Network Training - Course Details

SWSA-SWCWSA SWSA - Securing the Web with Cisco Web Security Appliance

Network Training Course Description:
In this comprehensive two-day course containing hands-on labs, demos, and presentations, you will learn to install, configure, operate, and maintain the S-Series web security appliances. You will focus on HTTP and HTTPS proxy services, L4 traffic monitoring, authentication and web access control, URL filtering, anti-malware filtering, troubleshooting S-Series configuration issues, and S-Series deployment. Hands-on labs provide you with a safe environment to experiment with malware and attempt configurations that might not be appropriate for a production network.
Network Training Course Duration:
2 DAYS
Network Training Course Target Audience:
Security architects and system designers,Network administrators and operations engineers,Network or security managers responsible for web security
Network Training Course Prerequisite:
Knowledge of TCP/IP services, including DNS, SSH, FTP, SNMP, HTTP, and HTTPS,Familiarity with IP routing,Familiarity with the Cisco IronPort S-Series Overview, or equivalent knowledge
Course Content:

  • 1. Product and Malware Overview

  • 2. S-Series

    • Key Features
    • Malware Threats

  • 3. L4TM Setup

    • L4TM Options

  • 4. Web Proxy

    • Proxy vs. L4TM

  • 5. HTTPS

    • Configuring the HTTPS Proxy Service Web Reputation Filtering

  • 6. WBRS

    • Updates Anti-Malware

  • 7. DVS

  • 8. Webroot

  • 9. MacAfee Scanning

    • Working with Webroot and McAfee

  • 10. Authentication

    • Configuring and Testing Web Security Manager

  • 11. Access Control

  • 12. L4TM Policies

  • 13. Configuring Web Security Manager

  • 14. Configuring the HTTPS Proxy Service

  • 15. Use Case Scenarios

    • System Administration
    • Reports

  • 16. System Administration Troubleshooting

    • Ports and Tools
    • Logs
    • Alerts

  • 17. Command Line Interface (CLI)

  • 18. SNMP

    • Monitoring Other Deployment Scenarios
    • Transparent Proxy Mode

  • 19. Deployment Life Cycle

    • Multi-Appliance Deployment

  • Lab 1: Deploying Proxy Services

  • Lab 2: Utilizing Authentication

  • Lab 3: Configuring WSA Policies

  • Lab 4: Enforcing Acceptable Use

  • Lab 5: Defending Against Malware

  • Lab 6: Data Security

  • Lab 7: Administrative Tasks

  • Lab 8: Troubleshooting