Skip to content

Swsa

Learn how to set up, operate, and manage the Cisco Web Security Appliance (WSA), which is powered by Cisco Talos and offers business email users improved protection against online threats! You can build proxy services, employ authentication, implement usage control settings and rules, and regulate HTTPS traffic and access with the help of the two-day intermediate-level Cisco Web Security Appliance course. You get knowledge on how to administer the Cisco WSA solution, apply data security and loss prevention, and use the anti-malware features of the solution, among many other things.The 300-725 SWSA exam (Securing the Web with Cisco Web Security Appliance), which is necessary to obtain the certifications for Cisco Certified Specialist-Web Content Security and CCNP® Security, is also prepared for by the Cisco security course. Note: To obtain the Cisco Certified Specialist-Web Content Security certification, you must pass the 300-725 SWSA exam alone. But it just fulfils the CCNP® S…
  • Learn how to set up, operate, and manage the Cisco Web Security Appliance (WSA), which is powered by Cisco Talos and offers business email users improved protection against online threats! You can build proxy services, employ authentication, implement usage control settings and rules, and regulate HTTPS traffic and access with the help of the two-day intermediate-level Cisco Web Security Appliance course. You get knowledge on how to administer the Cisco WSA solution, apply data security and loss prevention, and use the anti-malware features of the solution, among many other things.The 300-725 SWSA exam (Securing the Web with Cisco Web Security Appliance), which is necessary to obtain the certifications for Cisco Certified Specialist-Web Content Security and CCNP® Security, is also prepared for by the Cisco security course.
  • Note: To obtain the Cisco Certified Specialist-Web Content Security certification, you must pass the 300-725 SWSA exam alone. But it just fulfils the CCNP® Security certification concentration test criteria.

Accredited By

Start Date End Date Start - End Time Batch Type Training Mode Batch Status
2024-11-25 2024-11-28 19:00 - 23:00 IST Weekend Online/Offline [ open ]
Want undivided attention? Choose

InfosecTrain Learning Bonanza Offer Buy 1 Get 4*

Register for any Course and get 4 eLearning (Worth USD 199 Self-paced Learning) Courses 100% free. Don’t miss this offer Enroll Now

Choose Your Preferred Learning Mode

1-TO-1 TRAINING

Customized schedule
Learn at your dedicated hour
Instant clarification of doubt
Guaranteed to run

ONLINE TRAINING

Flexibility, Convenience & Time Saving
More Effective
Learning Cost Savings

CORPORATE TRAINING

Anytime, Anywhere – Across The Globe
Hire A Trainer
At Your Own Pace
Customized Corporate Training

Looking for a customized training?

Course Description

Key Takeaways
  • Describe Cisco WSA
  • Deploy proxy services
  • Utilize authentication
  • Describe decryption policies to control HTTPS traffic
  • Understand differentiated traffic access policies and identification profiles
  • Enforce acceptable use control settings
  • Defend against malware
  • Describe data security and data loss prevention
  • Perform administration and troubleshooting
Who should attend
  • Network Administrator
  • Security Engineer
  • Security Architect
  • Cisco Integrators and Partners
Pre requisites
Required
  • TCP/IP services, including Domain Name System (DNS), Secure Shell (SSH), FTP, Simple Network Management Protocol (SNMP), HTTP, and HTTPS
  • IP routing
Recommended
  • Implementing and Administering Cisco Solutions (CCNA) v2.0
Lab Outline
  • Configure the Cisco Web Security Appliance
  • Deploy Proxy Services
  • Configure Proxy Authentication
  • Configure HTTPS Inspection
  • Create and Enforce a Time/Date-Based Acceptable Use Policy
  • Configure Advanced Malware Protection
  • Configure Referrer Header Exceptions
  • Utilize Third-Party Security Feeds and MS Office 365 External Feed
  • Validate an Intermediate Certificate
  • View Reporting Services and Web Tracking
  • Perform Centralized Cisco AsyncOS Software Upgrade Using Cisco SMA
Why Network Binary?
Award-winning, Industry-experienced, and certified instructors who are passionate about sharing their knowledge.
Training Approach: We differentiate ourselves by adopting a facilitative role rather than just being instructors in our training approach.
Hands-on learning with expertly designed labs. Personalized Training Options: We understand that every learner has unique needs. That's why we offer personalized training options to accommodate different learning styles and preferences.
Course Outline

Describing Cisco WSA

  • Technology Use Case
  • Cisco WSA Solution
  • Cisco WSA Features
  • Cisco WSA Architecture
  • Proxy Service
  • Integrated Layer 4 Traffic Monitor
  • Data Loss Prevention
  • Cisco Cognitive Intelligence
  • Management Tools
  • Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration
  • Cisco Content Security Management Appliance (SMA)

Deploying Proxy Services

  • Explicit Forward Mode vs. Transparent Mode
  • Transparent Mode Traffic Redirection
  • Web Cache Control Protocol
  • Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow
  • Proxy Bypass
  • Proxy Caching
  • Proxy Auto-Config (PAC) Files
  • FTP Proxy
  • Socket Secure (SOCKS) Proxy
  • Proxy Access Log and HTTP Headers
  • Customizing Error Notifications with End User Notification (EUN) Pages

Utilizing Authentication

  • Authentication Protocols
  • Authentication Realms
  • Tracking User Credentials
  • Explicit (Forward) and Transparent Proxy Mode
  • Bypassing Authentication with Problematic Agents
  • Reporting and Authentication
  • Re-Authentication
  • FTP Proxy Authentication
  • Troubleshooting Joining Domains and Test Authentication
  • Integration with Cisco Identity Services Engine (ISE)

