Over

155,000

Africa & Middle East

7Days 10.00 A.M - 10.00 P.M

Call us

Enquire Now



ITShare is proud to be an authorized Cisco Partner. Cisco Systems, Inc. is the worldwide leader in networking. Cisco has shaped the future of the internet by transforming how people connect, communicate and collaborate. Today, networks are an essential part of business, education, government and home communications, and Cisco Internet Protocol-based (IP) networking solutions are the foundation of these networks. Cisco hardware, software, and service offerings are used to create Internet solutions that allow individuals, companies, and countries to increase productivity, improve customer satisfaction and strengthen competitive advantage.

Securing the Web with Cisco Web Security Appliance (SWSA 300-725) – 2020 Version


by pallvi
Free
0 Lessons
0 Students

Overview

Securing the Web with Cisco Web Security Appliance (SWSA 300-725) training course enables you how to implement, use, and maintain Cisco® Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a blend of master guidance and hands-on training, you will figure out how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution’s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more.
Audience:
  • Security Architects
  • System Designers
  • Network Administrators
  • Operations Engineers
  • Network Managers
  • Security Technicians
  • Cisco Integrators and Partners


This course prepares you for Exam 70-778. Download Course Contents

Course Prerequisites
  • TCP/IP services, including Domain Name System (DNS), Secure Shell (SSH), FTP, Simple Network Management Protocol (SNMP), HTTP, & HTTPS
  • IP routing

After completion of this course, you will be able to:

  • Describe Cisco WSA
  • Deploy proxy services
  • Utilize authentication
  • Describe decryption policies to control HTTPS traffic
  • Understand differentiated traffic access policies & identification profiles
  • Enforce acceptable use control settings
  • Defend against malware
  • Describe data security & data loss prevention
  • Perform administration & troubleshooting

Lessons

APPLY TO COURSE

Sum the simple Operation :
14 + 5 =