SSO-Cisco Stealthwatch for Security Course Details:

The overarching goal of the course is to use the Cisco Stealthwatch System to investigate potential security issues and make initial determinations of whether to proceed with a more thorough investigation or to move on to the next potential threat.

    Jul 12 2022

    Date: 07/12/2022 - 07/13/2022 (Tuesday - Wednesday) | 9:00 AM - 5:00 PM (EST)
    Location: ONLINE (Virtual Classroom Live)
    Delivery Format: VIRTUAL CLASSROOM LIVE Request Quote & Enroll

    Success! Your message has been sent to us.
    Error! There was an error sending your message.
    REQUEST MORE INFO:

    SSO-Cisco Stealthwatch for Security

    July 12 - 13, 2022 | 9:00 AM - 5:00 PM (EST) | Virtual Classroom Live


    How Did You Hear of Global IT Training?

    Join Our Email List?

    Aug 9 2022

    Date: 08/09/2022 - 08/10/2022 (Tuesday - Wednesday) | 10:00 AM - 6:00 PM (EST)
    Location: ONLINE (Virtual Classroom Live)
    Delivery Format: VIRTUAL CLASSROOM LIVE Request Quote & Enroll

    Success! Your message has been sent to us.
    Error! There was an error sending your message.
    REQUEST MORE INFO:

    SSO-Cisco Stealthwatch for Security

    August 9 - 10, 2022 | 10:00 AM - 6:00 PM (EST) | Virtual Classroom Live


    How Did You Hear of Global IT Training?

    Join Our Email List?

    Sep 15 2022

    Date: 09/15/2022 - 09/16/2022 (Thursday - Friday) | 12:00 PM - 8:00 PM (EST)
    Location: ONLINE (Virtual Classroom Live)
    Delivery Format: VIRTUAL CLASSROOM LIVE Request Quote & Enroll

    Success! Your message has been sent to us.
    Error! There was an error sending your message.
    REQUEST MORE INFO:

    SSO-Cisco Stealthwatch for Security

    September 15 - 16, 2022 | 12:00 PM - 8:00 PM (EST) | Virtual Classroom Live


    How Did You Hear of Global IT Training?

    Join Our Email List?

Day One

  • Course Introduction
  • Cisco Stealthwatch Security Course Overview
  • Introduction to Security
  • Using Stealthwatch in the Proactive Mode
  • Pattern Recognition
  • Investigation and Detection Using Stealthwatch
  • Lab: Using Top Reports and Flow Tables for Detection
  • Lab: Creating and Using Dashboards for Detection
  • Lab: Creating Custom Security Events
  • Lab: Proactive Investigation Practice

 

Day Two

  • Day One Review
  • Using Stealthwatch in the Operational Mode
  • Alarms and Alarm Response
  • Lab: Responding to Alarms
  • Maps
  • Lab: Using Maps for Incident Response
  • Host Identification
  • Lab: Identify Hosts Using Host Snapshot and Host Report
  • Culminating Scenario: Using Stealthwatch for Insider Threats
  • Security Best Practices in Stealthwatch
  • Cisco Stealthwatch Security Course Outcomes
  • Course Conclusion

*Please Note: Course Outline is subject to change without notice. Exact course outline will be provided at time of registration.

After taking this course, you should be able to:

  • Explain what Cisco Stealthwatch is and how it works.
  • Describe the goals of using Cisco Stealthwatch in the proactive and operational modes.
  • Define basic concepts of investigation and detection of potential security issues using the Cisco Stealthwatch System.
  • Complete workflows to identify indicators of compromise in your network.
  • Describe alarm types and alarm notification within Cisco Stealthwatch.
  • Explain the utility of maps in the Cisco Stealthwatch System.
  • Describe how the Cisco Stealthwatch System contributes to successful incident handling
  • Flow Basics
  • Cisco Stealthwatch Overview and Components
  • Cisco Stealthwatch SMC Client Interface Overview
  • Cisco Stealthwatch Web App Overview

After taking this course, you should be able to:

  • Explain what Cisco Stealthwatch is and how it works.
  • Describe the goals of using Cisco Stealthwatch in the proactive and operational modes.
  • Define basic concepts of investigation and detection of potential security issues using the Cisco Stealthwatch System.
  • Complete workflows to identify indicators of compromise in your network.
  • Describe alarm types and alarm notification within Cisco Stealthwatch.
  • Explain the utility of maps in the Cisco Stealthwatch System.
  • Describe how the Cisco Stealthwatch System contributes to successful incident handling

Ready to Jumpstart Your IT Career?

CONTACT US NOW!