Cisco

Implementing Cisco Tetration Analytics

DCITET

Implementing Cisco Tetration Analytics

This three day course shows you how to deploy, use, and operate Cisco® Tetration Analytics™ platform for comprehensive workload-protection and application and network insights across a multicloud infrastructure.

Training at a glance

Level

Intermediate

Duration

3 Days

Experience

3 -4 Years Networking

Average Salary

$108,400

Labs

Yes

Level

Intermediate

Duration

2 Days

Experience

3 -4 Years Networking

Average Salary

$108,400

Labs

Yes

Training Details

Implementing Cisco Tetration Analytics

The Implementing Cisco Tetration Analytics (DCITET) course shows you how to deploy, use, and operate Cisco® Tetration Analytics™ platform for comprehensive workload-protection and application and network insights across a multicloud infrastructure. Through expert instruction, use cases, and hands-on labs, you will learn how the Cisco Tetration Analytics platform uses streaming telemetry, behavioral analysis, unsupervised machine learning, analytical intelligence, and big data analytics to deliver pervasive visibility, automated intent-based policy, workload protection, and performance management. You will get hands-on practice in software agent installation, implementing policy, workload security, administration and operational tasks, and more.

Cisco Tetration offers holistic workload protection for multicloud data centers by enabling a zero-trust model using segmentation. This approach allows you to identify security incidents faster, contain lateral movement, and reduce your attack surface.

This course will help you:

  • Learn how to implement and use the Cisco Tetration platform to address data center security challenges and provide secure infrastructure for workload protection
  • Learn how Cisco Tetration Analytics integrates into the intent-based network management automation infrastructure using application security policy and other network policies
  • Learn how the Cisco Tetration big data platform analyses data using unsupervised machine learning and behavior analysis to support application, network, and security use cases
  • Gain knowledge and skills through Cisco’s unique combination of lessons and hands-on practice using enterprise-grade Cisco learning technologies, data center equipment, and software
  • Succeed in today’s demanding data center operations roles

 

After taking this course, you should be able to:

  • Define the Cisco telemetry and analytics approach. Explore common scenarios that Cisco Tetration Analytics can solve.
  • Describe how the Cisco Tetration Analytics platform collects telemetry and other context information. Discuss how relative agents are installed and configured. Explore the operational aspects of the Cisco Tetration Analytics platform.
  • Describe the Cisco Tetration Analytics support for application visibility or application insight based on the Application Dependency Mapping (ADM) feature.
  • List the concepts of the intent-based declarative network management automation model.
  • Describe the Cisco Tetration policy enforcement pipeline, components, functions, and implementation of application policy.
  • Describe how to use Cisco Tetration Analytics for workload protection in order to provide a secure infrastructure for business-critical applications and data.
  • Describe Cisco Tetration Analytics platform use cases in the modern heterogeneous, multicloud data center.
  • List the options for the Cisco Tetration Analytics platform enhancements.
  • Explain how to perform the Cisco Tetration Analytics administration.
  • Network Security Operations
  • Workload Application Administrators
  • Security Operations
  • Field Engineers
  • Network Engineers
  • Systems Engineers
  • Technical Solutions Architects
  • Cisco Integrators and Partners
  •  

To fully benefit from this course, you should have the following knowledge and skills:

  • Knowledge of cloud and (virtual) data center architecture or cloud basic networking concepts
  • Familiarity with Cisco basic networking security concepts and application security concepts
  • Familiarity with basic Cisco telemetry protocols and Big Data analytics
  • Familiarity with basic Cisco data analytics pipelines, intelligent algorithms, tools, and concepts

Upcoming Classes

We Offer More Than Just Cisco Training

Our successful training results keep our corporate and military clients returning.
That’s because we provide everything you need to succeed. This is true for all of our courses.

Strategic Planning & Project Management

From Lean Six Sigma to Project Management Institute Project Management Professional, Agile and SCRUM, we offer the best-in-class strategic planning and project management training available. Work closely with our seasoned multi-decade project managers.

IT & Cybersecurity

ATA is the leading OffSec and Hack the Box US training provider, and a CompTIA and EC-Council award-winning training partner. We offer the best offensive and defensive cyber training to keep your team ahead of the technology skills curve.

Leadership & Management

Let us teach your team the high-level traits and micro-level tools & strategies of effective 21st-century leadership. Empower your team to play to each others’ strengths, inspire others and build a culture that values communication, authenticity, and community.

From Lean Six Sigma to Project Management Institute Project Management Professional, Agile and SCRUM, we offer the best-in-class strategic planning and project management training available. Work closely with our seasoned multi-decade project managers.
ATA is the leading OffSec and Hack the Box US training provider, and a CompTIA and EC-Council award-winning training partner. We offer the best offensive and defensive cyber training to keep your team ahead of the technology skills curve.
Let us teach your team the high-level traits and micro-level tools & strategies of effective 21st-century leadership. Empower your team to play to each others’ strengths, inspire others and build a culture that values communication, authenticity, and community.