Swsa
- Learn how to set up, operate, and manage the Cisco Web Security Appliance (WSA), which is powered by Cisco Talos and offers business email users improved protection against online threats! You can build proxy services, employ authentication, implement usage control settings and rules, and regulate HTTPS traffic and access with the help of the two-day intermediate-level Cisco Web Security Appliance course. You get knowledge on how to administer the Cisco WSA solution, apply data security and loss prevention, and use the anti-malware features of the solution, among many other things.The 300-725 SWSA exam (Securing the Web with Cisco Web Security Appliance), which is necessary to obtain the certifications for Cisco Certified Specialist-Web Content Security and CCNP® Security, is also prepared for by the Cisco security course.
- Note: To obtain the Cisco Certified Specialist-Web Content Security certification, you must pass the 300-725 SWSA exam alone. But it just fulfils the CCNP® Security certification concentration test criteria.
Accredited By

Start Date | End Date | Start - End Time | Batch Type | Training Mode | Batch Status | |
---|---|---|---|---|---|---|
2024-11-25 | 2024-11-28 | 19:00 - 23:00 IST | Weekend | Online/Offline | [ open ] |
Why Choose 1-on-1 Training
- Focused attention and face to face instructor support
- Custom Calendar & Training Schedule
- Highly interactive environment
- Learn via labs, mock tests, case studies, Q&A sessions
- On-spot doubt clearing opportunity
- Interview Support and Free Career Guidance

InfosecTrain Learning Bonanza Offer Buy 1 Get 4*
- Cyber Security Engineer Masterclass
- Introduction of Data Privacy
- Cyber Security Fundamentals (JCP)
- Red Team Ethical Hacking Masterclass
Choose Your Preferred Learning Mode

1-TO-1 TRAINING
Customized schedule
Learn at your dedicated hour
Instant clarification of doubt
Guaranteed to run

ONLINE TRAINING
Flexibility, Convenience & Time Saving
More Effective
Learning Cost Savings

CORPORATE TRAINING
Anytime, Anywhere – Across The Globe
Hire A Trainer
At Your Own Pace
Customized Corporate Training

Looking for a customized training?
Course Description
Key Takeaways
- Describe Cisco WSA
- Deploy proxy services
- Utilize authentication
- Describe decryption policies to control HTTPS traffic
- Understand differentiated traffic access policies and identification profiles
- Enforce acceptable use control settings
- Defend against malware
- Describe data security and data loss prevention
- Perform administration and troubleshooting
Who should attend
- Network Administrator
- Security Engineer
- Security Architect
- Cisco Integrators and Partners
Pre requisites
- TCP/IP services, including Domain Name System (DNS), Secure Shell (SSH), FTP, Simple Network Management Protocol (SNMP), HTTP, and HTTPS
- IP routing
- Implementing and Administering Cisco Solutions (CCNA) v2.0
Lab Outline
- Configure the Cisco Web Security Appliance
- Deploy Proxy Services
- Configure Proxy Authentication
- Configure HTTPS Inspection
- Create and Enforce a Time/Date-Based Acceptable Use Policy
- Configure Advanced Malware Protection
- Configure Referrer Header Exceptions
- Utilize Third-Party Security Feeds and MS Office 365 External Feed
- Validate an Intermediate Certificate
- View Reporting Services and Web Tracking
- Perform Centralized Cisco AsyncOS Software Upgrade Using Cisco SMA
Why Network Binary?
Course Outline
Describing Cisco WSA
- Technology Use Case
- Cisco WSA Solution
- Cisco WSA Features
- Cisco WSA Architecture
- Proxy Service
- Integrated Layer 4 Traffic Monitor
- Data Loss Prevention
- Cisco Cognitive Intelligence
- Management Tools
- Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration
- Cisco Content Security Management Appliance (SMA)
Deploying Proxy Services
- Explicit Forward Mode vs. Transparent Mode
- Transparent Mode Traffic Redirection
- Web Cache Control Protocol
- Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow
- Proxy Bypass
- Proxy Caching
- Proxy Auto-Config (PAC) Files
- FTP Proxy
- Socket Secure (SOCKS) Proxy
- Proxy Access Log and HTTP Headers
- Customizing Error Notifications with End User Notification (EUN) Pages
Utilizing Authentication
- Authentication Protocols
- Authentication Realms
- Tracking User Credentials
- Explicit (Forward) and Transparent Proxy Mode
- Bypassing Authentication with Problematic Agents
- Reporting and Authentication
- Re-Authentication
- FTP Proxy Authentication
- Troubleshooting Joining Domains and Test Authentication
- Integration with Cisco Identity Services Engine (ISE)
Creating Decryption Policies to Control HTTPS Traffic
- Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview
- Certificate Overview
- Overview of HTTPS Decryption Policies
- Activating HTTPS Proxy Function
- Access Control List (ACL) Tags for HTTPS Inspection
- Access Log Examples
Understanding Differentiated Traffic Access Policies and Identification Profiles
- Overview of Access Policies
- Access Policy Groups
- Overview of Identification Profiles
- Identification Profiles and Authentication
- Access Policy and Identification Profiles Processing Order
- Other Policy Types
- Access Log Examples
- ACL Decision Tags and Policy Groups
- Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications
Defending Against Malware
- Web Reputation Filters
- Anti-Malware Scanning
- Scanning Outbound Traffic
- Anti-Malware and Reputation in Policies
- File Reputation Filtering and File Analysis
- Cisco Advanced Malware Protection
- File Reputation and Analysis Features
- Integration with Cisco Cognitive Intelligence
Enforcing Acceptable Use Control Settings
- Controlling Web Usage
- URL Filtering
- URL Category Solutions
- Dynamic Content Analysis Engine
- Web Application Visibility and Control
- Enforcing Media Bandwidth Limits
- Software as a Service (SaaS) Access Control
- Filtering Adult Content
Data Security and Data Loss Prevention
- Data Security
- Cisco Data Security Solution
- Data Security Policy Definitions
- Data Security Logs
Performing Administration and Troubleshooting
- Monitor the Cisco Web Security Appliance
- Cisco WSA Reports
- Monitoring System Activity Through Logs
- System Administration Tasks
- Troubleshooting
- Command Line Interface
References
- Comparing Cisco WSA Models
- Comparing Cisco SMA Models
- Overview of Connect, Install, and Configure
- Deploying the Cisco Web Security Appliance Open Virtualization Format (OVF) Template
- Mapping Cisco Web Security Appliance Virtual Machine (VM) Ports to Correct Networks
- Connecting to the Cisco Web Security Virtual Appliance
- Enabling Layer 4 Traffic Monitor (L4TM)
- Accessing and Running the System Setup Wizard
- Reconnecting to the Cisco Web Security Appliance
- High Availability Overview
- Hardware Redundancy
- Introducing Common Address Redundancy Protocol (CARP)
- Configuring Failover Groups for High Availability
- Feature Comparison Across Traffic Redirection Options
- Architecture Scenarios When Deploying Cisco AnyConnect® Secure Mobility
Exam Formats
Questions | There are 120 MCQ-based questions are there. | |
Duration | Candidates have 3.5 hours i.e. 210 minutes to clear these questions | |
Types of questions | Questions are built on different scenarios, and case studies to test real-life concepts and knowledge. | |
Exam Mode | Computer-based exam |
Certification Process
There are certain requirements which you need to fulfil to apply for this certification course such as:
Work experience: It requires 7,500 hours of business analysis work within the last 10 years.
Education: Need to engage in professional development activities, programmes and education within the last 4 years for a minimum of 35 Hours.
Exam: After this, an MCQ-based exam needs to be completed and passed to become a certified business analysis professional. It requires the learners to write 120 questions.
Need Customized Curriculum?
Course Advisor

