TETOPS - Introduction to Cisco Tetration Analytics™ Operations and Administration
TETOPS - Introduction to Cisco Tetration Analytics™ Operations and Administration Course Details:
The TETOPS - Introduction to Cisco Tetration Analytics Operations and Administration course will familiarize and help you understand how the Cisco Tetration Analytics platform enables efficient data center operations by providing pervasive visibility, behavior-based application insight, and migration to a zero-trust model.
Call (919) 283-1674 to get a class scheduled online or in your area!
Module 1: Tetration Overview
- Defining and Positioning Cisco Tetration Analytics
- Telemetry
- Platform
- Intent-Based Policy
- Machine Learning
- Network Performance Monitoring and other Use Cases
Module 2: Tetration Components
- Architecture
- Data Collection
- Sensors and Agents
- Flow Collectors
- Analytics Engine
- Open Access
Module 3: Operational Concepts
- Scopes
- Tenants
- RBAC
- Annotations
Module 4: Tetration Setup and Deployment Models
- On Premise Options
- SaaS
- Tetration-V
- Installation Procedure
- Creating Scopes, Roles, and Users
- Deploy Hardware Sensors
- Deploy NetFlow Sensors
- Deploy ERSPAN Sensors
Module 5: Software Agents
- Software Agents Overview
- Software Agents Features
- Software Agents Configuration
Module 6: Application Dependency Mapping
- Why ADM?
- Tetration Application Insight
- ADM Process
- ADM Run Results
Module 7: Cisco Tetration Analytics Policy Enforcement Overview
Module 8: Cisco Tetration Flow Search
- Results Filtered by Scope
- Searching with Conjunctions
- Flow Explore Integrated
- User Annotations
Module 9: Tetration Policy Analysis
- Enable Policy Analysis
- Live Policy Analysis
- Backdated Policy Experiments
- Quick Policy Analysis
Module 10: Tetration Apps and API
- App Store
- User Apps
- Visualize Data Sources
- Bring your own Data
- OpenAPI
Module 11: Tetration Ecosystem
- Platform Integrations
- ADCs
- FW Management Tools
- Phantom
- InfoBlox
- ServiceNow
- Splunk
- Turbonomic
- Veeam
- Corvil and Extra Hop
*Please Note: Course Outline is subject to change without notice. Exact course outline will be provided at time of registration.
- Enables pervasive visibility of traffic across data center infrastructure
- Use long term data retention for forensics and analysis
- Create communication and dependencies for all applications within the data center
- Empower companies to create whitelist policy models
- Identify behavior deviation in real time
- Perform forensics operations
- Exploring the GUI
- Software Agent Installation
- Application Dependency Mapping with Agents
- Enforcement
- Flow Search
- Advanced ADM Run
- Policy Analysis
- Familiarity with data center technologies
- Familiarity with network operation
- Understanding of basic network security
- Channel Partners
- Systems Architects
- Network Architects
- Network Engineers
- Systems Engineers
- Administrators