Cisco Stealthwatch for System Administrators is a virtual Instructor-led, lab-based, handson course. This course focuses on a stepby-step framework for completing initial
configuration tasks and getting Cisco Stealthwatch System up and running in the network.
Cisco Stealthwatch for System Administrators is a lab intensive course that focuses on
critical initial configuration steps that allow the Cisco Stealthwatch System to monitor flows and network behavior, and provide customers with data they can use to determine next steps, such as what policies (tuning) are necessary to put in place to
manage the amount of data presented.
This course begins with the assumption that the Cisco Stealthwatch System is installed, up, and reachable. It also assumes all exporters have NetFlow configured properly, Cisco Stealthwatch appliances are configured and the devices are pointing to
the appropriate Flow Collector.
Basic understanding of TCP/IP and telemetry Working knowledge of networking technologies including knowledge of servers, routers, hosts, and IP networks
within your organization.
All students have completed the following (minimum) prerequisites. These prerequisites are available as eLearning courses found in the Cisco Stealthwatch Customer Training Center available through the Stealthwatch Customer Community:
- Flow Basics
- Cisco Stealthwatch Overview and Components
- Cisco Stealthwatch SMC Web App Interface Overview
- Cisco Stealthwatch SMC Client Interface Overview
Who Should Attend
This course is intended for the individual(s) responsible for setting up the Cisco Stealthwatch System and individual(s) responsible for ongoing maintenance and/or administration of the system, such as:
- Customers how role is to complete the initial configuration of the Cisco Stealthwatch System into their network
- Channel partners responsible for completing the initial configuration of the Cisco Stealthwatch System into a customer network
- Employees responsible for completing the initial configuration of the Cisco Stealthwatch System into a customer network
- Validate network configuration of Cisco Stealthwatch appliances
- Set base SMC configuration values
- Use SMC documents and reports to determine if exporters are properly setup
- Use SMC documents and reports to determine IP addresses that belong to your organization
- Properly place hosts into appropriate host groups
- Define services and applications
- Organize network devices into the By Function host group
- Define basic concepts of policy management and apply policy to host groups
- Add Cisco Stealthwatch users with specific roles
- Create custom documents
- Establish response management rules, triggers, and actions
|Format:||Lecture and Lab|
|Delivery Method:||Virtual / Onsite|
|SSA Data Sheet 20120220.pdf|