Login Or Sign up

Description

📅 CCNP Web Security (SWSA 300-725)

🗓️ Duration: 2/1 Months

📚 Schedule: 3 Days Per Week

🕒 Session Length: 90 Minutes

💡 Total Sessions: 30

⏳Study Hours: 45

Course content

Describe Cisco Secure Web Appliance features and functionality

Proxy service

Cognitive Intelligence (formerly Cognitive Threat Analytics)

Data loss prevention service

Integrated L4TM service

Management tools

Describe Secure Web Appliance solutions

Cisco Advanced Web Security Reporting

Cisco Secure Email and Web Manager

Integrate Cisco Secure Web Appliance with Advanced Web Security Reporting

Integrate Cisco Secure Web Appliance with Cisco ISE

Troubleshoot data security and external data loss using log files

Perform initial configuration tasks on Cisco Secure Web Appliance

Configure an access policy

Configure and verify web proxy features

Explicit proxy functionality

Proxy access logs using CLI

Active directory proxy authentication

Configure a referrer header to filter web categories

Describe deployment options

Explicit proxy

Transparent proxy

Upstream proxy

High availability

Describe these features:

Tune caching

IP spoofing

Web proxy ports

Range requests

Describe the functions of a Proxy Auto-Configuration (PAC) file

Describe the SOCKS protocol and the SOCKS proxy services

Describe authentication features

Supported authentication methods

Authentication realms

Supported authentication surrogates supported

Bypassing authentication of problematic agents

Authentication logs for accounting records

Re-authentication

Configure traffic redirection to Cisco Secure Web Appliance using transparent proxy

with WCCP, PBR, or an L4 switch

Describe the FTP proxy authentication

Troubleshoot authentication issues

Describe SSL and TLS inspection

Configure HTTPS capabilities

HTTPS decryption policies

HTTPS proxy function

ACL tags for HTTPS inspection

HTTPS proxy and verify TLS/SSL decryption

Certificate types used for HTTPS decryption

Configure self-signed and intermediate certificates within SSL/TLS transactions

Describe access policies

Describe identification profiles and authentication

Troubleshoot using access logs

Configure URL filtering

Configure time-based and traffic volume acceptable use policies and end user

notifications

Configure web application visibility and control (Office 365, third-party feeds)

Create a corporate global acceptable use policy

Implement policy trace tool to verify corporate global acceptable use policy

Configure Secure Web Appliance to inspect archive file types

Describe scanning engines

Configure file reputation filtering and file analysis

Describe Cisco Secure Endpoint

Describe integration with Cognitive Intelligence

Configure and analyze web tracking reports

Configure Cisco Advanced Web Security Reporting (AWSR)

Basic web usage

Custom filters

Troubleshoot connectivity issues

Interpret system health using the System Health Dashboard

Describe REST API support

Download PDF