Tetration Analytics

Course Description

This course provides an overview of the Cisco Tetration Analytics™ platform. Tetration addresses important data center operational and security challenges by providing behavior-based application insight, automating policy generation, and enabling zero-trust deployment using application segmentation. The goal of this course is to understand how Tetration works and how it can be used to address these challenges comprehensively, using rich traffic telemetry. This course will also include hands-on labs in which you will be configuring and administer Tetration Platform.

After this course you should be able to understand:
  • Tetration Analytics Platform Overview, Use Cases, and Business Drivers
  • Machine Learning Concepts
  • Tetration Architecture and Concepts
  • Software & Hardware Sensors
  • Scopes & RBAC Definitions
  • Tetration Use Cases – Deep Dive
  • Applications Insights and Dependency
  • Automated Whitelist Policy Generation
  • Automated Policy Enforcement
  • Policy Simulation and Assessment
  • Policy Compliance & Auditability
  • Forensics & Visibility
  • Tetration Ecosystem/Integration
  • Policy Deployment with Cisco ACI
  • Tetration Open Access; Rest API, Kafka, and Tetration Apps

Course Type
  • Instructor-Led Training, Classroom with Hands-on Lab
Who should attend
  • Data Center Architects
  • Solution Architects
  • Network Engineers
  • Systems Engineers
  • System Administrators
  • Storage Administrators
  • Systems Integrators
  • Applications Owners
  • DevOps & Cloud Engineers

Duration

  • 3 days
Prerequisites
  • Understanding of Linux Operating System Administration
  • Familiarity with Basic Network Concepts (TCP/IP, Layer 2 and Layer 3 networking)
  • Familiarity with Server Virtualization
  • Familiarity with Firewall and Load Balancer Principles

Course Content

Module 1: Introduction

  • DC Story in action
  • The cost of “invisibility”
  • Value proposition of Tetration

Module 2: Data Center Analytics

  • Introductng Tetration Analytics Platform
  • Today’s challanges
  • What probelms are we solving?

Module 3: Tetration Overview & Architecture

  • Tetration Overview
  • Machine Learning
  • Tetration Analytics Architecture
  • Multiple Sensors & Data Sources
  • Hardware & Software Sensors
  • Pervasive Sensor Framework

Module 4: Scopes & RBAC

  • How Scopes are Defnined
  • Scopes & Hierarchical
  • RBAC Model

Module 5: Real-time Asset Tagging

  • Introdution to Asset Tagging
  • Annocation Concepts & Use Cases
  • User Defined Asset Tags

 


Module 6: Application Insights & Dependency

  • ADM Overview
  • Visualize Application & Resources
  • Identofy Application Performance Issues
  • Import 3rd Party Application Configurations
  • Whitelist Policy Creation

Module 7: Automated Whitelist Policy Generation

  • Export Policies in XML/JSON/YAML
  • Export to ACI,AWS Security groups,other SDN
  • Policy & Whitelist Creation

Module 8: Policy Simulation  & Assessment

  • Auto-Generate Whitelist Poicies
  • Perform Impact Analysis on Policies
  • Apply Policies with zero risk

Module 9: Policy Compliance & Auditability

  • Baseline & Policy Comparison
  • Compliance Audit

Module 10: Forensics & Visibility

  • Compliance Auditing

Baseline and Policy comparision

Module 11: Tetration Ecosystem & Integration

  • Ecosystem Partners


Module 12: ACI Integration

  • Policy Deployment with Cisco ACI
  • ConfigPush

Module 13: Tetration  Open Access

  • Rest API
  • Kafka – a Distributed Streaming Platform
  • Tetration Apps

Module 14: Tetration  Analytics Platform Review

  • Why Tetration was created
  • Problems Tetration is solving
  • Q&A

Lab 1: Environment Setup/Access & Overview

Lab 2: Instructor Demo

Lab 3: Roles & Scopes

Lab 4: Demonstrate the Dashboard

Lab 5: ADM Lab

Lab 6: Policy Analysis Lab

Lab 7: Flow Search Lab