<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=4393876&amp;fmt=gif">
Skip to content

CSW Implementation Training Overview

FOR CUSTOMERS & END-USERS. CSW Analytics is the platform that discovers and monitors your applications - enabling the Zero Trust Model. This course will introduce Engineers and Operators to CSW, and prepare them to implement it in their own networks. Students will discover, manage and monitor applications on a live lab environment.

CSW Implementation Prerequisites

  • Good grasp of networking concepts
  • Knowledge of Firewall and Load Balancer Principles
  • Fundamental Understanding of Network Protocols
  • Familiarity with the Linux command line

     

     
CSW IMPLEMENTATION TRAINING

Get In Touch

CSW Implementation Objectives

  • Describe the components of CSW
  • Configure CSW for use in a customer environment
  • Install and manage hardware and software agents
  • Conduct automated application dependency mapping
  • Manage and enforce application policies on a live network
  • Describe how to integrate CSW telemetry with operational systems

TARGET AUDIENCE

  • Network Engineers
  • Systems Engineers
  • Solution Architects
  • Systems Integrators

     

     
  • Application Owners
  • Data Center & Cloud Infrastructure Engineers
  • Network Engineers
  • DevOps Teams

     

     

Delivery : Instructor Led Training

Type: Lecture + Hands-On Lab, In-Person Delivery, Live via WebEx 

COURSE OUTLINE

Module 1: Introduction

Module 2: CSW Overview

  • Lab 0: Accessing the Lab
  • Lab 1: CSW Overview with Security Dashboard

Module 3:

  • Architecture Overview
  • Data Collection
  • Analytics Engine
  • Open Access

Module 4: Planning and Development

  • Create Scopes, Roles, Users
  • Sensor Types and Uses
  • Lab 2: Software Agent Installation

Module 5: Application Dependency Mapping

  • Overview
  • Analysis
  • Use Cases
  • Lab 3: Segmentation Compliance with Policy

Module 6: Whitelist Policy Enforcement

  • Policy Today
  • Capturing Intent
  • Rules and Enforcement
  • Policy Simulation & Compliance
  • Lab 4: Segmentation Compliance with Policy

Module 7: Whitelist Policy Analysis

  • Overview
  • Enable Policy Analysis
  • Live Policy Analysis
  • Backdated Policy Experiments
  • Quick Policy Analysis
  • Lab 5: Segmentation Compliance Analysis

Module 8: Network Performance Monitoring and Diagnostics

Module 9: Prevention - Before the Attacks

  • Lab 6: Identifying Malware & Vulnerable Hosts
  • Lab 7: Minimizing Attack Surfaces

Module 10: Quarantine and Remediation

  • Lab 8: Vulnerability Quarantine and Remediation

Module 11: Detection - During the Attacks

  • Lab 9: Identifying Data Leaks
  • Lab 10: Attack Detection and Quarantine

Module 12: Remediation - After the Attacks

  • Lab 11: Security Forensics

Module 13: CSW Platform Monitoring

Module 14: Alerts & External Integrations

  • CSW Overview
  • User Apps

Module 15: CSW Implementation Review