Course Overview
The Stealthwatch courses are available for Private on-sites only at this time. If you are interested in one or more of these courses or need a custom training class, please contact us at info@fastlaneus.com. All Stealthwatch courses accept CLCs as payment.
Who should attend
- Customers whose role is to complete the initial configuration of the Cisco Stealthwatch System into their network
- Channel partners responsible for completing the initial configuration of the Cisco Stealthwatch System into a customer network
- Employees responsible for completing the initial configuration of the Cisco Stealthwatch System into a customer network
Prerequisites
- Flow Basics
- Cisco Stealthwatch Overview and Components
- Cisco Stealthwatch SMC Web App Interface Overview
- Cisco Stealthwatch SMC Client Interface Overview
Course Objectives
Upon completing this course, you will be able to:
- Validate network configuration of Cisco Stealthwatch appliances
- Set base SMC configuration values
- Use SMC documents and reports, to determine if exporters are properly setup
- Use SMC documents and reports, to determine IP addresses that belong to your organization
- Properly place hosts into appropriate host groups
- Define services and applications
- Organize network devices into the BY Function host group
- Define basic concepts of policy management and apply policy to host groups
- Add Cisco Stealthwatch users with specific roles
- Create custom documents
- Establish response management rules, triggers and actions
Course Content
The Stealthwatch for System Administrators (SSA) two-day course focuses on a framework to follow for completing the initial configuration tasks required to get Stealthwatch up and running. These tasks include, but are not limited to, creating host groups and classifying services and applications found in the network. These critical initial configuration steps allow the Stealthwatch System to begin monitoring flows and network behavior and to provide customers with data they can use to determine next steps, such as what policies (tuning) need to be put in place for managing the amount of data presented.