<\/div>\n<\/div>\n
[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ _builder_version=\u00bb4.4.0″ custom_margin=\u00bb1px|||||\u00bb][et_pb_row _builder_version=\u00bb4.4.0″][et_pb_column type=\u00bb4_4″ _builder_version=\u00bb4.4.0″]
\n[et_pb_text content_tablet=\u00bb\u00bb]<\/p>\n
Temario<\/h2>\n
Describing Cisco WSA<\/p>\n
Technology Use Case
\nCisco WSA Solution
\nCisco WSA Features
\nCisco WSA Architecture
\nProxy Service
\nIntegrated Layer 4 Traffic Monitor
\nData Loss Prevention
\nCisco Cognitive Intelligence
\nManagement Tools
\nCisco Advanced Web Security Reporting (AWSR) and Third-Party Integration
\nCisco Content Security Management Appliance (SMA)
\nDeploying Proxy Services<\/p>\n
Explicit Forward Mode vs. Transparent Mode
\nTransparent Mode Traffic Redirection
\nWeb Cache Control Protocol
\nWeb Cache Communication Protocol (WCCP) Upstream and Downstream Flow
\nProxy Bypass
\nProxy Caching
\nProxy Auto-Config (PAC) Files
\nFTP Proxy
\nSocket Secure (SOCKS) Proxy
\nProxy Access Log and HTTP Headers
\nCustomizing Error Notifications with End User Notification (EUN) Pages
\nUtilizing Authentication<\/p>\n
Authentication Protocols
\nAuthentication Realms
\nTracking User Credentials
\nExplicit (Forward) and Transparent Proxy Mode
\nBypassing Authentication with Problematic Agents
\nReporting and Authentication
\nRe-Authentication
\nFTP Proxy Authentication
\nTroubleshooting Joining Domains and Test Authentication
\nIntegration with Cisco Identity Services Engine (ISE)
\nCreating Decryption Policies to Control HTTPS Traffic<\/p>\n
Transport Layer Security (TLS)\/Secure Sockets Layer (SSL) Inspection Overview
\nCertificate Overview
\nOverview of HTTPS Decryption Policies
\nActivating HTTPS Proxy Function
\nAccess Control List (ACL) Tags for HTTPS Inspection
\nAccess Log Examples
\nUnderstanding Differentiated Traffic Access Policies and Identification Profiles<\/p>\n
Overview of Access Policies
\nAccess Policy Groups
\nOverview of Identification Profiles
\nIdentification Profiles and Authentication
\nAccess Policy and Identification Profiles Processing Order
\nOther Policy Types
\nAccess Log Examples
\nACL Decision Tags and Policy Groups
\nEnforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications
\nDefending Against Malware<\/p>\n
Web Reputation Filters
\nAnti-Malware Scanning
\nScanning Outbound Traffic
\nAnti-Malware and Reputation in Policies
\nFile Reputation Filtering and File Analysis
\nCisco Advanced Malware Protection
\nFile Reputation and Analysis Features
\nIntegration with Cisco Cognitive Intelligence
\nEnforcing Acceptable Use Control Settings<\/p>\n
Controlling Web Usage
\nURL Filtering
\nURL Category Solutions
\nDynamic Content Analysis Engine
\nWeb Application Visibility and Control
\nEnforcing Media Bandwidth Limits
\nSoftware as a Service (SaaS) Access Control
\nFiltering Adult Content
\nData Security and Data Loss Prevention<\/p>\n
Data Security
\nCisco Data Security Solution
\nData Security Policy Definitions
\nData Security Logs
\nPerforming Administration and Troubleshooting<\/p>\n
Monitor the Cisco Web Security Appliance
\nCisco WSA Reports
\nMonitoring System Activity Through Logs
\nSystem Administration Tasks
\nTroubleshooting
\nCommand Line Interface
\nLabs:<\/p>\n
Lab 1: Configure the Cisco Web Security Appliance
\nLab 2: Deploy Proxy Services
\nLab 3: Configure Proxy Authentication
\nLab 4: Configure HTTPS Inspection
\nLab 5: Create and Enforce a Time\/Date-Based Acceptable Use Policy
\nLab 6: Configure Advanced Malware Protection
\nLab 7: Configure Referrer Header Exceptions
\nLab 8: Utilize Third-Party Security Feeds and MS Office 365 External Feed
\nLab 9: Validate an Intermediate Certificate
\nLab 10: View Reporting Services and Web Tracking
\nLab 11: Perform Centralized Cisco AsyncOS Software Upgrade Using Cisco SMA
\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ _builder_version=\u00bb4.4.0″ background_color=\u00bb#032b35″][et_pb_row _builder_version=\u00bb4.4.0″][et_pb_column type=\u00bb4_4″ _builder_version=\u00bb4.4.0″][et_pb_contact_form captcha=\u00bboff\u00bb title=\u00bbSolicita informaci\u00f3n del curso\u00bb submit_button_text=\u00bbSolicitar informaci\u00f3n ahora\u00bb _builder_version=\u00bb4.4.0″ title_text_color=\u00bb#ffffff\u00bb title_font_size=\u00bb30px\u00bb][et_pb_contact_field field_id=\u00bbName\u00bb field_title=\u00bbNombre\u00bb _builder_version=\u00bb3.16″ button_text_size__hover_enabled=\u00bboff\u00bb button_one_text_size__hover_enabled=\u00bboff\u00bb button_two_text_size__hover_enabled=\u00bboff\u00bb button_text_color__hover_enabled=\u00bboff\u00bb button_one_text_color__hover_enabled=\u00bboff\u00bb