Contact Us
We would love to hear from you. Please complete this form to pre-book or request further information about our delivery options.

3 Days

(Online and onsite)

Price Upon Request
- Explain the common vulnerabilities in the IoT deployments.
- Explain the cybersecurity approach for IoT architectures.
- Define the Cyber Vision main concepts.
- Describe Cyber Vision solution portfolio.
- Describe and use the Cyber Vision GUI.
- Identify and explain Cyber Vision Installation and Support procedures.
- Define Cyber Vision Assessment.
- Identify Cyber Vision Assessment components.
- Explain and use Cyber Vision Asset solution.
- Describe and use Cyber Vision API for Automation.
- Identify Cyber Vision use cases.
Industrial Internet of Things Security Threats
- Describe security threats and potential impacts on the network
- Understand the security challenges faced by the IIoT staff on a daily basis
- Explain why Cisco Validated Designs lead to a more secure infrastructure
- Describe security threats in the Extended Enterprise network
Introducing Cyber Vision
- Cybersecurity overview in IIoT deployments
- Cyber Vision overview
- Cyber Vision solution components
- Cyber Vision installation procedure
Cyber Vision Concepts
- Preset
- Filters
- Component
- Activity
- Flow
- Time span
- Tags
- Properties
- Vulnerabilities
- Events
- Credentials
- Variable accesses
Cyber Vision GUI Exploration
- General Dashboard
- Preset Views
- Panels
- Reports
- Events
- Monitor
- Search
- Admin
- Systems Statistics
- My Settings
Cyber Vision Operation
- Using General Dashboard
- Explore Preset Views and Panels
- Examine and generate Reporting features
- Working with Events, Alerts and Audits.
- Using Monitor Mode and its Views
- Describing and Exploring Monitor Mode Differences
- Creating Baselines from default preset and from groups
- Defining with Weekend Baselines
- Enabling and using Baselines
- Cyber Vision Use Cases
- Administering Cyber Vision System and Data Management
- Cyber Vision Center and Sensors general administration
- Administering Users
- Administering Events
- Administering Licensing
- Working with RBAC and LDAP Settings
- Exploring and using Cyber Vision API
- Cyber Vision Context Information Exchange with pxGrid
- IDS functionality with SNORT
- Cyber Vision Integrations and Extensions
- Working with My Settings
The primary audience for this course is as follows:
- Systems Administrators and Engineers
- Technical Solutions Architects
- Systems Integrators
- Channel Partners
- Value-Added Resellers
The knowledge and skills that the learner should have before attending this course are as follows:
- Basic knowledge of Cisco Security.
- Sound knowledge of Internet of Things Concepts.
- Sound knowledge of IIoT Architectures.
- Explain the common vulnerabilities in the IoT deployments.
- Explain the cybersecurity approach for IoT architectures.
- Define the Cyber Vision main concepts.
- Describe Cyber Vision solution portfolio.
- Describe and use the Cyber Vision GUI.
- Identify and explain Cyber Vision Installation and Support procedures.
- Define Cyber Vision Assessment.
- Identify Cyber Vision Assessment components.
- Explain and use Cyber Vision Asset solution.
- Describe and use Cyber Vision API for Automation.
- Identify Cyber Vision use cases.
Industrial Internet of Things Security Threats
- Describe security threats and potential impacts on the network
- Understand the security challenges faced by the IIoT staff on a daily basis
- Explain why Cisco Validated Designs lead to a more secure infrastructure
- Describe security threats in the Extended Enterprise network
Introducing Cyber Vision
- Cybersecurity overview in IIoT deployments
- Cyber Vision overview
- Cyber Vision solution components
- Cyber Vision installation procedure
Cyber Vision Concepts
- Preset
- Filters
- Component
- Activity
- Flow
- Time span
- Tags
- Properties
- Vulnerabilities
- Events
- Credentials
- Variable accesses
Cyber Vision GUI Exploration
- General Dashboard
- Preset Views
- Panels
- Reports
- Events
- Monitor
- Search
- Admin
- Systems Statistics
- My Settings
Cyber Vision Operation
- Using General Dashboard
- Explore Preset Views and Panels
- Examine and generate Reporting features
- Working with Events, Alerts and Audits.
- Using Monitor Mode and its Views
- Describing and Exploring Monitor Mode Differences
- Creating Baselines from default preset and from groups
- Defining with Weekend Baselines
- Enabling and using Baselines
- Cyber Vision Use Cases
- Administering Cyber Vision System and Data Management
- Cyber Vision Center and Sensors general administration
- Administering Users
- Administering Events
- Administering Licensing
- Working with RBAC and LDAP Settings
- Exploring and using Cyber Vision API
- Cyber Vision Context Information Exchange with pxGrid
- IDS functionality with SNORT
- Cyber Vision Integrations and Extensions
- Working with My Settings
The primary audience for this course is as follows:
- Systems Administrators and Engineers
- Technical Solutions Architects
- Systems Integrators
- Channel Partners
- Value-Added Resellers
The knowledge and skills that the learner should have before attending this course are as follows:
- Basic knowledge of Cisco Security.
- Sound knowledge of Internet of Things Concepts.
- Sound knowledge of IIoT Architectures.