Professional Documents
Culture Documents
Overview
This course is designed for freshers who wish to start their career in Networking. The course starts with some
of the basics and lay a strong foundation. The training plan covers advanced routing and switching with focus
on OSPF, EIGRP, BGP and route redistribution. The training also covers the SDWAN, Wireless, Network
Security, QOS and F5 loab balancers so as to prepare candidates to handle such technologies in a day-to-day
network activities.
The training balances between the theoretical and practical sessions ver well. The hands-on labs makes the
learning effective and retainable.
Prerequisite
Basic Computer Literacy
Introduction to Networking
Types of Network
Network Topologies
Types of communication (Unicast, Multicast, Broadcast)
Ethernet basics (CSMA/CD, CSMA/CA, Hubs, Switches)
Explain the role and function of network components
● Routers
● Layer 2 and Layer 3 switches
● Next-generation firewalls and IPS
● Access points
● Endpoints
● Servers
Lab/Activity Outiline
Activity 1: Subnetting Class C
Activity 2: Subnetting Class B
Activity 3: Subnetting Class A
Activity4: VLSM
Lab 1: Configuring DHCP and DNS services on Cisco router.
Lab 2: Checking the output of Ping and traceroute
Lab 3: Installing wireshark
Lab 4: Inspecting packets using wireshark.
Lab 5: Checking 3-way handshake in wireshark
Live Quiz
Lab Outlines
● Lab 1: Get Started with Cisco Command-Line Interface (CLI)
● Lab 2: Configure hostnames, line passwords
● Lab 3: Setup enable password and enable secret
● Lab 4: Configure an Interface on a Cisco Router
● Lab 5: Configure and Verify Layer 2 Discovery Protocols
● Lab 6: Implement an Initial Router Configuration
● Lab 7: Configure Default Gateway
Live Quiz
Describe the need for and basic operations of Rapid PVST+ Spanning Tree Protocol and identify basic
operations
Configure and verify Layer 2 discovery protocols (Cisco Discovery Protocol and LLDP)
Lab Outline
ABC Corporation is a medium-sized company that operates in several countries. The company has several
departments, including finance, marketing, IT, and operations, each with its own network needs. To manage
the network effectively, ABC Corporation decides to implement VLANs and STP.
VLAN Implementation:
ABC Corporation decides to implement VLANs to segregate network traffic and improve network security. They
plan to create VLANs for each department and assign network devices, such as switches, servers, and
computers, to their respective VLANs. The IT department also plans to create a VLAN for network
management.
1. Configure the Switches: The IT department configures the switches to support VLANs. They create the
VLANs and assign them to the appropriate switch ports. They also configure the trunk ports to allow
traffic between the VLANs.
2. Assign Devices to VLANs: The IT department assigns network devices to their respective VLANs based
on their department. They also assign the network management devices to the management VLAN.
3. Configure VLAN Interfaces: The IT department configures VLAN interfaces on the switches to allow
routing between the VLANs.
4. Test the VLANs: The IT department tests the VLANs to ensure that network traffic is segregated
correctly.
STP Implementation:
ABC Corporation also decides to implement STP to prevent network loops and improve network reliability.
They plan to configure all the switches as STP bridges and use the root bridge election process to ensure that
one switch is designated as the root bridge.
1. Enable STP on the Switches: The IT department enables STP on all the switches by configuring the
spanning-tree protocol.
2. Configure the Root Bridge: The IT department configures the root bridge by setting the priority of one
switch to the lowest value. This ensures that the switch is elected as the root bridge.
3. Verify the Root Bridge: The IT department verifies that the correct switch is elected as the root bridge.
4. Monitor the Network: The IT department monitors the network to ensure that the STP protocol is
preventing network loops and improving network reliability.
By implementing VLANs and STP, ABC Corporation benefits from the following:
1. Improved Network Security: VLANs help to segregate network traffic and improve network security by
preventing unauthorized access to sensitive data.
2. Network Scalability: VLANs enable ABC Corporation to scale the network easily by adding or removing
network devices as required.
3. Network Reliability: STP improves network reliability by preventing network loops and ensuring that
traffic flows efficiently.
4. Efficient Network Management: The management VLAN allows the IT department to manage the
network devices efficiently, improving network management.
Conclusion:
In conclusion, ABC Corporation's implementation of VLANs and STP has improved network security, scalability,
reliability, and management. By following the best practices for implementing VLANs and STP, ABC Corporation
has created a robust network infrastructure that supports the needs of the company's various departments.
