TRAINING CATEGORIES
(Click Category to List Courses)

39 - IT-N Information Technology - Networking


IT-N 325 - Cisco Stealthwatch for Security Operations (SSO) (2 Days)

Code Start Date Duration Venue
IT-N 325 01 April 2024 2 Days Istanbul Registration Form Link
IT-N 325 06 May 2024 2 Days Istanbul Registration Form Link
IT-N 325 10 June 2024 2 Days Istanbul Registration Form Link
IT-N 325 15 July 2024 2 Days Istanbul Registration Form Link
IT-N 325 19 August 2024 2 Days Istanbul Registration Form Link
IT-N 325 23 September 2024 2 Days Istanbul Registration Form Link
IT-N 325 28 October 2024 2 Days Istanbul Registration Form Link
IT-N 325 02 December 2024 2 Days Istanbul Registration Form Link
Please contact us for fees

 

Course Description

This course focuses on using Cisco Stealthwatch Enterprise from the perspective of a security analyst. The overarching goal of the course is to use the Stealthwatch System to investigate potential security issues and make initial determinations on whether to proceed with a more thorough investigation or to move on to the next potential threat.

Course Objectives

  • Describe how the Stealthwatch System provides network visibility through monitoring and detection.
  • Describe the goals of using Stealthwatch in the proactive and operational modes.
  • Define basic concepts of investigation and detection of potential security issues using the Stealthwatch System.
  • Complete workflows to identify indicators of compromise in your network.
  • Describe alarm types and alarm notification within Stealthwatch.
  • Explain the utility of maps in the Stealthwatch System.
  • Describe how the Stealthwatch System contributes to successful incident handling.

Who Should Attend?

  • Security analysts
  • Individuals who are responsible for using Stealthwatch to monitor security policy

Course Details/Schedule

Day 1

  • Stealthwatch
  • Cisco Stealthwatch Security Overview
  • Introduction to Security
  • Stealthwatch in the Proactive Mode
  • Using Stealthwatch in the Proactive Mode
  • Pattern Recognition
  • Investigation and Detection Using Stealthwatch

Day 2

Using Stealthwatch in the Operational Mode

  • Stealthwatch in the Operational Mode
  • Alarms and Alarm Response
  • Maps
  • Host Identification
  • Culminating Scenario: Using Stealthwatch for Insider Threats
  • Putting Together an Incident Response Process
  • Example Workflow for Incident Response
  • Security Best Practices in Stealthwatch
  • Outcomes