A comprehensive security architecture should include network, endpoint, and application security/visibility techniques. This course will teach you how to deploy Cisco ISE, Stealthwatch, and SMA to reinforce your cyber defenses.
A comprehensive security architecture should include network, endpoint, and application security/visibility techniques. This course will teach you how to deploy Cisco ISE, Stealthwatch, and SMA to reinforce your cyber defenses.
Even after you've secured your networks and endpoints, a key question remains: What about the applications used by the business? How can we observe them and how can we control network access to them?
In this course,
, you'll explore Cisco Identity Services Engine (ISE) which provides wired and wireless network access control using the pxGrid and REST APIs.
Next, you'll discover how to improve application visibility using the Netflow-based Cisco Stealthwatch family of products, helping you identify anomalies for analysis both in enterprise and cloud networks.
Finally, you'll learn how to provide application-level security for common enterprise services such as web and email using Cisco Security Management Appliance (SMA) with the Email Security Appliance (ESA) and Web Security Appliance (WSA).
When you're finished with this course, you'll have the skills and knowledge necessary to automate a variety of Cisco security management solutions in your production network.
Even after you've secured your networks and endpoints, you will need to protect business-critical applications like web and email, along with introducing anomaly detection.
Cisco SAUTO (300-735) for CCNP Security and Cisco Certified DevNet Professional Path learners will greatly benefit from this course.
This course will cover three broad Cisco product categories: Identity Services Engine (ISE) to centrally control network access, Stealthwatch which is a collection of products that passively monitors network flows, and the SMA (Security Management Appliance) used to manage web and email-specific security solutions.
This course assumes you already have a strong background in Python programming in both enterprise and security environments.
OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.
Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.
Find this site helpful? Tell a friend about us.
We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.
Your purchases help us maintain our catalog and keep our servers humming without ads.
Thank you for supporting OpenCourser.