(Click Category to List Courses)

38 - IT-N Information Technology - Networking


IT-N 325 - Cisco Stealthwatch for Security Operations (SSO) (2 Days)

Code Start Date Duration Venue Fees
IT-N 325 12 December 2020 2 Days Istanbul $ 1600 Registration Form Link
IT-N 325 09 January 2021 2 Days Istanbul $ 1600 Registration Form Link
IT-N 325 06 February 2021 2 Days Istanbul $ 1600 Registration Form Link
IT-N 325 06 March 2021 2 Days Istanbul $ 1600 Registration Form Link
IT-N 325 03 April 2021 2 Days Istanbul $ 1600 Registration Form Link
IT-N 325 01 May 2021 2 Days Istanbul $ 1600 Registration Form Link
IT-N 325 26 June 2021 2 Days Istanbul $ 1600 Registration Form Link
IT-N 325 24 July 2021 2 Days Istanbul $ 1600 Registration Form Link
IT-N 325 21 August 2021 2 Days Istanbul $ 1600 Registration Form Link
IT-N 325 18 September 2021 2 Days Istanbul $ 1600 Registration Form Link
IT-N 325 16 October 2021 2 Days Istanbul $ 1600 Registration Form Link
IT-N 325 13 November 2021 2 Days Istanbul $ 1600 Registration Form Link
IT-N 325 11 December 2021 2 Days Istanbul $ 1600 Registration Form Link
DOWNLOAD PDF

 

Course Description

This course focuses on using Cisco Stealthwatch Enterprise from the perspective of a security analyst. The overarching goal of the course is to use the Stealthwatch System to investigate potential security issues and make initial determinations on whether to proceed with a more thorough investigation or to move on to the next potential threat.

Course Objectives

  • Describe how the Stealthwatch System provides network visibility through monitoring and detection.
  • Describe the goals of using Stealthwatch in the proactive and operational modes.
  • Define basic concepts of investigation and detection of potential security issues using the Stealthwatch System.
  • Complete workflows to identify indicators of compromise in your network.
  • Describe alarm types and alarm notification within Stealthwatch.
  • Explain the utility of maps in the Stealthwatch System.
  • Describe how the Stealthwatch System contributes to successful incident handling.

Who Should Attend?

  • Security analysts
  • Individuals who are responsible for using Stealthwatch to monitor security policy

Course Details/Schedule

Day 1

  • Stealthwatch
  • Cisco Stealthwatch Security Overview
  • Introduction to Security
  • Stealthwatch in the Proactive Mode
  • Using Stealthwatch in the Proactive Mode
  • Pattern Recognition
  • Investigation and Detection Using Stealthwatch

Day 2

Using Stealthwatch in the Operational Mode

  • Stealthwatch in the Operational Mode
  • Alarms and Alarm Response
  • Maps
  • Host Identification
  • Culminating Scenario: Using Stealthwatch for Insider Threats
  • Putting Together an Incident Response Process
  • Example Workflow for Incident Response
  • Security Best Practices in Stealthwatch
  • Outcomes