📅 CCNP Web Security (SWSA 300-725)
🗓️ Duration: 2/1 Months
📚 Schedule: 3 Days Per Week
🕒 Session Length: 90 Minutes
💡 Total Sessions: 30
⏳Study Hours: 45
Describe Cisco Secure Web Appliance features and functionality
Proxy service
Cognitive Intelligence (formerly Cognitive Threat Analytics)
Data loss prevention service
Integrated L4TM service
Management tools
Describe Secure Web Appliance solutions
Cisco Advanced Web Security Reporting
Cisco Secure Email and Web Manager
Integrate Cisco Secure Web Appliance with Advanced Web Security Reporting
Integrate Cisco Secure Web Appliance with Cisco ISE
Troubleshoot data security and external data loss using log files
Perform initial configuration tasks on Cisco Secure Web Appliance
Configure an access policy
Configure and verify web proxy features
Explicit proxy functionality
Proxy access logs using CLI
Active directory proxy authentication
Configure a referrer header to filter web categories
Describe deployment options
Explicit proxy
Transparent proxy
Upstream proxy
High availability
Describe these features:
Tune caching
IP spoofing
Web proxy ports
Range requests
Describe the functions of a Proxy Auto-Configuration (PAC) file
Describe the SOCKS protocol and the SOCKS proxy services
Describe authentication features
Supported authentication methods
Authentication realms
Supported authentication surrogates supported
Bypassing authentication of problematic agents
Authentication logs for accounting records
Re-authentication
Configure traffic redirection to Cisco Secure Web Appliance using transparent proxy
with WCCP, PBR, or an L4 switch
Describe the FTP proxy authentication
Troubleshoot authentication issues
Describe SSL and TLS inspection
Configure HTTPS capabilities
HTTPS decryption policies
HTTPS proxy function
ACL tags for HTTPS inspection
HTTPS proxy and verify TLS/SSL decryption
Certificate types used for HTTPS decryption
Configure self-signed and intermediate certificates within SSL/TLS transactions
Describe access policies
Describe identification profiles and authentication
Troubleshoot using access logs
Configure URL filtering
Configure time-based and traffic volume acceptable use policies and end user
notifications
Configure web application visibility and control (Office 365, third-party feeds)
Create a corporate global acceptable use policy
Implement policy trace tool to verify corporate global acceptable use policy
Configure Secure Web Appliance to inspect archive file types
Describe scanning engines
Configure file reputation filtering and file analysis
Describe Cisco Secure Endpoint
Describe integration with Cognitive Intelligence
Configure and analyze web tracking reports
Configure Cisco Advanced Web Security Reporting (AWSR)
Basic web usage
Custom filters
Troubleshoot connectivity issues
Interpret system health using the System Health Dashboard
Describe REST API support