Cisco Sales Expert (CSE) - Security
1 Introduction to Cisco Security Solutions
1-1 Overview of Cisco Security Portfolio
1-2 Understanding the Security Market Landscape
1-3 Cisco Security Solutions Value Proposition
2 Cisco Secure Network Solutions
2-1 Cisco Secure Firewall
2-1 1 Firewall Technologies and Deployment Models
2-1 2 Advanced Threat Protection Features
2-1 3 Integration with Cisco SecureX
2-2 Cisco Secure Network Access
2-2 1 Cisco Identity Services Engine (ISE)
2-2 2 Cisco AnyConnect Secure Mobility Client
2-2 3 Cisco DNA Center for Network Management
2-3 Cisco Secure Internet Gateway (SIG)
2-3 1 Cloud-Delivered Security Services
2-3 2 Integration with Cisco Umbrella
2-3 3 Secure Internet Access for Remote Users
3 Cisco Secure Endpoint Solutions
3-1 Cisco Secure Endpoint (AMP for Endpoints)
3-1 1 Endpoint Detection and Response (EDR)
3-1 2 Advanced Malware Protection (AMP)
3-1 3 Integration with Cisco Threat Response
3-2 Cisco Secure Endpoint Management
3-2 1 Managing Endpoints with Cisco Secure Endpoint
3-2 2 Policy Management and Enforcement
3-2 3 Reporting and Analytics
4 Cisco Secure Cloud and SaaS Solutions
4-1 Cisco Secure Cloud Security Solutions
4-1 1 Cisco Cloud Security Architecture
4-1 2 Cisco Secure Cloud Analytics (Stealthwatch Cloud)
4-1 3 Cisco Secure Cloud Email (Cisco Email Security)
4-2 Cisco Secure SaaS Solutions
4-2 1 Cisco Secure SaaS Applications
4-2 2 Cisco Secure SaaS Integration with Cisco SecureX
4-2 3 Managing SaaS Security with Cisco Secure SaaS
5 Cisco Secure Collaboration Solutions
5-1 Cisco Secure Collaboration Architecture
5-1 1 Cisco Webex Security Features
5-1 2 Cisco Secure Collaboration with Cisco Defense Orchestrator
5-1 3 Secure Collaboration in Hybrid Work Environments
5-2 Cisco Secure Voice and Video Solutions
5-2 1 Cisco Secure Voice Solutions
5-2 2 Cisco Secure Video Conferencing
5-2 3 Integration with Cisco SecureX
6 Cisco Secure Identity and Access Management
6-1 Cisco Secure Identity Solutions
6-1 1 Cisco Identity Services Engine (ISE)
6-1 2 Cisco Duo Security
6-1 3 Cisco Secure Access Solutions
6-2 Cisco Secure Access Management
6-2 1 Access Policy Management
6-2 2 Multi-Factor Authentication (MFA)
6-2 3 Identity and Access Management in Hybrid Environments
7 Cisco Secure Threat Defense and Response
7-1 Cisco Secure Threat Defense Solutions
7-1 1 Cisco Secure Threat Defense Architecture
7-1 2 Cisco Secure Threat Intelligence
7-1 3 Cisco Secure Threat Defense with Cisco SecureX
7-2 Cisco Secure Threat Response
7-2 1 Incident Response and Management
7-2 2 Threat Hunting and Investigation
7-2 3 Integration with Cisco SecureX
8 Cisco SecureX Platform
8-1 Overview of Cisco SecureX
8-1 1 SecureX Architecture and Components
8-1 2 SecureX Orchestration and Automation
8-1 3 SecureX Integration with Cisco Security Solutions
8-2 Using Cisco SecureX
8-2 1 SecureX Dashboard and Reporting
8-2 2 SecureX Workflow Creation and Management
8-2 3 SecureX Threat Response and Investigation
9 Sales and Business Development for Cisco Security Solutions
9-1 Sales Strategies for Cisco Security Solutions
9-1 1 Positioning Cisco Security Solutions
9-1 2 Addressing Customer Security Challenges
9-1 3 Building Security Solution Proposals
9-2 Business Development for Cisco Security
9-2 1 Partnering with Cisco Security Ecosystem
9-2 2 Developing Security Solution Roadmaps
9-2 3 Driving Security Sales Growth
10 Certification Exam Preparation
10-1 Understanding the Exam Structure
10-1 1 Exam Domains and Objectives
10-1 2 Sample Exam Questions and Practice
10-1 3 Preparing for the Exam
Cisco Secure Endpoint Solutions

Cisco Secure Endpoint Solutions

Key Concepts

Cisco Secure Endpoint (AMP for Endpoints)

Cisco Secure Endpoint, formerly known as AMP for Endpoints, is a comprehensive endpoint protection platform designed to detect, respond, and remediate advanced threats. It uses advanced malware protection (AMP) technology to provide continuous analysis and protection against malware threats. AMP leverages behavioral analysis and cloud-based threat intelligence to detect and mitigate malware in real-time, ensuring that even unknown or zero-day threats are identified and blocked before they can cause harm.

For example, if a user downloads a suspicious file, AMP will analyze the file's behavior in a secure environment. If the file exhibits malicious behavior, AMP will quarantine it and prevent it from executing on the endpoint, thereby protecting the network from potential damage.

Cisco Secure Endpoint with Umbrella

Cisco Secure Endpoint with Umbrella combines endpoint protection with cloud-delivered security. Umbrella, a Secure Internet Gateway (SIG), provides protection against internet-based threats such as malware, phishing, and malicious websites. By integrating Umbrella with Secure Endpoint, organizations can ensure that both local and remote users are protected from a wide range of threats. This integrated solution offers a unified management console, making it easier to monitor and control security policies across the organization.

Imagine a scenario where an employee working from home clicks on a malicious link. Umbrella will block the request before it reaches the endpoint, preventing any potential infection. If the endpoint is already compromised, Secure Endpoint will detect and remediate the threat, ensuring comprehensive protection.

Cisco Secure Endpoint with Duo

Cisco Secure Endpoint with Duo integrates endpoint protection with multi-factor authentication (MFA). Duo Security, a Cisco company, provides strong authentication solutions that ensure only authorized users can access sensitive data and applications. By combining Secure Endpoint with Duo, organizations can enhance their security posture by verifying user identities and ensuring that only compliant and authorized devices can access the network.

Consider a situation where an employee attempts to log in to a corporate application from an unrecognized device. Duo will prompt the user for additional verification, such as a push notification to their smartphone. If the verification is successful, Secure Endpoint will check the device's security posture. If the device meets the security requirements, access will be granted, ensuring both user and device authentication.

By leveraging these Cisco Secure Endpoint solutions, organizations can enhance their security posture, protect their data, and ensure compliance in a rapidly evolving threat landscape.