D
I
G
I
T
A
L
T
E
K
H
Exploring Cisco Tetration Analytics
- Data Center Challenges in today’s environment
- Determine and Position Cisco Tetration
- Cisco Tetration Features and functionalities
- Cisco Tetration Analytics Architecture
- Cisco Tetration Deployment Models overview
- Cisco Tetration GUI Overview
- Visibility, Security, Workload Protection and Service Operations Overview
Implementing & Operating Cisco Tetration
- Explore Data Collection
- Install the Software Agent
- Install the Hardware Agent
- Import Context Data
- Describe Cisco Tetration Operational Concepts
Exploring Cisco Tetration ADM and Application Insight
- Describe Cisco Tetration Application Insight
- Perform ADM(Application Dependency Mapping)
- Interpret ADM Results Application Visibility
- Application Insight and Network Insight
- Workload baseline
- AutoGenerated Segmentation Policy
Exploring Cisco Tetration Intent-Based Networking
- Describe Intent-Based Policy
- Examine Policy Features
- Implement Policies
- Policy Compliance
Enforcing Tetration Policy Pipeline and Compliance
- Examine Policy Enforcement
- Implement Application Policy
- Examine Policy Compliance Verification and Simulation
Exploring Tetration Security Use Cases
- Examine Workload Security
- Attack Prevention
- Attack Detection
- Attack Remediation
- Micro Segmentation, Proactive Identification and Analyzing Attack Surface
- Security Vulnerabilities and exposures
Exploring IT Operations Use Cases
- Main Features and IT Operations Use Cases
- Performing Operations in Neighborhood App based Use Cases
Exploring Platform Enhancement Use Cases
- Integrations and Advanced Features
- Third-party Integration Examples
- Explore Data Platform Capabilities
- Tetration Other Integrations
Exploring Cisco Tetration Analytics Administration
- Examine User Authentication & Authorization
- Exploring Cluster Management
- Configure Alerts and Syslog