We may earn an affiliate commission when you visit our partners.
Nick Russo

A comprehensive security architecture should include network, endpoint, and application security/visibility techniques. This course will teach you how to deploy Cisco ISE, Stealthwatch, and SMA to reinforce your cyber defenses.

Read more

A comprehensive security architecture should include network, endpoint, and application security/visibility techniques. This course will teach you how to deploy Cisco ISE, Stealthwatch, and SMA to reinforce your cyber defenses.

Even after you've secured your networks and endpoints, a key question remains: What about the applications used by the business? How can we observe them and how can we control network access to them?

In this course,

, you'll explore Cisco Identity Services Engine (ISE) which provides wired and wireless network access control using the pxGrid and REST APIs.

Next, you'll discover how to improve application visibility using the Netflow-based Cisco Stealthwatch family of products, helping you identify anomalies for analysis both in enterprise and cloud networks.

Finally, you'll learn how to provide application-level security for common enterprise services such as web and email using Cisco Security Management Appliance (SMA) with the Email Security Appliance (ESA) and Web Security Appliance (WSA).

When you're finished with this course, you'll have the skills and knowledge necessary to automate a variety of Cisco security management solutions in your production network.

Even after you've secured your networks and endpoints, you will need to protect business-critical applications like web and email, along with introducing anomaly detection.

Cisco SAUTO (300-735) for CCNP Security and Cisco Certified DevNet Professional Path learners will greatly benefit from this course.

This course will cover three broad Cisco product categories: Identity Services Engine (ISE) to centrally control network access, Stealthwatch which is a collection of products that passively monitors network flows, and the SMA (Security Management Appliance) used to manage web and email-specific security solutions.

This course assumes you already have a strong background in Python programming in both enterprise and security environments.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Course Overview
Centralizing Network Access Control with Cisco ISE
Visualizing Network Threats with Cisco Stealthwatch
Unifying Threat Response Actions with Cisco XDR
Read more
Securing Email and Web Traffic with Cisco SMA

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores security techniques in network, endpoints, and applications, enhancing cyber defenses
Strengthens security measures by monitoring network flows for anomalies
Provides comprehensive control over network access and security responses
Teaches the implementation of Cisco security solutions, including ISE, Stealthwatch, and SMA
Assumes prior knowledge of Python programming, potentially limiting accessibility for beginners

Save this course

Save Automating Cisco Security Management Solutions Using APIs to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Automating Cisco Security Management Solutions Using APIs with these activities:
Python Programming Refresher
Recall essential Python programming concepts for better comprehension and fluency in the context of the course.
Browse courses on Python Programming
Show steps
  • Review fundamental Python syntax and data structures
  • Practice writing simple Python scripts and functions
  • Explore online tutorials and resources for additional reinforcement (optional)
Review the concepts of network security
Strengthen your foundation in network security before taking the course, ensuring a better understanding of the course materials.
Browse courses on network security
Show steps
  • Revisit your notes or study materials from previous courses.
  • Review online resources or textbooks.
Python Programming Review
Review Python programming concepts you may not have used recently, such as data structures and algorithms.
Browse courses on Python Programming
Show steps
  • Review basic Python syntax and data structures.
  • Revisit the fundamentals of object-oriented programming in Python.
  • Practice solving common programming problems using Python.
Six other activities
Expand to see all activities and additional details
Show all nine activities
Join a study group for Cisco Security
Collaborate with peers in a study group dedicated to Cisco Security, fostering knowledge exchange and reinforcing your understanding.
Show steps
  • Identify or start a study group.
  • Set regular meeting times and create a study schedule.
  • Discuss course materials and work on assignments together.
Attend a Cisco Security Day event
Immerse yourself in the latest Cisco security technologies and innovations at a Cisco Security Day event, gaining valuable insights.
Show steps
  • Identify upcoming Cisco Security Day events.
  • Register for the event and attend the relevant sessions.
Follow an online tutorial on Cisco Stealthwatch
Enhance your understanding of Cisco Stealthwatch by following an online tutorial, providing you with hands-on experience in application visibility.
Show steps
  • Identify a reputable online platform or instructor.
  • Choose a tutorial that aligns with your learning objectives.
  • Follow the instructions and complete the exercises.
Configure Cisco ISE for 802.1x authentication
Practice configuring Cisco ISE for 802.1x authentication to strengthen your understanding of network access control.
Show steps
  • Gather the necessary equipment and software.
  • Configure your network infrastructure.
  • Deploy Cisco ISE and configure the necessary settings.
  • Test and troubleshoot your configuration.
Design and implement a security policy for Cisco SMA
Reinforce your knowledge of Cisco SMA by creating a comprehensive security policy, ensuring the protection of your email and web applications.
Show steps
  • Gather requirements and conduct a risk assessment.
  • Design the security policy based on best practices.
  • Implement the policy using Cisco SMA.
  • Test and evaluate the effectiveness of the policy.
Participate in a Cisco Security Capture the Flag (CTF)
Challenge your skills and knowledge in a Cisco Security CTF, simulating real-world security scenarios and enhancing your problem-solving abilities.
Show steps
  • Identify upcoming Cisco Security CTF events.
  • Register for the event and form a team.
  • Prepare for the CTF by reviewing relevant materials.
  • Participate in the CTF and solve the challenges.

