Back Cisco Tetration for Architects (TA-DCA)

       

Course Description

Cisco's Tetration analytics platform provides customers with unique, real-time insights into their IT infrastructure.

This course will enable you to evaluate the need for real-time 24/7 visibility with your applications, understand the use cases for Tetration, and evaluate how Tetration would integrate into your environment and help you solve technical and business challenges. This course provides use-case-based instruction combined with hands-on experience with some of the key Tetration capabilities, covering topics such as application policy enforcement; policy simulation, deviation, and detection; real-time application behavior insights; and application dependency mapping. This course is designed to help IT professionals learn what infrastructure analytics can do for them, and to evaluate the Cisco Tetration platform. This is an overview course, not an operations course. Labs are included to allow you to learn what Tetration can do in a hands-on environment, but this course is NOT designed to comprensively teach you how to install, configure, and manage a Tetration deployment.

Please note: This course is NOT designed for customers who have purchased Tetration and need comprehensive training on how to install and configure Tetration.

Prerequisites

You will gain the most from this workshop if you have experience working in Data Center environments, and a basic or high level knowledge of enterprise application architecture.

Who Should Attend

This course is designed for technical IT leaders and systems architects who are evaluating infrastructure analytics platforms for their environments, or who want to learn what infrastructure analytics can do for them. This course is NOT designed for customers who have purchased Tetration and need comprehensive training on how to install and configure Tetration.

Learning Objectives

  • Outline the key visibility challenges most customers face with their applications
  • Describe the key use cases and functional architecture of the Tetration platform
  • Identify use cases that leverage Tetration's real-time data collection and search capabilities
  • Explain how Tetration can be used to analyze application dependencies and behavior
  • Explain how Tetration can be used to enforce security policies, simulate policy conditions, and detect policy deviations



Course Info

Length: 1 day
Format: Lecture and Lab
Delivery Method: Virtual / Onsite
Max. Capacity: 16

Contact Us

PDF

Firefly_TA-DCA 2.5.pdf