Cisco/TETADV - Tetration Firewall Enforcement Agents, Data Flow Mapping, and Advanced Policy Deployment

TETADV - Tetration Firewall Enforcement Agents, Data Flow Mapping, and Advanced Policy Deployment Certification Training Course Overview

TETADV, Tetration Firewall Enforcement Agents, Data Flow Mapping, and Advanced Policy Deployment is a 5-day course exploring telemetry data, the flows corpus, and how Cisco Tetration Analytics™ Firewall Agent provides enforcement. This course will provide the details and hands-on activities necessary to successfully deploy, manage, and troubleshoot firewall policies in Cisco Tetration.

Target Audience:

This course is meant for :

  •    Channel Partners
  •    Systems Architects
  •     Network Architects
  •    Network Engineers
  •    Systems Engineers
  •    Administrators

Learning Objectives

Upon completion of this course, you will learn to:

  • Describe how the Cisco Tetration Firewall Agent works to enforce security policy
  • Describe how to deploy the Cisco Tetration Firewall Agent
  • Describe how to Manage and Troubleshoot Cisco Tetration Firewall Agent policies
  • Review administrative and management tasks necessary to operate, support and manage Tetration
  • Describe how Tetration telemetry data is utilized in the Flows Corpus
  • Construct effective policies based on discovered flows and Application Dependency Mapping (ADM)

TETADV - Tetration Firewall Enforcement Agents, Data Flow Mapping, and Advanced Policy Deployment (40 Hours) Download Course Contents

Live Virtual Classroom Fee For Both Group Training & 1-on-1 Training On Request
Group Training
02 - 06 Aug 09:00 AM - 05:00 PM CST
(8 Hours/Day)

06 - 10 Sep 09:00 AM - 05:00 PM CST
(8 Hours/Day)

1-on-1 Training (GTR)
4 Hours
8 Hours
Week Days
Week End

Start Time : At any time

12 AM
12 PM

GTR=Guaranteed to Run
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request
Special Solutions for Corporate Clients! Click here Hire Our Trainers! Click here

Course Modules

Module 1: Cisco Tetration Firewall Agent
  • How the Cisco Tetration Firewall Agent Enforces Firewall Rules
  • Deploying and Managing Linux Enforcement Agents
  • Deploying and Managing Windows Enforcement Agents
  • Deploying and Managing AIX Enforcement Agents
Module 2: Tetration Enforcement Agent Components, Messaging, and Interaction
  • Enforcement Front End
  • Firewall and Catch-all Rules
  • The Preserve Rules Option
  • Agent Config Intents
  • Stateful Enforcement
Module 3: Tetration Enforcement Agent UI Configurations and Troubleshooting
  • Agent UI Configuration
  • Monitoring Agents
  • Platform Specific Enforcement Features and Requirements
  • Known Limitations
  • Troubleshooting Inbound and Outbound Firewall Rules
Module 4: Tetration Secure Connector, Edge and Ingest Appliances
  • Tetration Secure Connector Overview
  • Tetration Secure Connector features and configuration
  • Tetration Edge Appliance Overview
  • Tetration Edge Appliance configuration
  • Tetration Ingest Appliance Overview
  • Tetration Ingest appliance features and configurations
Module 5: Application Dependency Mapping
  • Application Management Workflow Cycle
  • Tetration Application Insight
  • ADM Process
  • ADM Run Results
  • Cluster Confidence
Module 6: Tetration Policy Analysis
  • Enable Policy Analysis
  • Live Policy Analysis
  • Backdated Policy Experiments
  • Quick Policy Analysis
  • Diagnosis Using Policy Analysis
Module 7: Cisco Tetration Analytics Policy Enforcement Overview
  • Policy Global Ordering & Conflict Resolution
  • Scope Priorities
  • Troubleshooting Policy Enforcement
Module 8: Cisco Tetration Flow Search
  • Understanding the Flow Corpus
  • Using Scopes to Filter Results
  • Searching with Conjunctions
  • Correlating Flow Data with Hosts and Processes
  • Leveraging Annotations
Module 9: Using Tetration Forensics
  • Forensic Signals
  • Configuring Forensics
  • Forensics Visualization and Alerts
  • ForensicsScoring
  • Network and Process Hash Anomaly Detection
Module 10: Tetration Apps and API
  • App Store
  • User Apps
  • Visualize Data Sources
  • Bring your own Data
  • OpenAPI
Module 11: Labs
  • Cisco Tetration GUI Familiarization
  • Software Agent Installation
  • Importing Context Data
  • Scopes
  • Application Dependency Mapping with Agents
  • Implementing Policy
  • Policy Enforcement and Compliance
  • Workload Security
  • Secure Connector, Edge and Ingest Appliances
Download Course Contents

Request More Information

Course Prerequisites

The knowledge and skills that the learner should have before attending this course are as follows:

  • Knowledge of cloud and (virtual) data center architecture or cloud basic networking concepts
  • Familiarity with Cisco basic networking security concepts and application security concepts
  • High-level familiarity with basic telemetry protocols and Big Data analytics