The Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement, use, and maintain Cisco Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you will learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more.
After taking the SWSA course, you should be able to:
Describing Cisco WSA
Deploying Proxy Services
Utilizing Authentication
Creating Decryption Policies to Control HTTPS Traffic
Understanding Differentiated Traffic Access Policies and Identification Profiles
Defending Against Malware
Enforcing Acceptable Use Control Settings
Data Security and Data Loss Prevention
Performing Administration and Troubleshooting
References
To fully benefit from this course, you should have knowledge of these topics:
The Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement, use, and maintain Cisco Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you will learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more.
After taking the SWSA course, you should be able to:
Describing Cisco WSA
Deploying Proxy Services
Utilizing Authentication
Creating Decryption Policies to Control HTTPS Traffic
Understanding Differentiated Traffic Access Policies and Identification Profiles
Defending Against Malware
Enforcing Acceptable Use Control Settings
Data Security and Data Loss Prevention
Performing Administration and Troubleshooting
References
To fully benefit from this course, you should have knowledge of these topics:
30 Dec - 3 Jan, 2025
27 Jan - 31 Jan, 2025
24 Feb - 28 Feb, 2025
24 Mar - 28 Mar, 2025
21 Apr - 25 Apr, 2025
19 May - 23 May, 2025
30 Dec - 2 Jan, 2025
27 Jan - 30 Jan, 2025
24 Feb - 27 Feb, 2025
24 Mar - 27 Mar, 2025
21 Apr - 24 Apr, 2025
19 May - 22 May, 2025
30 Dec - 3 Jan, 2025
27 Jan - 31 Jan, 2025
24 Feb - 28 Feb, 2025
24 Mar - 28 Mar, 2025
21 Apr - 25 Apr, 2025
19 May - 23 May, 2025
30 Dec - 31 Dec, 2024
27 Jan - 28 Jan, 2025
24 Feb - 25 Feb, 2025
24 Mar - 25 Mar, 2025
21 Apr - 22 Apr, 2025
19 May - 20 May, 2025
6 Jan - 9 Jan, 2025
3 Feb - 6 Feb, 2025
3 Mar - 6 Mar, 2025
31 Mar - 3 Apr, 2025
28 Apr - 1 May, 2025
26 May - 29 May, 2025
20 Jan - 24 Jan, 2025
17 Feb - 21 Feb, 2025
17 Mar - 21 Mar, 2025
14 Apr - 18 Apr, 2025
12 May - 16 May, 2025
6 Jan - 8 Jan, 2025
3 Feb - 5 Feb, 2025
3 Mar - 5 Mar, 2025
31 Mar - 2 Apr, 2025
28 Apr - 30 Apr, 2025
26 May - 28 May, 2025
30 Dec - 1 Jan, 2025
27 Jan - 29 Jan, 2025
24 Feb - 26 Feb, 2025
24 Mar - 26 Mar, 2025
21 Apr - 23 Apr, 2025
19 May - 21 May, 2025
6 Jan - 8 Jan, 2025
3 Feb - 5 Feb, 2025
3 Mar - 5 Mar, 2025
31 Mar - 2 Apr, 2025
28 Apr - 30 Apr, 2025
26 May - 28 May, 2025
30 Dec - 3 Jan, 2025
27 Jan - 31 Jan, 2025
24 Feb - 28 Feb, 2025
24 Mar - 28 Mar, 2025
21 Apr - 25 Apr, 2025
19 May - 23 May, 2025