Course Offering
- Guaranteed to Run Schedule
- New Courses
- Fast Lane LIVE E-Learning
- Digital Learning Solutions
- Fast Lane Academy»
- Hack Academy
- Fast Lane IT Workshops»
- Featured Vendors
- Amazon Web Services»
- Aruba»
- Cisco»
- Citrix»
- EC-Council»
- Google Cloud»
- (ISC)²»
- Microsoft»
- NetApp»
- Palo Alto Networks»
- Red Hat»
- VMware»
-
Additional Vendors»
- Arista
- Automation Anywhere
- Barracuda
- Brocade
- CertNexus
- Check Point
- Cloudera
- Commvault
- CompTIA
- CWNP
- Cydrill Software Security
- Dell EMC
- F5
- Fortinet
- Gigamon
- Huawei
- IBM
- Juniper
- Kaspersky Lab
- KnowBe4 Security Awareness
- Oracle
- Pivotal / Spring
- Ruckus
- Salesforce
- ServiceNow
- SonicWall
- Splunk
- SUSE
- Symantec
- Veeam
- Veritas
- IT & Project Management»
- ITIL®»
- PRINCE2®»
- Scaled Agile»
- Scrum»
- Atlassian»
- Featured Technologies
- Artificial Intelligence (AI)»
- Cloud Computing»
- Cyber Security»
- Data Center»
- Network Analysis / Wireshark»
- Software Development»
- Wireless & Mobility»

Use Case Workshop; Are There Rogue Hosts in My Network (UCWRH)
Course Overview
Use Case Workshops are hands-on, instructor-led courses focused on specific use case outcomes in Cisco Stealthwatch Enterprise. The workshops are designed to help you quickly identify and investigate common threats and to provide effective workflows so that you can fully understand Stealthwatch capabilities. In this workshop, you will work through a series of use cases that focus on detecting rogue hosts on your network.This workshop is intended to be interactive and engaging. You are encouraged to ask questions, respond to questions, and share best practices and ideas.
Who should attend
This course is intended for individuals who are responsible for using Stealthwatch to monitor security policy.
Prerequisites
To complete this workshop, the following components must be installed and configured on your network:
- Stealthwatch Management Console Version 7.0 or later
- Stealthwatch Flow Collector
Course Objectives
- Validate network configuration of Cisco Stealthwatch appliances.
- Set base SMC configuration values.
- Use SMC documents and reports to determine if exporters are set up properly.
- Use SMC documents and reports, to determine IP addresses that belong to your organization.
- Place hosts into appropriate host groups.
- Define services and applications.
- Add Stealthwatch users with specific roles.
- Create custom documents.
- Establish response management rules, triggers, and actions.
Online Training
Duration 1 day
Price (excl. tax)
- US$ 500.—
Courseware language: English
Currently no online training dates
Classroom Training
Duration 1 day
Price (excl. tax)
- Germany: US$ 500.—
Courseware language: English
Currently no classroom training dates
Currently there are no training dates scheduled for this course.