Live Quiz
Routing fundamentals
Interpret the components of routing table
● Network route
● Default route
● Host route
● Floating static
● Neighbor adjacencies
● Point-to-point
● Broadcast (DR/BDR selection)
● Router ID
● OSPF Packet types
● OSPF Tables
● ABR and ASBR
● Summarization
● OSPF Authentication
● Route filteration
● Understanding EIGRP
● K-Values
● EIGRP packets
● EIGRP Tables
● Summarization and Load balancing
● Authentication
● Route filteration
● Successor/ Feasible Successor
● Feasible Distanceand Reported Distance
Route redistribution
Lab outline
A large enterprise network with multiple locations and a variety of network equipment was experiencing
significant routing issues. The network relied on static routing and OSPF, but the IT team was finding it
increasingly difficult to manage the routing tables and ensure optimal path selection. Additionally, the network
was expanding rapidly, with new locations being added frequently, making the management of the network
even more complex.
After conducting a thorough evaluation of the network, the IT team decided to implement EIGRP as the
primary routing protocol. EIGRP is a Cisco proprietary protocol that provides advanced routing features,
including fast convergence, load balancing, and automatic summarization.
1. Configuration of EIGRP on all routers: The IT team configured EIGRP on all routers in the network. This
involved setting up the AS (autonomous system) number, configuring the network statements to
define which interfaces are participating in EIGRP, and configuring the passive-interface command on
interfaces that do not need to participate in EIGRP.
2. Optimization of the EIGRP configuration: The IT team optimized the EIGRP configuration by adjusting
the K-values to prioritize the metrics that were most important for the network. They also adjusted
the hello and hold timers to reduce the convergence time.
3. Implementation of summarization: The IT team implemented automatic summarization to reduce the
size of the routing table and improve network efficiency. This involved configuring summary routes on
routers at the edge of the network.
4. Load balancing: The IT team configured load balancing to optimize traffic flow across multiple paths.
This involved configuring equal-cost load balancing and variance to allow traffic to be distributed
across paths with different metrics.
5. Testing and verification: The IT team performed extensive testing and verification of the EIGRP
configuration to ensure that it was working correctly. They used various tools to monitor the network,
including the Cisco Network Assistant and the Cisco IOS show commands.
The implementation of EIGRP was a success, and the network experienced significant improvements in routing
stability, scalability, and manageability. The IT team was able to reduce the size of the routing table, improve
network efficiency, and ensure optimal path selection, resulting in faster network performance and improved
user experience.
Overall, the implementation of EIGRP was a valuable solution for this large enterprise network, and it serves as
an example of how the use of advanced routing protocols can enhance network performance and scalability.
Company XYZ is a large enterprise that provides IT services to its clients. They have multiple locations spread
across the country and use a complex network infrastructure to connect their various offices. To manage this
network, they use the Open Shortest Path First (OSPF) routing protocol.
The network consists of several routers, switches, and firewalls, which are connected to each other through
various interfaces. Each location has its own set of routers and switches, which are connected to a central
router. The central router acts as the backbone of the network and connects all the locations together.
To implement OSPF, the network administrator at Company XYZ first configured the routers to run OSPF and
then defined the areas for each location. The central router was configured as the area border router (ABR)
and was responsible for connecting the different areas together.
The OSPF protocol automatically discovered the network topology and created a routing table for each router.
This routing table contained information about all the networks and devices in the network, as well as the
shortest path to reach them.
The OSPF protocol also provided several benefits to Company XYZ's network. It allowed for faster convergence
times, reduced network traffic, and improved network scalability. The network administrator could easily add
new devices to the network without having to manually configure routing tables for each device.
In addition, OSPF provided advanced features such as load balancing and path prioritization, which allowed
Company XYZ to optimize their network traffic and ensure that critical applications had the necessary
bandwidth.
Overall, OSPF proved to be a reliable and efficient routing protocol for Company XYZ's complex network
infrastructure. Its flexibility and advanced features allowed the network to scale easily and meet the evolving
needs of the business.
Live Quiz
Module 6: Network Security Fundamentals (Day 13-14)
● Define key security concepts (threats, vulnerabilities, exploits, and mitigation techniques)
● Describe security program elements (user awareness, training, and physical access control)
Configure device access control using local passwords
● Describe and configure security password policies elements, such as management, complexity, and
password alternatives (multifactor authentication, certificates, and biometrics)
● Describe remote access and site-to-site VPNs
● Configure and verify access control lists
● Configure Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port security
Lab outline
Case Study:
ABC Inc. is a medium-sized organization with around 200 employees. The company has various departments
such as sales, marketing, HR, finance, and IT. The IT department is responsible for managing the company's IT
infrastructure, which includes servers, network devices, and other IT resources.
