The Implementing Cisco Tetration Analytics (DCITET) v1.0 is a 3-day instructor-led or virtual instructor-led course that shows you how to deploy, use, and operate Cisco Tetration Analytics platform for comprehensive workload-protection and application and network insights across a multicloud infrastructure. Through expert instruction, use cases, and hands-on labs, you will learn how the Cisco Tetration Analytics platform uses streaming telemetry, behavioral analysis, unsupervised machine learning, analytical intelligence, and big data analytics to deliver pervasive visibility, automated intent-based policy, workload protection, and performance management. You will get hands-on practice in software agent installation, implementing policy, workload security, administration and operational tasks, and more.

Cisco Tetration offers holistic workload protection for multicloud data centers by enabling a zero-trust model using segmentation. This approach allows you to identify security incidents faster, contain lateral movement, and reduce your attack surface.


This course will help you:
  • Learn how to implement and use the Cisco Tetration platform to address data center security challenges and provide secure infrastructure for workload protection
  • Learn how Cisco Tetration Analytics integrates into the intent-based network management automation infrastructure using application security policy and other network policies
  • Learn how the Cisco Tetration big data platform analyses data using unsupervised machine learning and behavior analysis to support application, network, and security use cases
  • Gain knowledge and skills through Cisco’s unique combination of lessons and hands-on practice using enterprise-grade Cisco learning technologies, data center equipment, and software
  • Succeed in today’s demanding data center operations roles


The course contains these components:
  • Exploring Cisco Tetration
    • Data Center Challenges
    • Define and Position Cisco Tetration
    • Cisco Tetration Features
    • Cisco Tetration Architecture
    • Cisco Tetration Deployment Models
    • Cisco Tetration GUI Overview
  • Implementing and Operating Cisco Tetration
    • Explore Data Collection
    • Install the Software Agent
    • Install the Hardware Agent
    • Import Context Data
    • Describe Cisco Tetration Operational Concepts
  • Examining Cisco Tetration ADM and Application Insight
    • Describe Cisco Tetration Application Insight
    • Perform ADM
    • Interpret ADM Results Application Visibility
  • Examining Cisco Tetration Intent-Based Networking
    • Describe Intent-Based Policy
    • Examine Policy Features
    • Implement Policies
  • Enforcing Tetration Policy Pipeline and Compliance
    • Examine Policy Enforcement
    • Implement Application Policy
    • Examine Policy Compliance Verification and Simulation
  • Examining Tetration Security Use Cases
    • Examine Workload Security
    • Attack Prevention
    • Attack Detection
    • Attack Remediation
  • Examining IT Operations Use Cases
    • Key Features and IT Operations Use Cases
    • Performing Operations in Neighborhood App-based Use Cases
  • Examining Platform Enhancement Use Cases
    • Integrations and Advanced Features
    • Third-party Integration Examples
    • Explore Data Platform Capabilities
  • Exploring Cisco Tetration Analytics Administration
    • Examine User Authentication and Authorization
    • Examine Cluster Management
    • Configure Alerts and Syslog

Lab outline:
  • LAB: Cisco Tetration GUI Familiarization
  • LAB: Software Installation
  • LAB: Importing Context Data
  • LAB: Scopes
  • LAB: Application Dependency Mapping with Agents
  • LAB: Implementing Policy
  • LAB: Policy Enforcement and Compliance
  • LAB: Workload Security
  • LAB: IT Operations
  • LAB: Administration

Prerequisite Knowledge

To fully benefit from this course, you should have the following knowledge and skills:
  • Knowledge of cloud and (virtual) data center architecture or cloud basic networking concepts
  • Familiarity with Cisco basic networking security concepts and application security concepts
  • Familiarity with basic Cisco telemetry protocols and Big Data analytics
  • Familiarity with basic Cisco data analytics pipelines, intelligent algorithms, tools, and concepts