Cisco Sales Expert (CSE) - Security
1 Introduction to Cisco Security Solutions
1-1 Overview of Cisco Security Portfolio
1-2 Understanding the Security Market Landscape
1-3 Cisco Security Solutions Value Proposition
2 Cisco Secure Network Solutions
2-1 Cisco Secure Firewall
2-1 1 Firewall Technologies and Deployment Models
2-1 2 Advanced Threat Protection Features
2-1 3 Integration with Cisco SecureX
2-2 Cisco Secure Network Access
2-2 1 Cisco Identity Services Engine (ISE)
2-2 2 Cisco AnyConnect Secure Mobility Client
2-2 3 Cisco DNA Center for Network Management
2-3 Cisco Secure Internet Gateway (SIG)
2-3 1 Cloud-Delivered Security Services
2-3 2 Integration with Cisco Umbrella
2-3 3 Secure Internet Access for Remote Users
3 Cisco Secure Endpoint Solutions
3-1 Cisco Secure Endpoint (AMP for Endpoints)
3-1 1 Endpoint Detection and Response (EDR)
3-1 2 Advanced Malware Protection (AMP)
3-1 3 Integration with Cisco Threat Response
3-2 Cisco Secure Endpoint Management
3-2 1 Managing Endpoints with Cisco Secure Endpoint
3-2 2 Policy Management and Enforcement
3-2 3 Reporting and Analytics
4 Cisco Secure Cloud and SaaS Solutions
4-1 Cisco Secure Cloud Security Solutions
4-1 1 Cisco Cloud Security Architecture
4-1 2 Cisco Secure Cloud Analytics (Stealthwatch Cloud)
4-1 3 Cisco Secure Cloud Email (Cisco Email Security)
4-2 Cisco Secure SaaS Solutions
4-2 1 Cisco Secure SaaS Applications
4-2 2 Cisco Secure SaaS Integration with Cisco SecureX
4-2 3 Managing SaaS Security with Cisco Secure SaaS
5 Cisco Secure Collaboration Solutions
5-1 Cisco Secure Collaboration Architecture
5-1 1 Cisco Webex Security Features
5-1 2 Cisco Secure Collaboration with Cisco Defense Orchestrator
5-1 3 Secure Collaboration in Hybrid Work Environments
5-2 Cisco Secure Voice and Video Solutions
5-2 1 Cisco Secure Voice Solutions
5-2 2 Cisco Secure Video Conferencing
5-2 3 Integration with Cisco SecureX
6 Cisco Secure Identity and Access Management
6-1 Cisco Secure Identity Solutions
6-1 1 Cisco Identity Services Engine (ISE)
6-1 2 Cisco Duo Security
6-1 3 Cisco Secure Access Solutions
6-2 Cisco Secure Access Management
6-2 1 Access Policy Management
6-2 2 Multi-Factor Authentication (MFA)
6-2 3 Identity and Access Management in Hybrid Environments
7 Cisco Secure Threat Defense and Response
7-1 Cisco Secure Threat Defense Solutions
7-1 1 Cisco Secure Threat Defense Architecture
7-1 2 Cisco Secure Threat Intelligence
7-1 3 Cisco Secure Threat Defense with Cisco SecureX
7-2 Cisco Secure Threat Response
7-2 1 Incident Response and Management
7-2 2 Threat Hunting and Investigation
7-2 3 Integration with Cisco SecureX
8 Cisco SecureX Platform
8-1 Overview of Cisco SecureX
8-1 1 SecureX Architecture and Components
8-1 2 SecureX Orchestration and Automation
8-1 3 SecureX Integration with Cisco Security Solutions
8-2 Using Cisco SecureX
8-2 1 SecureX Dashboard and Reporting
8-2 2 SecureX Workflow Creation and Management
8-2 3 SecureX Threat Response and Investigation
9 Sales and Business Development for Cisco Security Solutions
9-1 Sales Strategies for Cisco Security Solutions
9-1 1 Positioning Cisco Security Solutions
9-1 2 Addressing Customer Security Challenges
9-1 3 Building Security Solution Proposals
9-2 Business Development for Cisco Security
9-2 1 Partnering with Cisco Security Ecosystem
9-2 2 Developing Security Solution Roadmaps
9-2 3 Driving Security Sales Growth
10 Certification Exam Preparation
10-1 Understanding the Exam Structure
10-1 1 Exam Domains and Objectives
10-1 2 Sample Exam Questions and Practice
10-1 3 Preparing for the Exam
3-2 3 Reporting and Analytics Explained

3-2 3 Reporting and Analytics Explained

Key Concepts

Data Collection

Data Collection is the process of gathering and measuring information on targeted variables in an established system, which then enables one to answer relevant questions and evaluate outcomes. In the context of Cisco Security, data collection involves gathering information from various sources such as network traffic, endpoint devices, and security logs.

For example, Cisco Secure Endpoint collects data on the behavior of devices, such as the applications running, network connections made, and files accessed. This data is crucial for identifying potential security threats and understanding the overall security posture of the organization.

Data Analysis

Data Analysis is the process of inspecting, cleansing, transforming, and modeling data with the goal of discovering useful information, informing conclusions, and supporting decision-making. In Cisco Security, data analysis involves using advanced algorithms and machine learning to identify patterns and anomalies in the collected data.

Consider a scenario where a large volume of data is collected from network traffic. Data analysis techniques can identify unusual patterns, such as a sudden spike in traffic to a known malicious IP address. This information can then be used to take proactive measures to prevent a potential security breach.

Reporting

Reporting is the process of organizing and presenting data in a structured format to convey meaningful information. In Cisco Security, reporting provides insights into the effectiveness of security measures, identifies areas of concern, and supports compliance with regulatory requirements.

Imagine a monthly security report that summarizes the number of threats detected, the types of threats, and the actions taken to mitigate them. This report can help security teams assess their performance, identify trends, and make informed decisions to improve security strategies.

Examples and Analogies

Data Collection: Think of data collection as gathering ingredients for a recipe. Just as you need various ingredients to cook a dish, you need various data points to understand the security landscape of an organization.

Data Analysis: Consider data analysis as the process of cooking the ingredients. By combining and transforming the ingredients, you create a dish that is more than the sum of its parts. Similarly, data analysis transforms raw data into actionable insights.

Reporting: Imagine reporting as the presentation of the cooked dish. A well-presented dish not only looks appealing but also conveys the quality of the ingredients and the skill of the chef. Similarly, a well-structured report conveys the value of the data and the effectiveness of the analysis.

By understanding these key concepts, you can appreciate how 3-2 3 Reporting and Analytics provide valuable insights into the security posture of an organization, enabling proactive measures and informed decision-making.