To secure their network infrastructure, the IT department has implemented access control lists (ACLs) and SSH
(Secure Shell) protocols.
ABC Inc. uses ACLs to control access to its network devices, such as routers and switches. The ACLs are
implemented on the network devices to restrict access to specific IP addresses or networks.
For example, the IT department has created an ACL that only allows access to the management interface of
the routers and switches from specific IP addresses of the IT staff. This ensures that only authorized personnel
can access the network devices and configure them.
The IT department has also implemented ACLs on the firewall to restrict access to certain services and
protocols. For example, the IT department has created an ACL that only allows access to the company's email
server from the internal network and blocks access from the internet.
ABC Inc. uses SSH to secure remote access to its network devices. SSH is a secure protocol that encrypts all
traffic between the client and the server, ensuring that data cannot be intercepted or tampered with.
The IT department has implemented SSH on all network devices, including servers, routers, and switches. To
access the network devices remotely, authorized IT staff use SSH clients, such as PuTTY or OpenSSH, to
establish a secure connection.
The IT department has also disabled Telnet, an insecure protocol that sends all data in plain text, on all
network devices. This ensures that only secure protocols, such as SSH, are used to access the network devices.
Conclusion:
By implementing ACLs and SSH protocols, ABC Inc. has significantly improved the security of its network
infrastructure. The ACLs restrict access to the network devices, ensuring that only authorized personnel can
configure them. The use of SSH ensures that all remote access to the network devices is secure and encrypted.
Overall, ABC Inc. has taken important steps to secure its network infrastructure and protect against
unauthorized access and attacks.
Live Quiz
● Describe and configure the purpose of first hop redundancy protocol (HSRP/VRRP/GLBP)
● Configure and verify inside source NAT using static and pools
● Configure and verify NTP operating in a client and server mode
● Explain the role of DHCP and DNS within the network
● Explain the function of SNMP in network operations
● Describe the use of syslog features including facilities and levels
● Configure and verify DHCP client and relay
● Password recovery and Backup
Lab outline
A small business network needs to ensure high availability and security of its network resources. To achieve
this, it is essential to implement technologies such as FHRP and NAT. FHRP (First Hop Redundancy Protocol)
provides a mechanism for routers to share the same virtual IP address, enabling redundancy and load
balancing. NAT (Network Address Translation) provides a method for a network to use private IP addresses
internally while appearing as a public IP address externally.
Scenario:
A small business network with ten employees wants to implement FHRP and NAT to improve the availability
and security of their network resources. The network consists of a single router, which connects to the internet
through a broadband connection. The router has two interfaces, one connected to the local network and the
other connected to the internet.
Implementation:
FHRP:
The small business network can implement FHRP using either HSRP (Hot Standby Router Protocol) or VRRP
(Virtual Router Redundancy Protocol). In this case, HSRP is chosen to provide redundancy and load balancing.
HSRP enables the use of a virtual IP address that multiple routers share, allowing the network to continue
operating even if one of the routers fails.
NAT:
The small business network can implement NAT to provide security and privacy by translating the private IP
addresses used on the internal network into a public IP address. NAT enables the network to use private IP
addresses internally, which are not accessible from the internet, while presenting a public IP address to the
external network.
Results:
By implementing FHRP and NAT, the small business network has improved the availability and security of its
network resources. FHRP ensures redundancy and load balancing, while NAT provides privacy and security.
The network can continue to operate even if one of the routers fails, and the internal network is protected
from external threats.
Conclusion:
In conclusion, FHRP and NAT are essential technologies for a small business network. FHRP provides
redundancy and load balancing, while NAT provides security and privacy. The implementation of FHRP and
NAT in this small business network has improved the availability and security of its network resources,
ensuring that the network can continue to operate even in the event of a failure.
Live Quiz
Module 8: VPN (Day 17)
● Introduction to VPN
● GRE
● IPSec VPN
● DMVPN
Lab Outline
● Lab 1: Configure and Verify a Generic Routing Encapsulation (GRE) Tunnel
● Lab 2: Configure IPSec
● Lab 3: Configure ISAKMP (ISAKMP Phase 1)
● Lab 4: Configure IPSec (ISAKMP Phase 2, ACLs, Crypto MAP)
● Lab 5: DMVPN Phase 1 Configuration
● Lab 6: DMVPN Phase 2 Configuration
● Lab 7: DMVPN Phase 3 Configuration
● Lab 8: DMVPN over IPSec
Case Study
Company X is a multinational corporation with offices located in different parts of the world. Due to the nature
of their business, they needed to establish secure connections between their various offices to protect their
sensitive data. They decided to use IPSec to encrypt their data in transit.
