TETOPS - Introduction to Cisco Tetration Analytics™ Operations and Administration Course Details:

The TETOPS - Introduction to Cisco Tetration Analytics Operations and Administration course will familiarize and help you understand how the Cisco Tetration Analytics platform enables efficient data center operations by providing pervasive visibility, behavior-based application insight, and migration to a zero-trust model.

    No classes are currenty scheduled for this course.

    Call (919) 283-1653 to get a class scheduled online or in your area!

Module 1: Tetration Overview

  • Defining and Positioning Cisco Tetration Analytics
  • Telemetry
  • Platform
  • Intent-Based Policy
  • Machine Learning
  • Network Performance Monitoring and other Use Cases

Module 2: Tetration Components

  • Architecture
  • Data Collection
  • Sensors and Agents
  • Flow Collectors
  • Analytics Engine
  • Open Access

Module 3: Operational Concepts

  • Scopes
  • Tenants
  • RBAC
  • Annotations

Module 4: Tetration Setup and Deployment Models

  • On Premise Options
  • SaaS
  • Tetration-V
  • Installation Procedure
  • Creating Scopes, Roles, and Users
  • Deploy Hardware Sensors
  • Deploy NetFlow Sensors
  • Deploy ERSPAN Sensors

Module 5: Software Agents

  • Software Agents Overview
  • Software Agents Features
  • Software Agents Configuration

Module 6: Application Dependency Mapping

  • Why ADM?
  • Tetration Application Insight
  • ADM Process
  • ADM Run Results

Module 7: Cisco Tetration Analytics Policy Enforcement Overview

Module 8: Cisco Tetration Flow Search

  • Results Filtered by Scope
  • Searching with Conjunctions
  • Flow Explore Integrated
  • User Annotations

Module 9: Tetration Policy Analysis

  • Enable Policy Analysis
  • Live Policy Analysis
  • Backdated Policy Experiments
  • Quick Policy Analysis

Module 10: Tetration Apps and API

  • App Store
  • User Apps
  • Visualize Data Sources
  • Bring your own Data
  • OpenAPI

Module 11: Tetration Ecosystem

  • Platform Integrations
    • ADCs
    • FW Management Tools
    • Phantom
    • InfoBlox
    • ServiceNow
    • Splunk
    • Turbonomic
    • Veeam
  • Corvil and Extra Hop

*Please Note: Course Outline is subject to change without notice. Exact course outline will be provided at time of registration.
  • Enables pervasive visibility of traffic across data center infrastructure
  • Use long term data retention for forensics and analysis
  • Create communication and dependencies for all applications within the data center
  • Empower companies to create whitelist policy models
  • Identify behavior deviation in real time
  • Perform forensics operations
  1. Exploring the GUI
  2. Software Agent Installation
  3. Application Dependency Mapping with Agents
  4. Enforcement
  5. Flow Search
  6. Advanced ADM Run
  7. Policy Analysis
  • Familiarity with data center technologies
  • Familiarity with network operation
  • Understanding of basic network security
  • Channel Partners
  • Systems Architects
  • Network Architects
  • Network Engineers
  • Systems Engineers
  • Administrators

Ready to Jumpstart Your IT Career?

CONTACT US NOW!