Single Sign-On) Détails
  • IT Governance Détails
  • CCSA, Check Point Certified Security Administrator R81 Détails
  • CCSE - Check Point Certified Security Expert R80.10 Détails
  • Securing Email with Cisco Email Security Appliance SESA Détails
  • Certified Ethical Hacker CEH v12 Détails
  • FCNSA Fortinet Certified Network Security Administrator Détails
  • NSE 4 FortiGate Network Security Professional Détails
  • NSE5 FortiManager 7.0 Détails
  • Securing the Web with Cisco Web Security Appliance Détails
  • Blue Coat Certified Security Analytics Administrator (BCSAA) Détails
  • CCNP Security Détails
  • Android app security Détails
  • Mastering IT Project Audit: Techniques and Best Practices Détails
  • SharePoint : Planification et administration (70-339) Détails

Déroulé de la formation Securing the Web with Cisco Web Security Appliance


Module 1: Understanding Cisco WSA

Overview of Cisco WSA Technology Applications

Exploring the Features and Capabilities of Cisco WSA

Architectural Components of Cisco WSA Solution


Module 2: Deployment of Proxy Services

Differentiating Explicit Forward Mode and Transparent Mode

Configuring Traffic Redirection in Transparent Mode

Implementation of Web Cache Control Protocol

Utilizing Proxy Bypass Techniques

Setting Up Proxy Caching and Auto-Config (PAC) Files


Module 3: Authentication Methods

Introduction to Authentication Protocols

Configuring Authentication Realms

User Credential Tracking

Authentication Modes: Explicit vs. Transparent Proxy

Troubleshooting Authentication Issues

Integration with Cisco Identity Services Engine (ISE)


Module 4: Decryption Policies for HTTPS Traffic

Overview of TLS/SSL Inspection

Certificate Management in HTTPS Decryption Policies

Implementation of HTTPS Decryption Policies

Activation and Management of HTTPS Proxy

Access Control List (ACL) Tags for HTTPS Inspection


Module 5: Traffic Access Policies and Identification Profiles

Understanding Access Policies and Policy Groups

Configuring Identification Profiles

Authentication Integration with Identification Profiles

Policy Processing Order and ACL Decision Tags


Module 6: Defense Against Malware

Utilizing Web Reputation Filters

Implementing Anti-Malware Scanning Techniques

Outbound Traffic Scanning

File Reputation Filtering

Integration with Advanced Malware Protection

Leveraging Cisco Cognitive Intelligence


Module 7: Web Usage Controls

Methods for URL Filtering

Solutions for URL Categories

Dynamic Content Analysis

Web Application Visibility and Control

Media Bandwidth Limits Enforcement

SaaS Access Control and Adult Content Filtering


Module 8: Data Security and Loss Prevention

Overview of Data Security Measures

Cisco Data Security Solutions

Defining Data Security Policies and Logs Management


Module 9: Administration and Troubleshooting

Monitoring Cisco WSA Activities

Generating Reports and Analyzing System Logs

System Administration Tasks

Troubleshooting Techniques and Command Line Interface (CLI) Usage

Formations Similaires
NIST CyberSecurity Framework 2.0 Détails
Security Manager Détails
COBIT 2019 Détails
TOGAF 9.2 Détails
ISO 45001 Lead Auditor Détails
ISO 27001 Lead Auditor Détails
ISO 27001 Lead Implementer Course Détails
ISO 45001 Lead Implementer Détails
ISO 27001 Lead Auditor Training Course Détails
ISO 27005 Training Détails
ISO 27002 Foundation Détails
Offensive Security Certified Professional (OSCP) Détails
EBios Détails
TOGAF® 10 Détails
ISO 22301 Lead Implementer Détails
Stormshield Détails
Configuring BIG-IP - Application Security Manager (ASM) Détails
ForgeRock Détails
Spring Security 5 Détails
Certified Ethical Hacker (CEH) v12 Détails
Implementing PowerShell Security Détails
Veeam Backup and Replication v12 Détails
KL 002.104: Kaspersky Endpoint Security and Management. Fundamentals Détails
LPIC-3 Exam 303: Security Détails
SSO (Single Sign-On) Détails
IT Governance Détails
CCSA, Check Point Certified Security Administrator R81 Détails
CCSE - Check Point Certified Security Expert R80.10 Détails
Securing Email with Cisco Email Security Appliance SESA Détails
Certified Ethical Hacker CEH v12 Détails
FCNSA Fortinet Certified Network Security Administrator Détails
NSE 4 FortiGate Network Security Professional Détails
NSE5 FortiManager 7.0 Détails
Securing the Web with Cisco Web Security Appliance Détails
Blue Coat Certified Security Analytics Administrator (BCSAA) Détails
CCNP Security Détails
Android app security Détails
Mastering IT Project Audit: Techniques and Best Practices Détails
SharePoint : Planification et administration (70-339) Détails

Vous pouvez faire l’inscription ou la demande du devis avec un seul click