To implement IPSec, they first configured their routers with the necessary policies to establish secure tunnels
between their offices. They also used digital certificates to authenticate their devices and ensure that only
authorized devices were allowed to establish a secure connection.
With IPSec in place, Company X was able to ensure the security and privacy of their data while in transit. They
were also able to reduce the risk of data breaches, as their data was encrypted and therefore less susceptible
to interception or hacking.
Company Y is a large retail chain with multiple branches located across the country. They needed to connect
their various branches to their headquarters to allow for real-time data sharing and collaboration. They
decided to use DMVPN to establish a secure and efficient network.
To implement DMVPN, they first configured their routers with the necessary policies to allow for dynamic IP
addressing and routing. They also used NHRP (Next Hop Resolution Protocol) to allow for efficient and dynamic
routing between their various branches.
With DMVPN in place, Company Y was able to establish a secure and efficient network that allowed for real-
time data sharing and collaboration. They were also able to reduce their costs, as they no longer needed to
lease expensive dedicated lines to connect their various branches.
Live Quiz
BGP Overview
● Introduction to BGP
● Session Establishment (IBGP/EBGP)
● Path Attribute
● Route Processing
● Basic Configuration
● Monitoring and Troubleshooting
Lab Outline
BGP (Border Gateway Protocol) is a routing protocol that is used to exchange routing information among
different networks on the internet. Here are some case studies that demonstrate the use of BGP:
1. Inter-provider traffic engineering: In this case, two internet service providers (ISPs) are connected to
each other, and they need to control the traffic that passes between them. By using BGP, each ISP can
announce the routes that it wants to advertise to the other ISP, and can also set preferences for how
traffic should be directed. This allows the ISPs to control the flow of traffic between them and avoid
congested links.
2. Multi-homing: Multi-homing is when an organization connects to multiple ISPs to improve
redundancy and reliability. BGP is used to manage the routing of traffic between the different ISPs,
ensuring that traffic is always routed over the most efficient path.
3. Cloud connectivity: Cloud service providers (CSPs) use BGP to provide connectivity between their
customers and their cloud services. BGP allows CSPs to announce the IP addresses of their cloud
services to their customers, and to control how traffic is routed between their customers and their
cloud services.
4. Internet Exchange Points (IXPs): IXPs are physical locations where multiple ISPs connect to exchange
traffic. BGP is used to manage the routing of traffic between the different ISPs at the IXP, ensuring
that traffic is always routed over the most efficient path.
5. Network security: BGP is also used for network security purposes. By using BGP, network
administrators can implement route filtering and route authentication to prevent unauthorized
routing of traffic. This helps to protect against attacks such as IP hijacking and route leaks.
6. Amazon Web Services (AWS): AWS uses BGP to connect its data centers globally, providing reliable
and efficient communication between its different regions. By leveraging BGP, AWS can ensure that
traffic is routed to the nearest data center, minimizing latency and improving the overall user
experience.
7. YouTube: YouTube uses BGP to improve the reliability of its service by ensuring that traffic is rerouted
to an alternative path in the event of a network outage. This helps to minimize downtime and ensure
that users can access the platform without interruption.
8. Google: Google also uses BGP to manage its global network and ensure that traffic is routed efficiently
between its different data centers. By leveraging BGP, Google can optimize the path that traffic takes
to reach its destination, reducing latency and improving the overall performance of its services.
9. Internet Service Providers (ISPs): ISPs use BGP to exchange routing information with other ISPs and
ensure that traffic is routed efficiently across the Internet. By using BGP, ISPs can select the most
optimal path for traffic, reducing latency and improving the overall user experience.
Live Quiz
Lab Outline
1. VoIP Service Provider QoS Case Study: A VoIP service provider implemented QoS to improve call
quality and customer satisfaction. They found that without QoS, network congestion resulted in poor
call quality, causing customer complaints and churn. With QoS, they were able to prioritize VoIP traffic
and maintain call quality, leading to improved customer satisfaction and retention.
2. Online Gaming QoS Case Study: An online gaming company implemented QoS to reduce lag and
improve the overall gaming experience for users. Without QoS, network congestion caused latency
and packet loss, leading to frustrated gamers and negative reviews. With QoS, they were able to
prioritize gaming traffic and reduce lag, resulting in happier gamers and improved customer retention.
3. Healthcare Network QoS Case Study: A healthcare network implemented QoS to ensure critical
patient data could be transmitted without delay or interruption. Without QoS, network congestion
caused delays in transmitting data, leading to potential patient harm. With QoS, they were able to
prioritize critical data traffic and ensure timely transmission, leading to improved patient outcomes.
4. Video Streaming QoS Case Study: A video streaming service implemented QoS to provide a consistent
streaming experience for users. Without QoS, network congestion caused buffering and low-quality
video, leading to user frustration and churn. With QoS, they were able to prioritize video traffic and
ensure a consistent streaming experience, resulting in improved user retention.
These case studies demonstrate the importance of QoS in various industries and use cases, and how it can lead
to improved customer satisfaction and business outcomes.
Live Quiz
● SDWAN Components
● Vmanage, Vsmart, Vbond, Wan Edge
● Initial prerequisite
● Org name, Site-id, System ip
● Controller verification
● Control Connection Verification
● Data connection verification
● TLOC verification
● Template Deployment Verification
● SDWAN policy Components
● Centralize control plane policy Deployment
● Verify control plane policy
● Hub and spoke, Mesh, Custom mesh
● Acl, Nat, DPI, Qos
● Application Aware Routing
● High Availability: Vsmart, Tloc-extention, vrrp
● Troubleshooting and verification
Lab Outline
Case Study
1. Toyota Financial Services (TFS): TFS is a financial services company that was struggling with network
issues caused by latency, application performance, and security concerns. They implemented Cisco
SD-WAN to reduce latency, optimize application performance, and improve security. With the help of
Cisco SD-WAN, TFS was able to reduce the time it took to onboard a new site from six months to just
two weeks, and they improved their overall network reliability by 80%.
2. Carhartt: Carhartt is a clothing and workwear company that needed to improve the reliability and
performance of their network, particularly for their retail stores. They implemented Cisco SD-WAN
and were able to reduce their MPLS costs by 50%, while also improving network performance and
reliability. With the help of Cisco SD-WAN, Carhartt was able to provide better connectivity for their
retail stores, resulting in improved customer experiences.
3. Banco Macro: Banco Macro is an Argentine bank that needed to improve their network performance
and security. They implemented Cisco SD-WAN and were able to improve their network performance
by up to 10 times, while also improving security and reducing costs. With the help of Cisco SD-WAN,
Banco Macro was able to provide better service to their customers and improve their overall business
operations.
4. Lion Group: Lion Group is a Malaysian conglomerate that needed to improve the performance and
reliability of their network, particularly for their retail stores. They implemented Cisco SD-WAN and
were able to reduce their MPLS costs by up to 50%, while also improving network performance and
reliability. With the help of Cisco SD-WAN, Lion Group was able to provide better connectivity for
their retail stores, resulting in improved customer experiences.
Overall, these case studies demonstrate the benefits of Cisco SD-WAN for improving network performance,
reducing costs, and improving security for various types of businesses.
Live Quiz
Lab Outline
Case Study
1. Wi-Fi network design for a large university campus: This case study focuses on the wireless network
design for a large university campus with thousands of students, staff, and faculty members. The case
study explores the fundamentals of wireless networking, such as channel selection, antenna
placement, and access point deployment, to ensure optimal network coverage and performance.
2. Wireless network optimization for a manufacturing plant: This case study examines the challenges of
deploying and optimizing a wireless network in a manufacturing plant, which typically has a high level
of electromagnetic interference from machinery and equipment. The case study explores various
strategies for improving wireless signal strength and minimizing interference, including the use of
specialized antennas, frequency optimization, and signal amplification.
3. Wireless network security for a financial institution: This case study focuses on the fundamentals of
wireless network security, including encryption, authentication, and access control. The case study
examines the challenges of securing a wireless network for a financial institution, which handles
sensitive financial information that must be protected from unauthorized access.
4. Wireless network troubleshooting for a small business: This case study explores the basics of
troubleshooting wireless network connectivity issues in a small business environment. The case study
examines common problems such as signal interference, network congestion, and configuration
errors, and explores strategies for identifying and resolving these issues.
5. Wireless network scalability for a growing company: This case study focuses on the fundamentals of
wireless network scalability, including capacity planning, network architecture, and device
management. The case study examines the challenges of scaling a wireless network to accommodate
a growing number of users and devices, and explores strategies for ensuring network performance
and reliability as the network grows.
Live Quiz
Lab Outline
● Lab 1: Configure an Access Switch for an Endpoint
● Lab 2: Configure the Cisco Unified Communication Manager Core System Settings
● Lab 3: Configure VoIP Dial Peers
● Lab 4: Configure ISDN Circuits and POTS Dial Peers
● Lab 5: Create a Basic Dial Plan
● Lab 6: Explore a Basic Dial Plan
● Lab 7: Configuring Partition and CSS on Cisco Unified Communication Manager
Case Study: Implementing a Global Dial Plan with Cisco Unified Communications
Company Overview:
XYZ Corporation is a global company with offices in multiple countries. The company uses Cisco Unified
Communications for its telephony and collaboration needs.
Challenge:
The company was experiencing difficulty with dialing between its offices in different countries. Each office had
its own dial plan, and there was no consistency between them. This made it difficult for employees to dial
numbers across the organization, and it also led to long-distance charges for international calls.
Solution:
The company decided to implement a global dial plan using Cisco Unified Communications. The project
involved the following steps:
Gateway Deployment: The first step was to deploy gateways at each office location. These gateways would
provide the necessary connectivity between the various offices.
Dial Plan Design: Next, the company designed a new dial plan that would be used across all its offices. The new
dial plan included a standardized numbering scheme, which ensured that every number in the organization
would follow the same format.
Digit Manipulation: The company also implemented digit manipulation rules to ensure that calls were routed
correctly. For example, if an employee in the London office dialed a number in the New York office, the call
would be routed through the appropriate gateway and translated to the correct format.
Translation Patterns: Translation patterns were also configured to allow for the translation of numbers
between different dial plans. For example, if an employee in the London office dialed a number in the Paris
office, the call would be translated to the appropriate format for the Paris office.
Route Patterns: Route patterns were created to define how calls would be routed across the network. This
included routing rules for intra-office calls as well as calls between different offices.
Results:
The implementation of the global dial plan was successful, and it led to a number of benefits for the company.
These included:
Increased Efficiency: The new dial plan made it much easier for employees to dial numbers across the
organization, which increased efficiency and productivity.
Cost Savings: The implementation of the global dial plan led to cost savings for the company, as it eliminated
the need for long-distance charges for international calls.
Simplified Management: The standardized dial plan made it easier for the company to manage its telephony
infrastructure, as there was no longer a need to manage multiple dial plans.
Live Quiz
● Describe what Zscaler Internet Access (ZIA) is and why its important to your organization
● Navigate the ZIA platform with ease to check various configurations
● Identify traffic forwarding best practices
● Recall user authentication methods and best practices
● Review and adjust internet access and security policies
● Resolve common internet access user issues
Case Studies:
1. Littelfuse: Littelfuse, a global leader in circuit protection, was experiencing challenges with its legacy
security infrastructure. The company's existing firewall and web security solutions were unable to
keep pace with its growing business needs, resulting in performance degradation and security gaps.
To address these challenges, Littelfuse turned to Zscaler Internet Access (ZIA) for cloud-delivered
security. By implementing ZIA, Littelfuse was able to achieve improved security, better visibility, and
faster performance. The company was also able to reduce costs by eliminating the need for hardware-
based security appliances.
2. Hilton: Hilton, a leading global hospitality company, was looking to improve its network security and
streamline its security operations. The company's existing security infrastructure was complex and
difficult to manage, resulting in security gaps and compliance issues. Hilton turned to Zscaler Internet
Access to provide cloud-delivered security and simplify its security operations. With ZIA, Hilton was
able to achieve improved security, better visibility, and simplified management. The company was
also able to reduce costs by eliminating the need for multiple security solutions.
3. Cushman & Wakefield: Cushman & Wakefield, a global real estate services firm, was experiencing
challenges with its legacy security infrastructure. The company's existing web security solution was
unable to keep pace with its growing business needs, resulting in performance degradation and
security gaps. To address these challenges, Cushman & Wakefield turned to Zscaler Internet Access
for cloud-delivered security. By implementing ZIA, Cushman & Wakefield was able to achieve
improved security, better visibility, and faster performance. The company was also able to reduce
costs by eliminating the need for hardware-based security appliances.
Overall, these case studies demonstrate the benefits of implementing Zscaler Internet Access for cloud-
delivered security, including improved security, better visibility, simplified management, and cost savings.
Live Quiz