Cisco Sales Expert (CSE) - Security
1 Introduction to Cisco Security Solutions
1-1 Overview of Cisco Security Portfolio
1-2 Understanding the Security Market Landscape
1-3 Cisco Security Solutions Value Proposition
2 Cisco Secure Network Solutions
2-1 Cisco Secure Firewall
2-1 1 Firewall Technologies and Deployment Models
2-1 2 Advanced Threat Protection Features
2-1 3 Integration with Cisco SecureX
2-2 Cisco Secure Network Access
2-2 1 Cisco Identity Services Engine (ISE)
2-2 2 Cisco AnyConnect Secure Mobility Client
2-2 3 Cisco DNA Center for Network Management
2-3 Cisco Secure Internet Gateway (SIG)
2-3 1 Cloud-Delivered Security Services
2-3 2 Integration with Cisco Umbrella
2-3 3 Secure Internet Access for Remote Users
3 Cisco Secure Endpoint Solutions
3-1 Cisco Secure Endpoint (AMP for Endpoints)
3-1 1 Endpoint Detection and Response (EDR)
3-1 2 Advanced Malware Protection (AMP)
3-1 3 Integration with Cisco Threat Response
3-2 Cisco Secure Endpoint Management
3-2 1 Managing Endpoints with Cisco Secure Endpoint
3-2 2 Policy Management and Enforcement
3-2 3 Reporting and Analytics
4 Cisco Secure Cloud and SaaS Solutions
4-1 Cisco Secure Cloud Security Solutions
4-1 1 Cisco Cloud Security Architecture
4-1 2 Cisco Secure Cloud Analytics (Stealthwatch Cloud)
4-1 3 Cisco Secure Cloud Email (Cisco Email Security)
4-2 Cisco Secure SaaS Solutions
4-2 1 Cisco Secure SaaS Applications
4-2 2 Cisco Secure SaaS Integration with Cisco SecureX
4-2 3 Managing SaaS Security with Cisco Secure SaaS
5 Cisco Secure Collaboration Solutions
5-1 Cisco Secure Collaboration Architecture
5-1 1 Cisco Webex Security Features
5-1 2 Cisco Secure Collaboration with Cisco Defense Orchestrator
5-1 3 Secure Collaboration in Hybrid Work Environments
5-2 Cisco Secure Voice and Video Solutions
5-2 1 Cisco Secure Voice Solutions
5-2 2 Cisco Secure Video Conferencing
5-2 3 Integration with Cisco SecureX
6 Cisco Secure Identity and Access Management
6-1 Cisco Secure Identity Solutions
6-1 1 Cisco Identity Services Engine (ISE)
6-1 2 Cisco Duo Security
6-1 3 Cisco Secure Access Solutions
6-2 Cisco Secure Access Management
6-2 1 Access Policy Management
6-2 2 Multi-Factor Authentication (MFA)
6-2 3 Identity and Access Management in Hybrid Environments
7 Cisco Secure Threat Defense and Response
7-1 Cisco Secure Threat Defense Solutions
7-1 1 Cisco Secure Threat Defense Architecture
7-1 2 Cisco Secure Threat Intelligence
7-1 3 Cisco Secure Threat Defense with Cisco SecureX
7-2 Cisco Secure Threat Response
7-2 1 Incident Response and Management
7-2 2 Threat Hunting and Investigation
7-2 3 Integration with Cisco SecureX
8 Cisco SecureX Platform
8-1 Overview of Cisco SecureX
8-1 1 SecureX Architecture and Components
8-1 2 SecureX Orchestration and Automation
8-1 3 SecureX Integration with Cisco Security Solutions
8-2 Using Cisco SecureX
8-2 1 SecureX Dashboard and Reporting
8-2 2 SecureX Workflow Creation and Management
8-2 3 SecureX Threat Response and Investigation
9 Sales and Business Development for Cisco Security Solutions
9-1 Sales Strategies for Cisco Security Solutions
9-1 1 Positioning Cisco Security Solutions
9-1 2 Addressing Customer Security Challenges
9-1 3 Building Security Solution Proposals
9-2 Business Development for Cisco Security
9-2 1 Partnering with Cisco Security Ecosystem
9-2 2 Developing Security Solution Roadmaps
9-2 3 Driving Security Sales Growth
10 Certification Exam Preparation
10-1 Understanding the Exam Structure
10-1 1 Exam Domains and Objectives
10-1 2 Sample Exam Questions and Practice
10-1 3 Preparing for the Exam
Cisco Secure Internet Gateway (SIG) Explained

Cisco Secure Internet Gateway (SIG) Explained

Key Concepts

Cloud-Delivered Security

Cisco Secure Internet Gateway (SIG) is a cloud-delivered security service that provides protection against internet-based threats. Unlike traditional on-premises solutions, SIG operates in the cloud, offering scalable and flexible security without the need for additional hardware. This cloud-based approach ensures that organizations can protect their users and data regardless of their physical location.

Global Threat Intelligence

SIG leverages Cisco's global threat intelligence, powered by Talos, one of the world's largest commercial threat intelligence teams. This intelligence is continuously updated to provide real-time protection against the latest threats. By integrating this threat intelligence, SIG can proactively block malicious domains, URLs, and IP addresses, ensuring that users are protected from known and emerging threats.

Secure Web Gateway (SWG)

Secure Web Gateway (SWG) is a core component of SIG that filters web traffic to block access to malicious websites and enforce web usage policies. SWG uses advanced techniques such as URL filtering, malware scanning, and SSL/TLS inspection to ensure that only safe and compliant web content is accessed. This helps organizations maintain productivity and protect against web-based threats.

DNS Security

DNS Security is another critical feature of SIG that protects against DNS-based attacks. DNS (Domain Name System) is often a target for cybercriminals because it is a fundamental part of internet communication. SIG's DNS Security feature monitors and filters DNS queries to block malicious domains, preventing attackers from redirecting users to harmful websites.

Advanced Malware Protection (AMP)

Advanced Malware Protection (AMP) is integrated into SIG to provide continuous analysis and protection against malware threats. AMP uses behavioral analysis and cloud-based threat intelligence to detect and mitigate malware in real-time. This ensures that even unknown or zero-day threats are identified and blocked before they can cause harm.

Examples and Analogies

Consider a global corporation with employees working in different countries. Traditional security solutions would require deploying and managing hardware in each location, which can be costly and complex. Cisco Secure Internet Gateway (SIG) acts as a global security shield, protecting all employees regardless of their location. This is akin to having a global security team that monitors and protects all company assets, no matter where they are.

Another analogy is that of a smart filter for water. Just as a smart filter ensures that only clean and safe water reaches your home, SIG ensures that only safe and compliant internet traffic reaches your organization. This filter is constantly updated with the latest information about contaminants (threats), ensuring that it can block any harmful substances (malicious content) before they reach your network.

In summary, Cisco Secure Internet Gateway (SIG) is a powerful cloud-delivered security service that provides comprehensive protection against internet-based threats. By leveraging global threat intelligence, secure web gateway capabilities, DNS security, and advanced malware protection, SIG ensures that organizations can maintain a secure and compliant internet environment.