Securing the Web with Cisco Web Security Appliance (SWSA) v3.0

Live Online (VILT) & Classroom Corporate Training Course

cisco-logo

Master Cisco Web Security Appliance (SWSA) with our comprehensive v3.0 training course. Learn to deploy, configure, and troubleshoot Cisco WSA to enhance your organization's web security.

How can we help you?

  • CloudLabs
  • Projects
  • Assignments
  • 24x7 Support
  • Lifetime Access

Securing the Web with Cisco Web Security Appliance (SWSA) v3.0

Overview

The Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course is a comprehensive training program designed for network, security, and systems engineers involved in managing the Cisco Web Security Appliance. This course equips learners with the skills and knowledge to implement, use, and maintain Cisco WSA solutions, and integrates with other Cisco security technologies such as Cisco ISE and Splunk. Participants will explore Cisco WSA features, proxy services, authentication, HTTPS traffic decryption policies, malware defense, data loss prevention, and more, gaining hands-on experience through practical lab exercises.

Objectives

By the end of this course, leaner will be able to:

  • Implement and configure Cisco Web Security Appliance (WSA) solutions.
  • Integrate Cisco WSA with other Cisco security technologies like Cisco ISE and Splunk.
  • Configure and manage proxy services and authentication on Cisco WSA.
  • Develop and implement HTTPS traffic decryption policies.
  • Utilize Cisco WSA for malware defense, acceptable use control settings, and data loss prevention.

Prerequisites

  • Basic understanding of networking concepts.
  • Familiarity with TCP/IP protocol suite.
  • Basic knowledge of security concepts.
  • Understanding of common internet protocols.
  • Experience with Cisco network devices is beneficial but not required.

Course Outline

Module 1: Introduction to Cisco Web Security Appliance (WSA)2024-05-19T20:25:01+05:30
  • Overview of Cisco WSA
  • Deployment scenarios
Module 2: Configuring Proxy Services and Authentication2024-05-19T20:26:04+05:30
  • Setting up proxy services
  • Implementing user authentication
Module 3: HTTPS Traffic Decryption Policies2024-05-19T20:27:09+05:30
  • Configuring HTTPS decryption policies
  • Managing certificate authorities
Module 4: Malware Defense and Acceptable Use Controls2024-05-19T20:27:51+05:30
  • Setting up malware defense mechanisms
  • Configuring acceptable use policies
Module 5: Data Loss Prevention and Administration2024-05-19T20:28:39+05:30
  • Implementing data loss prevention strategies
  • Administrative tasks and best practices
2024-05-21T21:47:54+05:30

Title

Go to Top