(Click Category to List Courses)
38 - IT-N Information Technology - Networking
IT-N 325 - Cisco Stealthwatch for Security Operations (SSO) (2 Days)
Code | Start Date | Duration | Venue | |
---|---|---|---|---|
IT-N 325 | 01 May 2023 | 2 Days | Istanbul | Registration Form Link |
IT-N 325 | 19 June 2023 | 2 Days | Istanbul | Registration Form Link |
IT-N 325 | 21 August 2023 | 2 Days | Istanbul | Registration Form Link |
IT-N 325 | 16 October 2023 | 2 Days | Istanbul | Registration Form Link |
IT-N 325 | 11 December 2023 | 2 Days | Istanbul | Registration Form Link |
Course Description
This course focuses on using Cisco Stealthwatch Enterprise from the perspective of a security analyst. The overarching goal of the course is to use the Stealthwatch System to investigate potential security issues and make initial determinations on whether to proceed with a more thorough investigation or to move on to the next potential threat.
Course Objectives
- Describe how the Stealthwatch System provides network visibility through monitoring and detection.
- Describe the goals of using Stealthwatch in the proactive and operational modes.
- Define basic concepts of investigation and detection of potential security issues using the Stealthwatch System.
- Complete workflows to identify indicators of compromise in your network.
- Describe alarm types and alarm notification within Stealthwatch.
- Explain the utility of maps in the Stealthwatch System.
- Describe how the Stealthwatch System contributes to successful incident handling.
Who Should Attend?
- Security analysts
- Individuals who are responsible for using Stealthwatch to monitor security policy
Course Details/Schedule
Day 1
- Stealthwatch
- Cisco Stealthwatch Security Overview
- Introduction to Security
- Stealthwatch in the Proactive Mode
- Using Stealthwatch in the Proactive Mode
- Pattern Recognition
- Investigation and Detection Using Stealthwatch
Day 2
Using Stealthwatch in the Operational Mode
- Stealthwatch in the Operational Mode
- Alarms and Alarm Response
- Maps
- Host Identification
- Culminating Scenario: Using Stealthwatch for Insider Threats
- Putting Together an Incident Response Process
- Example Workflow for Incident Response
- Security Best Practices in Stealthwatch
- Outcomes