Securing the Web with Cisco Web Security Appliance

SWSA

The Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement, use, and maintain Cisco® Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats.

Accredited course for Continuing Education of Pedagogical Staff

Course length: 2 days (8:30 - 16:00)


List price: 29 000 CZK (without VAT)

This course has no dates set. If you are interested in setting a new one, please contact skoleni@oksystem.cz.

PDF to download Expand allCollapse all

  • Students will be able to

    • Describe Cisco WSA
    • Deploy proxy services
    • Utilize authentication
    • Describe decryption policies to control HTTPS traffic
    • Understand differentiated traffic access policies and identification profiles
    • Enforce acceptable use control settings
    • Defend against malware
    • Describe data security and data loss prevention
    • Perform administration and troubleshooting
  • Course requirements

    • TCP/IP services, including Domain Name System (DNS), Secure Shell (SSH), FTP, Simple Network Management Protocol (SNMP), HTTP, and HTTPS
    • IP routing
  • This course is intended for

    • Security architects
    • System designers
    • Network administrators
    • Operations engineers
    • Network managers, network or security technicians, and security engineers and managers responsible for web security
    • Cisco integrators and partners
  • Literature

    All participants wil receive original Cisco certified study materials. 

  • Hardware

    Exercises are performed on Cisco devices. All classrooms are equipped with high-performance computers connected to the Internet, the classrooms are spacious, air-conditioned, barrier-free and with Wi-Fi connection. If interested, students can join the course online live.

  • Syllabus

    • Describing Cisco WSA
    • Deploying Proxy Services
    • Utilizing Authentication
    • Creating Decryption Policies to Control HTTPS Traffic
    • Understanding Differentiated Traffic Access Policies and Identification Profiles
    • Defending Against Malware
    • Enforcing Acceptable Use Control Settings
    • Data Security and Data Loss Prevention
    • Performing Administration and Troubleshooting

Prices do not include VAT. OKsystem a.s. reserves the right to change dates and prices of courses.