button_two_text_color__hover_enabled=\u00bboff\u00bb button_border_width__hover_enabled=\u00bboff\u00bb button_one_border_width__hover_enabled=\u00bboff\u00bb button_two_border_width__hover_enabled=\u00bboff\u00bb button_border_color__hover_enabled=\u00bboff\u00bb button_one_border_color__hover_enabled=\u00bboff\u00bb button_two_border_color__hover_enabled=\u00bboff\u00bb button_border_radius__hover_enabled=\u00bboff\u00bb button_one_border_radius__hover_enabled=\u00bboff\u00bb button_two_border_radius__hover_enabled=\u00bboff\u00bb button_letter_spacing__hover_enabled=\u00bboff\u00bb button_one_letter_spacing__hover_enabled=\u00bboff\u00bb button_two_letter_spacing__hover_enabled=\u00bboff\u00bb button_bg_color__hover_enabled=\u00bboff\u00bb button_one_bg_color__hover_enabled=\u00bboff\u00bb button_two_bg_color__hover_enabled=\u00bboff\u00bb][\/et_pb_contact_field][et_pb_contact_field field_id=\u00bbEmail\u00bb field_title=\u00bbDirecci\u00f3n de correo electr\u00f3nico\u00bb field_type=\u00bbemail\u00bb _builder_version=\u00bb3.16″ button_text_size__hover_enabled=\u00bboff\u00bb button_one_text_size__hover_enabled=\u00bboff\u00bb button_two_text_size__hover_enabled=\u00bboff\u00bb button_text_color__hover_enabled=\u00bboff\u00bb button_one_text_color__hover_enabled=\u00bboff\u00bb button_two_text_color__hover_enabled=\u00bboff\u00bb button_border_width__hover_enabled=\u00bboff\u00bb button_one_border_width__hover_enabled=\u00bboff\u00bb button_two_border_width__hover_enabled=\u00bboff\u00bb button_border_color__hover_enabled=\u00bboff\u00bb button_one_border_color__hover_enabled=\u00bboff\u00bb button_two_border_color__hover_enabled=\u00bboff\u00bb button_border_radius__hover_enabled=\u00bboff\u00bb button_one_border_radius__hover_enabled=\u00bboff\u00bb button_two_border_radius__hover_enabled=\u00bboff\u00bb button_letter_spacing__hover_enabled=\u00bboff\u00bb button_one_letter_spacing__hover_enabled=\u00bboff\u00bb button_two_letter_spacing__hover_enabled=\u00bboff\u00bb button_bg_color__hover_enabled=\u00bboff\u00bb button_one_bg_color__hover_enabled=\u00bboff\u00bb button_two_bg_color__hover_enabled=\u00bboff\u00bb][\/et_pb_contact_field][et_pb_contact_field field_id=\u00bbEmpresa\u00bb field_title=\u00bbEmpresa\u00bb fullwidth_field=\u00bbon\u00bb _builder_version=\u00bb4.4.0″][\/et_pb_contact_field][et_pb_contact_field field_id=\u00bbMessage\u00bb field_title=\u00bbCu\u00e9ntanos un poco sobre tus necesidades\u00bb field_type=\u00bbtext\u00bb fullwidth_field=\u00bbon\u00bb _builder_version=\u00bb4.4.0″ form_field_text_color=\u00bb#555555″ button_text_size__hover_enabled=\u00bboff\u00bb button_one_text_size__hover_enabled=\u00bboff\u00bb button_two_text_size__hover_enabled=\u00bboff\u00bb button_text_color__hover_enabled=\u00bboff\u00bb button_one_text_color__hover_enabled=\u00bboff\u00bb button_two_text_color__hover_enabled=\u00bboff\u00bb button_border_width__hover_enabled=\u00bboff\u00bb button_one_border_width__hover_enabled=\u00bboff\u00bb button_two_border_width__hover_enabled=\u00bboff\u00bb button_border_color__hover_enabled=\u00bboff\u00bb button_one_border_color__hover_enabled=\u00bboff\u00bb button_two_border_color__hover_enabled=\u00bboff\u00bb button_border_radius__hover_enabled=\u00bboff\u00bb button_one_border_radius__hover_enabled=\u00bboff\u00bb button_two_border_radius__hover_enabled=\u00bboff\u00bb button_letter_spacing__hover_enabled=\u00bboff\u00bb button_one_letter_spacing__hover_enabled=\u00bboff\u00bb button_two_letter_spacing__hover_enabled=\u00bboff\u00bb button_bg_color__hover_enabled=\u00bboff\u00bb button_one_bg_color__hover_enabled=\u00bboff\u00bb button_two_bg_color__hover_enabled=\u00bboff\u00bb][\/et_pb_contact_field][\/et_pb_contact_form][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"
10 horas<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"2880","footnotes":""},"categories":[52,9,11],"tags":[],"class_list":["post-4016","post","type-post","status-publish","format-standard","hentry","category-ciberseguridad","category-cursos","category-cursos-de-it"],"acf":[],"_links":{"self":[{"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/posts\/4016","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/comments?post=4016"}],"version-history":[{"count":0,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/posts\/4016\/revisions"}],"wp:attachment":[{"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/media?parent=4016"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/categories?post=4016"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/tags?post=4016"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}