Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages

Course Outline

SWSA: Securing the Web with Cisco Web Security Appliance

SWSA: Securing the Web with Cisco Web Security Appliance

Course Contents

Describing Cisco WSA
Technology Use Case
Cisco WSA Solution
Cisco WSA Features
Cisco WSA Architecture
Proxy Service
Integrated Layer 4 Traffic Monitor
Data Loss Prevention
Cisco Cognitive Intelligence
Management Tools
Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration
Cisco Content Security Management Appliance (SMA)

Deploying Proxy Services
Explicit Forward Mode vs. Transparent Mode
Transparent Mode Traffic Redirection
Web Cache Control Protocol
Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow
Proxy Bypass
Proxy Caching
Proxy Auto-Config (PAC) Files
FTP Proxy
Socket Secure (SOCKS) Proxy
Proxy Access Log and HTTP Headers
Customizing Error Notifications with End User Notification (EUN) Pages

Utilizing Authentication
Authentication Protocols
Authentication Realms
Tracking User Credentials
Explicit (Forward) and Transparent Proxy Mode
Bypassing Authentication with Problematic Agents
Reporting and Authentication
FTP Proxy Authentication
Troubleshooting Joining Domains and Test Authentication
Integration with Cisco Identity Services Engine (ISE)

Creating Decryption Policies to Control HTTPS Traffic
Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview
Certificate Overview
Overview of HTTPS Decryption Policies
Activating HTTPS Proxy Function
Access Control List (ACL) Tags for HTTPS Inspection
Access Log Examples

Understanding Differentiated Traffic Access Policies and Identification Profiles
Overview of Access Policies
Access Policy Groups
Overview of Identification Profiles
Identification Profiles and Authentication
Access Policy and Identification Profiles Processing Order
Other Policy Types
Access Log Examples
ACL Decision Tags and Policy Groups
Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications

Defending Against Malware
Web Reputation Filters
Anti-Malware Scanning
Scanning Outbound Traffic
Anti-Malware and Reputation in Policies
File Reputation Filtering and File Analysis
Cisco Advanced Malware Protection
File Reputation and Analysis Features
Integration with Cisco Cognitive Intelligence

Enforcing Acceptable Use Control Settings
Controlling Web Usage
URL Filtering
URL Category Solutions
Dynamic Content Analysis Engine
Web Application Visibility and Control
Enforcing Media Bandwidth Limits
Software as a Service (SaaS) Access Control
Filtering Adult Content

Data Security and Data Loss Prevention
Data Security
Cisco Data Security Solution
Data Security Policy Definitions
Data Security Logs

Performing Administration and Troubleshooting
Monitor the Cisco Web Security Appliance
Cisco WSA Reports
Monitoring System Activity Through Logs
System Administration Tasks
Command Line Interface

Comparing Cisco WSA Models
Comparing Cisco SMA Models
Overview of Connect, Install, and Configure
Deploying the Cisco Web Security Appliance Open Virtualization Format (OVF) Template
Mapping Cisco Web Security Appliance Virtual Machine (VM) Ports to Correct Networks
Connecting to the Cisco Web Security Virtual Appliance
Enabling Layer 4 Traffic Monitor (L4TM)
Accessing and Running the System Setup Wizard
Reconnecting to the Cisco Web Security Appliance
High Availability Overview
Hardware Redundancy
Introducing Common Address Redundancy Protocol (CARP)
Configuring Failover Groups for High Availability
Feature Comparison Across Traffic Redirection Options
Architecture Scenarios When Deploying Cisco AnyConnect® Secure Mobility

Lab Outline

•   Configure the Cisco Web Security Appliance
•   Deploy Proxy Services
•   Configure Proxy Authentication
•   Configure HTTPS Inspection
•   Create and Enforce a Time/Date-Based Acceptable Use Policy
•   Configure Advanced Malware Protection
•   Configure Referrer Header Exceptions
•   Utilize Third-Party Security Feeds and MS Office 365 External Feed
•   Validate an Intermediate Certificate
•   View Reporting Services and Web Tracking
•   Perform Centralized Cisco AsyncOS Software Upgrade Using Cisco SMA

We strongly recommend you attend this course before attempting the following exam.

Certification & Exam

This exam certifies your knowledge of Cisco Web Security Appliance including proxy services, authentication, decryption policies, differentiated traffic access policies and identification policies, acceptable use control settings, malware defense, and data security and data loss prevention.

After you pass 300-725 SWSA:
•   You earn the Cisco Certified Specialist – Web Content Security certification.
•   You will have satisfied the concentration exam requirement for new the CCNP Security certification. To complete CCNP Security, you also need to pass the Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) exam or its equivalent.

Price per delegate


Scheduled Classes

Remote Access:

Please complete the contact form below or call 0141 221 5676 for further course information and available dates.
Alternatively you can email us at

Leave this field blank