← Back to Course Offerings

Cisco Tetration Technical Workshop

Software Network Solutions, Technology

Course Description

Tetration Analytics is the platform that discovers and monitors your applications – enabling a Zero Trust Model. Tetration, using machine learning, can perform Application Dependency Mapping to build dynamic policies and automate enforcement. Tetration is capable of supporting hybrid Data Center environments using a choice of deployment models.

The Cisco Tetration Technical Workshop provides network engineers with the skills and insight that enable them to discover, operate, manage, and monitor applications in new or existing Data Center environments.

Course Details

Duration: 2 Days
Fee: Contact Us

Course Prerequisites

The knowledge and skills that a learner should have before attending this course are:

  • Basic understanding of network and application operational dynamics
  • Knowledge of Firewall and Load Balancer principles
  • Appreciation of network and application monitoring
  • Familiarity with the Linux command line

Target Audience

The primary audience for this course includes:

  • Partners and customers
  • IT individuals in a post and pre-sales role
  • IT individuals involved in an evaluation, recommendation or decision making capacity
  • Application architects and developers
  • Network architects and engineers
  • IT security personnel
  • Operations and support engineers

Course Goal

This course will provide attendees with an overview of the features and functionality of Cisco’s Tetration solution. Operational concepts will be reinforced with hands-on lab exercises.

Course Outline

Module 1: Scene setting and DC Challenges – A need for Tetration

  • DC Challenges
  • Lack of Visibility
  • Network Performance
  • Security

Module 2: Analytics Overview

  • Busting the Acronyms
  • Telemetry
  • Big Data
  • Machine Learning

Module 3: Tetration Product Overview

  • What is Tetration?
  • Visibility and Application Insight
  • Network Insight
  • Policy Model
  • Compliance
  • Enforcement
  • Tetration Platforms

Module 4: Tetration – First Looks

  • Accessing the GUI
  • Help and documentation
  • Tenants, Scopes, and VRFs
  • Workspaces and applications
  • Policy and Policy Views
  • Flows
  • Inventory
  • Lab
    • First Looks and Exploration

Module 5: Agents and Sensors

  • Agent Overview
  • Software Agents
  • Installing Software Agents
  • Hardware Agents
  • Data Collection
  • Collection Rules
  • Lab
    • Installing the Software agent

Module 6: Tetration Components

  • Architectural Overview
  • Front End
  • Compute
    • Data Cleaning and Analytics
  • Storage
    • Tetration Data Analysis

Module 7: ADM and Policy

  • Application Structure
  • Tetration ADM
  • ADM configuration
  • Post ADM Run
  • Cluster View
  • App View
  • Editing Policy
  • Provided Services
  • Policy Analysis
  • Policy Enforcement
  • Lab
    • ADM Run and Policy Modification
    • Policy Enforcement

Module 8: Flows and Inventory

  • Flow Details
  • Tags and Annotations
  • Inventory details and searching
  • Packages and Process
  • Lab
    • Flow Search
    • Inventory Search

Module 9: Network Insight

  • Network Performance Monitoring and Diagnostics (NPMD)
  • ACI Integration
  • ERSPAN
  • Lab
    • NPMD Exploration

Module 10: Tetration Tools – (Optional Extension)

  • Tetration API
  • Tetration Apps
    • Neighborhood Graph
  • Kafka and Streaming Telemetry
  • Bring Your Own Data
  • Lab (optional)