The Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement, use, and maintain Cisco Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you will learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more.
After taking the SWSA course, you should be able to:
Describing Cisco WSA
Deploying Proxy Services
Utilizing Authentication
Creating Decryption Policies to Control HTTPS Traffic
Understanding Differentiated Traffic Access Policies and Identification Profiles
Defending Against Malware
Enforcing Acceptable Use Control Settings
Data Security and Data Loss Prevention
Performing Administration and Troubleshooting
References
To fully benefit from this course, you should have knowledge of these topics:
The Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement, use, and maintain Cisco Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you will learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more.
After taking the SWSA course, you should be able to:
Describing Cisco WSA
Deploying Proxy Services
Utilizing Authentication
Creating Decryption Policies to Control HTTPS Traffic
Understanding Differentiated Traffic Access Policies and Identification Profiles
Defending Against Malware
Enforcing Acceptable Use Control Settings
Data Security and Data Loss Prevention
Performing Administration and Troubleshooting
References
To fully benefit from this course, you should have knowledge of these topics:
27 May - 30 May, 2024
24 Jun - 27 Jun, 2024
22 Jul - 25 Jul, 2024
19 Aug - 22 Aug, 2024
16 Sep - 19 Sep, 2024
14 Oct - 17 Oct, 2024
27 May - 28 May, 2024
24 Jun - 25 Jun, 2024
22 Jul - 23 Jul, 2024
19 Aug - 20 Aug, 2024
16 Sep - 17 Sep, 2024
14 Oct - 15 Oct, 2024
27 May - 30 May, 2024
24 Jun - 27 Jun, 2024
22 Jul - 25 Jul, 2024
19 Aug - 22 Aug, 2024
16 Sep - 19 Sep, 2024
14 Oct - 17 Oct, 2024
27 May - 29 May, 2024
24 Jun - 26 Jun, 2024
22 Jul - 24 Jul, 2024
19 Aug - 21 Aug, 2024
16 Sep - 18 Sep, 2024
14 Oct - 16 Oct, 2024