Tetration Enablement
Description
FOR CISCO AND CISCO PARTNER TEAMS. Tetration Analytics is the platform that discovers and monitors your applications - enabling the Zero Trust Model. This two-day ILT course will introduce technical Sales Teams to Tetration, and prepare them to introduce it to their customers' networks. Students will discover, manage and monitor applications on a live lab environment. THIS CLASS IS DESIGNED FOR CISCO AND CISCO PARTNER TEAMS. A cisco.com or partner email address will be required for attendance.
Prerequisites
- Good grasp of networking concepts
- Knowledge of Firewall and Load Balancer Principles
- Fundamental Understanding of Network Protocols
- Familiarity with the Linux command line
Objectives
- Describe the components of Tetration Analytics
- Configure Tetration for use in a customer environment
- Install and manage hardware and software agents
- Conduct automated application dependency mapping
- Manage and enforce application policies on a live network
- Descibe how to integrate Tetration telemetry with operational systems
- Understand how to position and sell Tetration solutions
Target Audience
- Technical Sales Teams
- Network Engineers
- Systems Engineers
- Solution Architects
- Systems Integrators
- Application Owners
- Data Center & Cloud Infrastructure Engineers
- Network Engineers
- DevOps Teams
Duration
Two days
Delivery
Instructor Led Training
Course Type
- Lecture + Hands-on Lab
- In-Person Delivery
- Live via WebEx
Course Outline
- Introduction
- Tetration Overview
Lab 0 Accessing the Lab
Lab 1 Tetration Overview with Security Dashboard - Workload Protection Solution Architecture
Lab 2 Explore Application & Policy - Planning and Deployment
Lab 3 Software Agent Installation - Application Dependency Mapping
Lab 4 Whitelist Policy Creation using ADM with Software Agents - Tetration Platform Monitoring
- Whitelist Policy Enhancement
Lab 5 Segmentation Compliance with Policy - Whitelist Policy Analysis
Lab 6 Compliance Analysis & Policy Change Request - Prevention - Before the Attacks
Lab 7 Identifying Malware & Vulnerable Hosts
Lab 8 Minimizing Attack Surfaces - Quarantine and Remediation
Lab 9 Vulnerability Quarantine and Remediation - Detection - During the Attacks
Lab 10 Identifying Network Anomalies
Lab11 Attack Detection and Quarantine - Remediation - After the Attacks
Lab 12 Security Forensics - Alerts & External Integrations
- Positioning & Competitive
99 Tetration Implementation Review