Stealthwatch users can now get a range of learning opportunities, from self-directed training to instructor-led hands-on labs. Gain an extra edge to augment the value of your deployment and achieve successful security outcomes.
Optimize your Stealthwatch deployment with training offers designed for you.
Learn how to quickly detect and respond to potential security threats.
Get up to speed fast with online features training, included at no extra charge in a Stealthwatch Support Maintenance Agreement.
Start with courses that introduce core concepts and prepare you for our instructor-led training. You'll learn about Stealthwatch components, flow basics, the client interface, and the web user interface.
Move on to interactive tutorials that focus on specific Stealthwatch components. Learn the what, when, why, and how of features such as the Cisco Stealthwatch Proxy License and Cisco Security Packet Analyzer.
Designed for system administrators, these interactive demonstrations and guided practices explain the basic Stealthwatch setup and configuration. Learn at your own pace how to validate appliances, manage host groups, set policies, and more.
Participate in monthly 1-hour sessions on tactical Stealthwatch topics led by our team of experts, and get access to all previously recorded sessions and presentation slides.
Accelerate your Stealthwatch deployment with a Stealthwatch Training Subscription, a comprehensive and flexible learning program that includes all of our self-directed training, virtual instructor-led courses, use-case workshops, and monthly webinars. Included in all of this training is our Learning Advisor Service to help you map out a learning plan that’s right for your organization.
Participate in virtual courses and workshops with hands-on labs. Or let us configure private training specifically for you in sessions delivered at your site, at a Cisco campus, or virtually.
Focus on a framework to follow for completing the initial configuration tasks required to get Stealthwatch up and running.
Investigate security issues and make initial determinations on next steps in the investigation.