MOHAMMED GUFRAN
17 years of Experience
Enterprise Networking | Network Security | Software Defined Networking & AutomationDirector - Technical Operation Network Binary Gufran, a Cisco Authorized and CCIE certified instructor, possesses more than 15 years of training mastery in Networking, Security, SDN, and many other advanced courses and technologies. With CCNA, CCNP, and many other diverse Cisco specializations, he's achieved CCIE Security (50220). From foundational concepts to complex Cisco networks & and security topics like Identity Service Engine, Web Security, Email Security, Firewalls, VPN, NGIPS, and NGFW, he's a seasoned instructor. He aptly managed global training projects, collaborating with esteemed institutions like the Bank of Tanzania, EMAL - Abu Dhabi, PIC - Kuwait, and many clients based in the US & and UK. His journey empowers organizations and individuals through roles ranging from Training Consultant to Senior Training Consultant, including contributions to content management and trainer evaluation. As Network Binary's Director of Technical Operations, Gufran mentors instructors shapes training solutions, and leads pioneering course development. He also helps drive business growth, collaborates with training industry experts, and sets benchmarks for training excellence. Recipient of multiple Instructor Excellence and Distinguished Awards from Cisco, Gufran's narrative radiates learning, innovation, and technical leadership PROFESSIONAL EXPERIENCE
- 2025 - Present
- 2017 - 2023
- 2011 - 2017
- 2008 - 2011
- 2006 - 2008
-
- Director of Technical Operation at Network Binary
- Senior Training Consultant - NIIT Limited
- Koenig Solutions Pvt Ltd
- Technical Head - Jetking
- Senior Hardware and Networking Trainer
- Enterprise Networking
- Network Security
- Software Defined Networking & Automation
- Checkpoint, Palo Alto, and Fortinet Firewall technologies
- Data Center Technologies
- IPv6 Design and Development
- MPLS
- BGP
- CERTIFICATIONS
- Certified Cisco Systems Instructor
- Cisco Certified Internetwork Expert - Security (50220)
- Cisco Certified Network Professional - Enterprise
- Cisco Certified Network Professional - Security
- Cisco Certified Specialist - SD-WAN
- Cisco Certified Specialist - SD-Access
- Cisco Certified Specialist - BGP
- Cisco Certified Specialis - Firewall
- Cisco Certified Specialist - IPv6
Course Benefits

Here's What People Are Saying About Cybersec Trainings

Vineet Tomar

Eshwar Egga

Anshul Mittal

Tejasri S

Gopi Batta

Akanksha Verma
Why Nework Binary Trainings?

Expertise and Reputation

Comprehensive Training Programs

Industry-Relevant Curriculum

Certification and Career Advancement
