logo


your one source for IT & AV

Training Presentation Systems Services & Consulting Cloud Services Purchase Client Center Computer Museum
Arrow Course Schedule | Classroom Rentals | Student Information | Free Seminars | Client Feedback | Partners | Survey | Standby Discounts

INCVDO-Cisco CyberVision Deployment and Operation

SS Course: GK821404

Course Overview

TOP

In an effort to simplify cybersecurity and increase device visibility within systems utilized by our IoT customers and partners, Cisco introduces Cisco Cyber Vision a software cybersecurity solution for Operations Technology (OT). This course uses Cisco Validated Designs (CVD) to build a foundational understanding of the potential security threats impacting todays IoT Extended Enterprise and IT OT integration using Cyber Vision. The goal of this course is to help the student understand the types of attacks, the types of targets and the tools available to protect the Industrial IoT architecture and to use Cyber Vision to keep the IoT infrastructure safe. Practical skills will be achieved using real-world scenarios and examples in a lab developed for such a purpose.

Cisco Cyber Vision provides organizations the ability to gain visibility into industrial environments including full details of what assets are on the network, how those assets are communicating, and application level understanding of operational information. As a result, Cisco Cyber Vision provides views and capabilities, including integrations, that can be leveraged by security teams, IT infrastructure teams, and operational teams to ensure system integrity and protect against cyber risks.

This course is eligible for 18 Continuing Education Credits (ILT Modality).

                                                                  

Scheduled Classes

TOP
11/18/24 - GVT - Virtual Classroom - Virtual Instructor-Led
01/06/25 - GVT - Virtual Classroom - Virtual Instructor-Led
02/24/25 - GVT - Virtual Classroom - Virtual Instructor-Led
04/14/25 - GVT - Virtual Classroom - Virtual Instructor-Led
05/27/25 - GVT - Virtual Classroom - Virtual Instructor-Led
07/21/25 - GVT - Virtual Classroom - Virtual Instructor-Led

Outline

TOP

Lesson 1: Industrial Internet of Things Security Threats

  • Describe security threats and potential impacts on the network
  • Understand the security challenges faced by the IIoT staff on a daily basis
  • Explain why Cisco Validated Designs lead to a more secure infrastructure
  • Describe security threats in the Extended Enterprise network

Lesson 2: Introducing Cyber Vision

  • Cybersecurity overview in IIoT deployments
  • Cyber Vision overview
  • Cyber Vision solution components
  • Cyber Vision installation procedure

Lesson 3: Cyber Vision Concepts

  • Preset
  • Filters
  • Component
  • Activity
  • Flow
  • Time span
  • Tags
  • Properties
  • Vulnerabilities
  • Events
  • Credentials
  • Variable accesses

Lesson 4: Cyber Vision GUI Exploration

  • General Dashboard
  • Preset Views
  • Panels
  • Reports
  • Events
  • Monitor
  • Search
  • Admin
  • Systems Statistics
  • My Settings

Lesson 5: Cyber Vision Operation

  • Using General Dashboard
  • Explore Preset Views and Panels
  • Examine and generate Reporting features
  • Working with Events, Alerts and Audits.
  • Using Monitor Mode and its Views
  • Describing and Exploring Monitor Mode Differences
  • Creating Baselines from default preset and from groups
  • Defining with Weekend Baselines
  • Enabling and using Baselines
  • Cyber Vision Use Cases
  • Administering Cyber Vision System and Data Management
  • Cyber Vision Center and Sensors general administration
  • Administering Users
  • Administering Events
  • Administering Licensing
  • Working with RBAC and LDAP Settings
  • Exploring and using Cyber Vision API
  • Cyber Vision Context Information Exchange with pxGrid
  • IDS functionality with SNORT
  • Cyber Vision Integrations and Extensions
  • Working with My Settings

    Prerequisites

    TOP

      Who Should Attend

      TOP

      The primary audience for this course is as follows:

      • Systems Administrators and Engineers
      • Technical Solutions Architects
      • Systems Integrators
      • Channel Partners
      • Value-Added Resellers