Creating Decryption Policies to Control HTTPS Traffic

  • Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview
  • Certificate Overview
  • Overview of HTTPS Decryption Policies
  • Activating HTTPS Proxy Function
  • Access Control List (ACL) Tags for HTTPS Inspection
  • Access Log Examples

Understanding Differentiated Traffic Access Policies and Identification Profiles

  • Overview of Access Policies
  • Access Policy Groups
  • Overview of Identification Profiles
  • Identification Profiles and Authentication
  • Access Policy and Identification Profiles Processing Order
  • Other Policy Types
  • Access Log Examples
  • ACL Decision Tags and Policy Groups
  • Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications

Defending Against Malware

  • Web Reputation Filters
  • Anti-Malware Scanning
  • Scanning Outbound Traffic
  • Anti-Malware and Reputation in Policies
  • File Reputation Filtering and File Analysis
  • Cisco Advanced Malware Protection
  • File Reputation and Analysis Features
  • Integration with Cisco Cognitive Intelligence

Enforcing Acceptable Use Control Settings

  • Controlling Web Usage
  • URL Filtering
  • URL Category Solutions
  • Dynamic Content Analysis Engine
  • Web Application Visibility and Control
  • Enforcing Media Bandwidth Limits
  • Software as a Service (SaaS) Access Control
  • Filtering Adult Content

Data Security and Data Loss Prevention

  • Data Security
  • Cisco Data Security Solution
  • Data Security Policy Definitions
  • Data Security Logs

Performing Administration and Troubleshooting

  • Monitor the Cisco Web Security Appliance
  • Cisco WSA Reports
  • Monitoring System Activity Through Logs
  • System Administration Tasks
  • Troubleshooting
  • Command Line Interface

References

  • Comparing Cisco WSA Models
  • Comparing Cisco SMA Models
  • Overview of Connect, Install, and Configure
  • Deploying the Cisco Web Security Appliance Open Virtualization Format (OVF) Template
  • Mapping Cisco Web Security Appliance Virtual Machine (VM) Ports to Correct Networks
  • Connecting to the Cisco Web Security Virtual Appliance
  • Enabling Layer 4 Traffic Monitor (L4TM)
  • Accessing and Running the System Setup Wizard
  • Reconnecting to the Cisco Web Security Appliance
  • High Availability Overview
  • Hardware Redundancy
  • Introducing Common Address Redundancy Protocol (CARP)
  • Configuring Failover Groups for High Availability
  • Feature Comparison Across Traffic Redirection Options
  • Architecture Scenarios When Deploying Cisco AnyConnect® Secure Mobility

Exam Formats

Questions There are 120 MCQ-based questions are there.
Duration Candidates have 3.5 hours i.e. 210 minutes to clear these questions
Types of questions Questions are built on different scenarios, and case studies to test real-life concepts and knowledge.
Exam Mode Computer-based exam

Certification Process

There are certain requirements which you need to fulfil to apply for this certification course such as:

Work experience: It requires 7,500 hours of business analysis work within the last 10 years.

Education: Need to engage in professional development activities, programmes and education within the last 4 years for a minimum of 35 Hours.

Exam:  After this, an MCQ-based exam needs to be completed and passed to become a certified business analysis professional. It requires the learners to write 120 questions.

Need Customized Curriculum?

GET A FREE DEMO CLASS

Related Courses

Course Advisor

Course Benefits

Here's What People Are Saying About Cybersec Trainings

Vineet Tomar

India
Kishore covered the Basics and helped us do the Labs during the training session. It helped us to practice and apply the concepts during the session. He also pro-actively asked for any issues and helped to clarify the doubts during Labs. I appreciate his efforts & thank Orbus International for arranging such a interactive training program.

Eshwar Egga

India
The practical sessions on Alibaba Cloud were highly engaging, offering hands-on experience that made learning effective. The trainer’s knowledge was exceptional, simplifying complex topics with ease. Orbus International’s focus on both practical application and in-depth expertise makes their training programs highly valuable for anyone looking to master cloud technologies.

Anshul Mittal

India
I had the privilege of receiving training on Alibaba Cloud from Orbus International, and it was an exceptional experience. The content was well-structured, and the trainers were highly knowledgeable, making complex concepts easy to grasp. I feel much more confident in my skills now, thanks to the quality of training delivered.

Tejasri S

India
“Content explanation is too good where even those new to SailPoint also can understand the content but as I don’t have much practice about programming language it was bit difficult for me to follow up else it’s too good . Just one drawback/ feedback is practice time for LAB could’ve been for one more additional week where I could’ve got more hands-on and get myself well equipped.”

Gopi Batta

India
Good to learn new skill. Very happy to be a part of the course.

Akanksha Verma

India
Duck Creek Training was better than I expected! The hands-on lessons and expert guidance gave me the confidence to handle real projects. I highly recommend it.
Benefits You Will Access

Why Nework Binary Trainings?

Expertise and Reputation

Comprehensive Training Programs

Industry-Relevant Curriculum

Certification and Career Advancement

Certified & Experienced Instructors

FAQs

Why Network Binary?
Award-winning, Industry-experienced, and certified instructors who are passionate about sharing their knowledge.
Training Approach: We differentiate ourselves by adopting a facilitative role rather than just being instructors in our training approach.
Hands-on learning with expertly designed labs. Personalized Training Options: We understand that every learner has unique needs. That's why we offer personalized training options to accommodate different learning styles and preferences.

Dear Learner

Take step closer to grow and glow in your career. We can make 20%/- off. Up skill now must be blue.
loader-infosectrain

Connect with Us