CSW · Cisco Secure Workload

Cisco Secure Workload (CSW) Implementation

Hands-on training for engineers and operators implementing Cisco Secure Workload to deliver Zero Trust segmentation in production networks.

Section 01

Delivery & Format

Instructor-led training. Lecture plus hands-on lab.

  • On-site available
  • Virtual available
  • Hybrid available
  • Custom modules
Section 02

Objectives

What students take away from the course.

  • 01Understand the components and architecture of the CSW platform
  • 02Configure platform foundations and prepare environments for production
  • 03Deploy and manage CSW agents across operating systems
  • 04Run application dependency mapping and validate findings with stakeholders
  • 05Author, attest, and lifecycle-manage policy from intent to enforcement
  • 06Integrate CSW with existing security and network operations workflows
Section 03

Prerequisites

What students should arrive with.

  • Working knowledge of TCP/IP networking
  • Familiarity with firewall concepts and rule structures
  • Comfort with common application protocols
  • Basic Linux command-line experience
Section 04

Who benefits from this training

Roles and teams that get the most value.

  • Network engineers responsible for segmentation
  • Security architects designing Zero Trust
  • Application owners involved in policy attestation
  • DevOps engineers integrating policy into CI/CD
  • SOC analysts reviewing CSW telemetry
  • Platform engineers operating CSW day to day
  • Compliance leads producing audit evidence
  • Project managers running CSW deployments
Section 05

Course outline

Modules covered. Lab content and pacing tailored during scoping.

  1. 01
    Platform foundations
    • Architecture
    • Components
    • Deployment models
  2. 02
    Environment preparation
    • Infrastructure readiness
    • Identity integration
  3. 03
    Agent deployment
    • Operating systems
    • Tagging
    • Health monitoring
  4. 04
    Application dependency mapping
    • Discovery patterns
    • Validation
  5. 05
    Policy authoring
    • Intent to rule
    • Hierarchies
  6. 06
    Attestation workflows
    • Owner sign-off
    • Audit-grade trails
  7. 07
    Enforcement
    • Monitor-only
    • Reversible cutovers
    • Multi-point enforcement
  8. 08
    Operational reviews
    • Drift detection
    • Lifecycle management
  9. 09
    Integrations
    • SOC tooling
    • Change management
  10. 10
    Hands-on labs (multiple)
    • Real environments
    • Take-home patterns
Registration

Register interest in this training.

A BTA Account Manager will reach out within one business day to confirm scheduling, format (on-site, virtual, or hybrid), and pricing for your team.

  • Public, private, on-site, virtual, and hybrid formats available
  • Custom modules tailored to your environment and goals
  • Or email sales@gobta.com to talk directly

By submitting, you agree to BTA contacting you about this inquiry. See our privacy notice.

Training · FAQ

Common questions about this training.

If something isn't covered here, the registration form is the fastest way to get a direct answer.

  • Do students need access to a real CSW environment?

    No. The course runs against a BTA-hosted lab environment. Take-home patterns can be applied in your own environment afterwards.
  • How is this training delivered?

    On-site, virtual, or hybrid. Public classes follow a published calendar. Private classes are scheduled with your team.
  • Can the training be customized to our environment?

    Yes. Modules and lab content can be adjusted during scoping to align with your current platforms and goals.
  • What is the cancellation policy?

    Public classes require 2 weeks notice. Private classes require 4 weeks notice.
  • How do we register?

    Use the registration form on this page. Your BTA Account Manager will follow up to confirm scheduling, format, and pricing.