Implementing Cisco Tetration Analytics (DCITET)

Course Overview

The Implementing Cisco Tetration Analytics (DCITET) course shows you how to deploy, use, and operate Cisco® Tetration Analytics™ platform for comprehensive workload-protection and application and network insights across a multicloud infrastructure. Through expert instruction, use cases, and hands-on labs, you will learn how the Cisco Tetration Analytics platform uses streaming telemetry, behavioral analysis, unsupervised machine learning, analytical intelligence, and big data analytics to deliver pervasive visibility, automated intent-based policy, workload protection, and performance management. You will get hands-on practice in software agent installation, implementing policy, workload security, administration and operational tasks, and more. Cisco Tetration offers holistic workload protection for multicloud data centers by enabling a zero-trust model using segmentation. This approach allows you to identify security incidents faster, contain lateral movement, and reduce your attack surface.

3 days
  • This course will help you:

    • Learn how to implement and use the Cisco Tetration platform to address data center security challenges and provide secure infrastructure for workload protection
    • Learn how Cisco Tetration Analytics integrates into the intent-based network management automation infrastructure using application security policy and other network policies
    • Learn how the Cisco Tetration big data platform analyses data using unsupervised machine learning and behavior analysis to support application, network, and security use cases
    • Gain knowledge and skills through Cisco’s unique combination of lessons and hands-on practice using enterprise-grade Cisco learning technologies, data center equipment, and software
    • Succeed in today’s demanding data center operations roles
    • Exploring Cisco Tetration
      • Data Center Challenges
      • Define and Position Cisco Tetration
      • Cisco Tetration Features
      • Cisco Tetration Architecture
      • Cisco Tetration Deployment Models
      • Cisco Tetration GUI Overview
    • Implementing and Operating Cisco Tetration
      • Explore Data Collection
      • Install the Software Agent
      • Install the Hardware Agent
      • Import Context Data
      • Describe Cisco Tetration Operational Concepts
    • Examining Cisco Tetration ADM and Application Insight
      • Describe Cisco Tetration Application Insight
      • Perform ADM
      • Interpret ADM Results Application Visibility
    • Examining Cisco Tetration Intent-Based Networking
      • Describe Intent-Based Policy
      • Examine Policy Features
      • Implement Policies
    • Enforcing Tetration Policy Pipeline and Compliance
      • Examine Policy Enforcement
      • Implement Application Policy
      • Examine Policy Compliance Verification and Simulation
    • Examining Tetration Security Use Cases
      • Examine Workload Security
      • Attack Prevention
      • Attack Detection
      • Attack Remediation
    • Examining IT Operations Use Cases
      • Key Features and IT Operations Use Cases
      • Performing Operations in Neighborhood App-based Use Cases
    • Examining Platform Enhancement Use Cases
      • Integrations and Advanced Features
      • Third-party Integration Examples
      • Explore Data Platform Capabilities
    • Exploring Cisco Tetration Analytics Administration
      • Examine User Authentication and Authorization
      • Examine Cluster Management
      • Configure Alerts and Syslog
    • Cisco Tetration GUI Familiarization
    • Software Installation
    • Importing Context Data
    • Scopes
    • Application Dependency Mapping with Agents
    • Implementing Policy
    • Policy Enforcement and Compliance
    • Workload Security
    • IT Operations
    • Administration
  • To fully benefit from this course, you should have the following knowledge and skills:

    • Knowledge of cloud and (virtual) data center architecture or cloud basic networking concepts
    • Familiarity with Cisco basic networking security concepts and application security concepts
    • Familiarity with basic Cisco telemetry protocols and Big Data analytics
    • Familiarity with basic Cisco data analytics pipelines, intelligent algorithms, tools, and concepts
    • Network Security Operations
    • Workload Application Administrators
    • Security Operations
    • Field Engineers
    • Network Engineers
    • Systems Engineers
    • Technical Solutions Architects
    • Cisco Integrators and Partners