Course Details

Previous Page

Cisco SITCS 1.0: Cisco Web Security Appliance

Target Audience
Expected Duration
Lesson Objectives
Course Number

Determining how web traffic will be sent to the Cisco Web Security Appliance (WSA) is often perceived as the most challenging portion of the Cisco WSA integration, since it involves devices outside the WSA. In this course, you will learn Cisco WSA deployment approaches while exploring Cisco WSA key features and supported policies. You'll also learn how to configure identities and user authentication on the Cisco WSA. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.

Target Audience
This path is designed to prepare security engineers with the knowledge covering advanced firewall architecture and configuration with the Cisco next-generation firewall, utilizing access, and identity policies. It is also suitable for students interested in pursuing their Cisco Certified Network Professional Security (CCNP Security) certification.


Expected Duration (hours)

Lesson Objectives

Cisco SITCS 1.0: Cisco Web Security Appliance

  • start the course
  • identify how to place Cisco WSA into a typical modularized network design
  • provide a high-level overview of the web proxy service and architecture
  • describe the Cisco Web Reputation Filters and the WBRS
  • describe how the Cisco WSA enforces acceptable use
  • describe the Cisco WSA GUI management
  • describe the Cisco WSA policy types
  • describe the Cisco WSA identities
  • describe the Cisco WSA access policy assignment using identity
  • describe the Cisco WSA policy trace tool
  • contrast the Cisco WSA proxy modes
  • describe the PAC files and deployment options
  • describe the PAC file hosting on the Cisco WSA
  • describe the traffic redirection options in the transparent proxy mode
  • describe the required steps to connect the Cisco WSA to the WCCP router
  • describe how to verify operation of WCCP
  • describe how to configure identities to group client transactions
  • describe how to configure a policy group and assign identify to it
  • describe the authentication protocols and proxy modes
  • describe the basic authentication operations in explicit proxy and transparent proxy mode
  • describe the configuration of the realms and realm sequences
  • describe how to join the Cisco WSA to the Active Directory
  • describe the global authentication settings
  • describe how to configure an identity to require authentication
  • describe how to configure transparent user identification
  • describe the creation of LDAP realms
  • describe how to allow guest access to users who fail authentication
  • describe how to test Cisco WSA authentication settings
  • configure Cisco user authentication controls
  • Course Number: