Cisco Sales Expert (CSE) - Security
1 Introduction to Cisco Security Solutions
1-1 Overview of Cisco Security Portfolio
1-2 Understanding the Security Market Landscape
1-3 Cisco Security Solutions Value Proposition
2 Cisco Secure Network Solutions
2-1 Cisco Secure Firewall
2-1 1 Firewall Technologies and Deployment Models
2-1 2 Advanced Threat Protection Features
2-1 3 Integration with Cisco SecureX
2-2 Cisco Secure Network Access
2-2 1 Cisco Identity Services Engine (ISE)
2-2 2 Cisco AnyConnect Secure Mobility Client
2-2 3 Cisco DNA Center for Network Management
2-3 Cisco Secure Internet Gateway (SIG)
2-3 1 Cloud-Delivered Security Services
2-3 2 Integration with Cisco Umbrella
2-3 3 Secure Internet Access for Remote Users
3 Cisco Secure Endpoint Solutions
3-1 Cisco Secure Endpoint (AMP for Endpoints)
3-1 1 Endpoint Detection and Response (EDR)
3-1 2 Advanced Malware Protection (AMP)
3-1 3 Integration with Cisco Threat Response
3-2 Cisco Secure Endpoint Management
3-2 1 Managing Endpoints with Cisco Secure Endpoint
3-2 2 Policy Management and Enforcement
3-2 3 Reporting and Analytics
4 Cisco Secure Cloud and SaaS Solutions
4-1 Cisco Secure Cloud Security Solutions
4-1 1 Cisco Cloud Security Architecture
4-1 2 Cisco Secure Cloud Analytics (Stealthwatch Cloud)
4-1 3 Cisco Secure Cloud Email (Cisco Email Security)
4-2 Cisco Secure SaaS Solutions
4-2 1 Cisco Secure SaaS Applications
4-2 2 Cisco Secure SaaS Integration with Cisco SecureX
4-2 3 Managing SaaS Security with Cisco Secure SaaS
5 Cisco Secure Collaboration Solutions
5-1 Cisco Secure Collaboration Architecture
5-1 1 Cisco Webex Security Features
5-1 2 Cisco Secure Collaboration with Cisco Defense Orchestrator
5-1 3 Secure Collaboration in Hybrid Work Environments
5-2 Cisco Secure Voice and Video Solutions
5-2 1 Cisco Secure Voice Solutions
5-2 2 Cisco Secure Video Conferencing
5-2 3 Integration with Cisco SecureX
6 Cisco Secure Identity and Access Management
6-1 Cisco Secure Identity Solutions
6-1 1 Cisco Identity Services Engine (ISE)
6-1 2 Cisco Duo Security
6-1 3 Cisco Secure Access Solutions
6-2 Cisco Secure Access Management
6-2 1 Access Policy Management
6-2 2 Multi-Factor Authentication (MFA)
6-2 3 Identity and Access Management in Hybrid Environments
7 Cisco Secure Threat Defense and Response
7-1 Cisco Secure Threat Defense Solutions
7-1 1 Cisco Secure Threat Defense Architecture
7-1 2 Cisco Secure Threat Intelligence
7-1 3 Cisco Secure Threat Defense with Cisco SecureX
7-2 Cisco Secure Threat Response
7-2 1 Incident Response and Management
7-2 2 Threat Hunting and Investigation
7-2 3 Integration with Cisco SecureX
8 Cisco SecureX Platform
8-1 Overview of Cisco SecureX
8-1 1 SecureX Architecture and Components
8-1 2 SecureX Orchestration and Automation
8-1 3 SecureX Integration with Cisco Security Solutions
8-2 Using Cisco SecureX
8-2 1 SecureX Dashboard and Reporting
8-2 2 SecureX Workflow Creation and Management
8-2 3 SecureX Threat Response and Investigation
9 Sales and Business Development for Cisco Security Solutions
9-1 Sales Strategies for Cisco Security Solutions
9-1 1 Positioning Cisco Security Solutions
9-1 2 Addressing Customer Security Challenges
9-1 3 Building Security Solution Proposals
9-2 Business Development for Cisco Security
9-2 1 Partnering with Cisco Security Ecosystem
9-2 2 Developing Security Solution Roadmaps
9-2 3 Driving Security Sales Growth
10 Certification Exam Preparation
10-1 Understanding the Exam Structure
10-1 1 Exam Domains and Objectives
10-1 2 Sample Exam Questions and Practice
10-1 3 Preparing for the Exam
Cisco Secure Network Access

Cisco Secure Network Access

Key Concepts

Zero Trust Model

The Zero Trust model is a security framework that assumes no user or device should be trusted by default, even if they are inside the network. This model requires continuous verification of user identities and device health before granting access to resources. Cisco Secure Network Access leverages the Zero Trust model to ensure that only authenticated and authorized users and devices can access the network.

Identity Services Engine (ISE)

Cisco Identity Services Engine (ISE) is a comprehensive identity and access management solution that provides centralized policy management and enforcement. ISE integrates with various network access control mechanisms to ensure that only compliant and authorized devices can connect to the network. It supports multiple authentication methods, including 802.1X, MAC authentication bypass (MAB), and web authentication.

Network Admission Control (NAC)

Network Admission Control (NAC) is a security mechanism that enforces compliance with organizational security policies before allowing devices to access the network. Cisco Secure Network Access uses NAC to ensure that devices meet specific security requirements, such as having up-to-date antivirus software, operating system patches, and other security configurations. If a device does not meet these requirements, it is either denied access or placed in a quarantine network for remediation.

Continuous Authentication

Continuous authentication is a security approach that continuously verifies the identity of users and devices throughout their session, rather than just at the time of initial access. Cisco Secure Network Access implements continuous authentication to monitor user and device behavior in real-time. This ensures that any suspicious activities are detected and appropriate actions are taken, such as revoking access or triggering an alert.

Examples and Analogies

Consider a secure office building where only authorized personnel are allowed entry. The Zero Trust model is like a security system that requires everyone to present their credentials at every door, even if they have already entered the building. Cisco ISE acts as the central security desk that verifies these credentials and maintains a record of who is in the building and where they are allowed to go. NAC is the security guard who checks each person's badge and ensures they are following the rules, such as wearing a visitor badge in certain areas. Continuous authentication is like a surveillance system that monitors everyone's movements and actions, sounding an alarm if someone behaves suspiciously.

Another analogy is that of a secure online banking system. Just as the bank continuously verifies your identity and monitors your transactions to prevent fraud, Cisco Secure Network Access continuously verifies user and device identities and monitors network activities to prevent security breaches.