Cisco Stealthwatch: Look Deep Into Networks

person icon Moiz

Cisco Stealthwatch: Look Deep Into Networks

Scan and mitigate attacks

updated on icon Updated on Sep, 2023

language icon Language - English

person icon Moiz

architecture icon IT & Software,Network & Security,Network Security


30-days Money-Back Guarantee

Training 5 or more people ?

Get your team access to 19,000+ top Tutorialspoint courses anytime, anywhere.

Course Description

Detect attacks across the dynamic network with high-fidelity alerts enriched with contexts such as user, device, location, timestamp, and application. Analyze encrypted traffic for threats and compliance, without decryption. Quickly detect unknown malware, insider threats like data exfiltration, policy violations, and other sophisticated attacks using advanced analytics. Store telemetry data for long periods for forensic analysis. Define smarter segmentation policies without disrupting the business. Create custom alerts to detect any unauthorized access and ensure compliance. Use Secure Network Analytics with Identity Services Engine (ISE) to enforce policies and contain threats.


Protecting a variety of sensitive member data and financial assets

Being able to prove audit requirements and ensure other internal business and security policies are being enforced

Monitor a distributed network spread across 22 branches and multiple ATM locations

Maintaining a first-class security strategy and infrastructure with a lean team


● Secure Network Analytics (Stealthwatch)

● Identity Services Engine (ISE)

● Secure Firewall (Firepower)

● Secure Endpoint (AMP for Endpoints)

● Umbrella

● Secure Email (Cloud Email Security)

● AnyConnect

● Secure Malware Analytics (Threat Grid)


● Unprecedented threat visibility with actionable alerts infused with context

● Ability to easily prove audit requirements like cryptographic compliance, and to monitor for any business or security policy violations with custom alerts

● Achieved automated detection and response across the network, endpoints, and web, and extended investments with an integrated security architecture

● Transitioned to a remote workforce without compromising on security and infrastructure uptime

Who this course is for:

  • security specialist, security auditors, cybersecurity specialist, network engineers, system engineers, security admins


What will you learn in this course:

  • Scanning networking with Stealthwatch

  • Defending Organization with Stealthwatch

  • Mitigating cyberattacks with stealth watch

  • Policies to get notified when breached


What are the prerequisites for this course?

  • CCNA

Cisco Stealthwatch: Look Deep Into Networks


Check out the detailed breakdown of what’s inside the course

16 Lectures
  • play icon Introduction to Cisco Stealthwatch Technology 42:53 42:53
  • play icon Stealthwatch Installation 01:00:18 01:00:18
  • play icon Stealthwatch GUI 15:29 15:29
  • play icon Configure Router For NetFlow Collector Part -1 19:24 19:24
  • play icon Configure Router For NetFlow Collector Part -2 08:41 08:41
  • play icon Edit Config of SMC 37:08 37:08
  • play icon Configure Policies on Stealthwatch 40:30 40:30
  • play icon Install Applications in Stealthwatch 04:54 04:54
  • play icon AD integration with Stealthwatch Config 04:57 04:57
  • play icon Configure SMC with Java Client 29:17 29:17
  • play icon Configuring Host Policy with Java Client 12:27 12:27
  • play icon NetFlow Collector Packet Capture 08:27 08:27
  • play icon PxGrid Introduction 21:00 21:00
  • play icon PxGrid Certificate Template 03:44 03:44
  • play icon PxGrid LAB 44:25 44:25
  • play icon Resources

Instructor Details



I am specialized in cisco products and currently working as service support consultant. I do provide advice to the organization in designing networks. My hobbies are to read technology books specially the cisco ones and listen to music. I am very fond of technology so always will be installing and configuring the device in my lab environment and try to explain professional with real life designing configuration.

Course Certificate

User your certification to make a career change or to advance in your current career. Salaries are among the highest in the world.

sample Tutorialspoint certificate

Our students work
with the Best

Related Video Courses

View More

Annual Membership

Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses

Subscribe now
People having fun around a laptop

Online Certifications

Master prominent technologies at full length and become a valued certified professional.

Explore Now
People having fun around a laptop

Talk to us