Cisco Stealthwatch: Look Deep Into Networks
Scan and mitigate attacks
Course Description
Detect attacks across the dynamic network with high-fidelity alerts enriched with contexts such as user, device, location, timestamp, and application. Analyze encrypted traffic for threats and compliance, without decryption. Quickly detect unknown malware, insider threats like data exfiltration, policy violations, and other sophisticated attacks using advanced analytics. Store telemetry data for long periods for forensic analysis. Define smarter segmentation policies without disrupting the business. Create custom alerts to detect any unauthorized access and ensure compliance. Use Secure Network Analytics with Identity Services Engine (ISE) to enforce policies and contain threats.
Challenges:
Protecting a variety of sensitive member data and financial assets
Being able to prove audit requirements and ensure other internal business and security policies are being enforced
Monitor a distributed network spread across 22 branches and multiple ATM locations
Maintaining a first-class security strategy and infrastructure with a lean team
Solutions:
● Secure Network Analytics (Stealthwatch)
● Identity Services Engine (ISE)
● Secure Firewall (Firepower)
● Secure Endpoint (AMP for Endpoints)
● Umbrella
● Secure Email (Cloud Email Security)
● AnyConnect
● Secure Malware Analytics (Threat Grid)
Results
● Unprecedented threat visibility with actionable alerts infused with context
● Ability to easily prove audit requirements like cryptographic compliance, and to monitor for any business or security policy violations with custom alerts
● Achieved automated detection and response across the network, endpoints, and web, and extended investments with an integrated security architecture
● Transitioned to a remote workforce without compromising on security and infrastructure uptime
Who this course is for:
- security specialist, security auditors, cybersecurity specialist, network engineers, system engineers, security admins
Goals
What will you learn in this course:
Scanning networking with Stealthwatch
Defending Organization with Stealthwatch
Mitigating cyberattacks with stealth watch
Policies to get notified when breached
Prerequisites
What are the prerequisites for this course?
CCNA

Curriculum
Check out the detailed breakdown of what’s inside the course
Introduction
16 Lectures
-
Introduction to Cisco Stealthwatch Technology 42:53 42:53
-
Stealthwatch Installation 01:00:18 01:00:18
-
Stealthwatch GUI 15:29 15:29
-
Configure Router For NetFlow Collector Part -1 19:24 19:24
-
Configure Router For NetFlow Collector Part -2 08:41 08:41
-
Edit Config of SMC 37:08 37:08
-
Configure Policies on Stealthwatch 40:30 40:30
-
Install Applications in Stealthwatch 04:54 04:54
-
AD integration with Stealthwatch Config 04:57 04:57
-
Configure SMC with Java Client 29:17 29:17
-
Configuring Host Policy with Java Client 12:27 12:27
-
NetFlow Collector Packet Capture 08:27 08:27
-
PxGrid Introduction 21:00 21:00
-
PxGrid Certificate Template 03:44 03:44
-
PxGrid LAB 44:25 44:25
-
Resources
Instructor Details

moiz
I am specialized in cisco products and currently working as service support consultant. I do provide advice to the organization in designing networks. My hobbies are to read technology books specially the cisco ones and listen to music. I am very fond of technology so always will be installing and configuring the device in my lab environment and try to explain professional with real life designing configuration.
Course Certificate
User your certification to make a career change or to advance in your current career. Salaries are among the highest in the world.

Our students work
with the Best


































Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe now
Online Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now