Career center

Learners who complete Automating Cisco Security Management Solutions Using APIs will develop knowledge and skills that may be useful to these careers:
Network Security Engineer
Network Security Engineers lead the installation, configuration, and troubleshooting of firewalls, intrusion detection systems, intrusion prevention systems, virtual private networks, and security information and event management (SIEM) systems. This course may be useful for those looking to enhance their knowledge of Cisco security solutions, such as Stealthwatch and SMA, which are commonly used in enterprise network security.
Security Analyst
Security Analysts are responsible for monitoring and analyzing security logs and events, investigating security incidents, and developing and implementing security policies and procedures. This course may help build a foundation for those looking to specialize in network security analysis, as it covers Cisco Stealthwatch, a tool used for detecting anomalies in network traffic.
Cloud Security Engineer
Cloud Security Engineers design, implement, and manage security solutions for cloud computing environments. As Stealthwatch has capabilities for monitoring cloud networks, this course may be useful for those looking to enhance their knowledge of Cisco security solutions in the cloud.
Network Administrator
Network Administrators manage and maintain computer networks, including routers, switches, and firewalls. This course may be useful for those looking to gain a deeper understanding of Cisco ISE, which is used for managing access to network resources.
Information Security Analyst
Information Security Analysts plan and implement security measures to protect an organization's information systems and data. This course may be useful for those looking to specialize in network security, as it covers Cisco solutions for monitoring and controlling network access and threats.
Cybersecurity Architect
Cybersecurity Architects design and implement security solutions to protect an organization's computer networks and systems. This course may be useful for those looking to gain a deeper understanding of Cisco security solutions, such as ISE and Stealthwatch, which are commonly used in enterprise cybersecurity architectures.
IT Security Manager
IT Security Managers are responsible for developing and implementing security policies and procedures, managing security budgets, and overseeing security audits. This course may be helpful for those looking to advance their careers in IT security management, as it covers Cisco solutions for managing network access, detecting threats, and securing applications.
Security Consultant
Security Consultants help organizations assess their security risks and develop and implement security solutions. Those looking to specialize in network security consulting may find this course useful, as it covers Cisco solutions for monitoring and controlling network access and threats.
Security Auditor
Security Auditors assess the security of an organization's computer networks and systems. This course may be useful for those looking to gain a deeper understanding of Cisco security solutions, such as ISE and Stealthwatch, which are commonly used in security audits.
Security Engineer
Security Engineers design, implement, and manage security solutions to protect an organization's computer networks and systems. This course may help build a foundation for those looking to specialize in network security, as it covers Cisco solutions for monitoring and controlling network access and threats.
Chief Technology Officer (CTO)
CTOs are responsible for overseeing an organization's technology strategy and infrastructure. This course may be useful for those looking to gain a deeper understanding of Cisco security solutions, such as ISE and Stealthwatch, which are commonly used in enterprise technology architectures.
IT Manager
IT Managers plan and direct the activities of an organization's IT department. Those looking to specialize in IT security management may find this course useful, as it covers Cisco solutions for managing network access, detecting threats, and securing applications.
Network Architect
Network Architects design and implement computer networks. This course may be useful for those looking to gain a deeper understanding of Cisco ISE, which is used for managing access to network resources.
Chief Information Security Officer (CISO)
CISOs are responsible for developing and implementing an organization's overall security strategy. This course may be helpful for those looking to advance their careers in IT security leadership, as it covers Cisco solutions for managing network access, detecting threats, and securing applications.
Chief Executive Officer (CEO)
CEOs are responsible for the overall management and operation of an organization. Those looking to gain a broader understanding of cybersecurity and its impact on business may find this course useful, as it covers Cisco solutions for managing network access, detecting threats, and securing applications.

Reading list

We've selected six books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Automating Cisco Security Management Solutions Using APIs.
Provides a comprehensive overview of security in computing. It valuable resource for anyone who wants to learn more about security and how to protect their systems from threats.
Provides a comprehensive overview of network security. It valuable resource for anyone who wants to learn more about security and how to protect their networks from threats.
Provides a comprehensive overview of cryptography and network security. It valuable resource for anyone who wants to learn more about security and how to protect their networks and data from threats.
Provides a comprehensive overview of ethical hacking and penetration testing. It valuable resource for anyone who wants to learn more about security and how to test their networks for vulnerabilities.
Provides a comprehensive overview of network security assessment, covering topics such as threat identification, vulnerability scanning, and penetration testing. It good choice for those who want to learn about network security assessment and its importance in protecting networks.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Automating Cisco Security Management Solutions Using APIs.
Securing Applications with AWS
Most relevant
Cisco Core Security: Network Security with Cisco Firepower
Most relevant
Cisco Core Security: Secure Network Access Using Cisco ISE
Most relevant
Automating Cisco ASA and Firepower Policies Using APIs
Most relevant
Cisco Core Security: Content Security with Cisco WSA &...
Most relevant
Cisco Enterprise Networks: NAT and Security
Most relevant
Cisco Advanced Routing: Enterprise Networks
Most relevant
Cisco Enterprise Networks: Infrastructure Security
Most relevant
Data Communications and Network Services
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser