Cisco Sales Expert (CSE) - Security
1 Introduction to Cisco Security Solutions
1-1 Overview of Cisco Security Portfolio
1-2 Understanding the Security Market Landscape
1-3 Cisco Security Solutions Value Proposition
2 Cisco Secure Network Solutions
2-1 Cisco Secure Firewall
2-1 1 Firewall Technologies and Deployment Models
2-1 2 Advanced Threat Protection Features
2-1 3 Integration with Cisco SecureX
2-2 Cisco Secure Network Access
2-2 1 Cisco Identity Services Engine (ISE)
2-2 2 Cisco AnyConnect Secure Mobility Client
2-2 3 Cisco DNA Center for Network Management
2-3 Cisco Secure Internet Gateway (SIG)
2-3 1 Cloud-Delivered Security Services
2-3 2 Integration with Cisco Umbrella
2-3 3 Secure Internet Access for Remote Users
3 Cisco Secure Endpoint Solutions
3-1 Cisco Secure Endpoint (AMP for Endpoints)
3-1 1 Endpoint Detection and Response (EDR)
3-1 2 Advanced Malware Protection (AMP)
3-1 3 Integration with Cisco Threat Response
3-2 Cisco Secure Endpoint Management
3-2 1 Managing Endpoints with Cisco Secure Endpoint
3-2 2 Policy Management and Enforcement
3-2 3 Reporting and Analytics
4 Cisco Secure Cloud and SaaS Solutions
4-1 Cisco Secure Cloud Security Solutions
4-1 1 Cisco Cloud Security Architecture
4-1 2 Cisco Secure Cloud Analytics (Stealthwatch Cloud)
4-1 3 Cisco Secure Cloud Email (Cisco Email Security)
4-2 Cisco Secure SaaS Solutions
4-2 1 Cisco Secure SaaS Applications
4-2 2 Cisco Secure SaaS Integration with Cisco SecureX
4-2 3 Managing SaaS Security with Cisco Secure SaaS
5 Cisco Secure Collaboration Solutions
5-1 Cisco Secure Collaboration Architecture
5-1 1 Cisco Webex Security Features
5-1 2 Cisco Secure Collaboration with Cisco Defense Orchestrator
5-1 3 Secure Collaboration in Hybrid Work Environments
5-2 Cisco Secure Voice and Video Solutions
5-2 1 Cisco Secure Voice Solutions
5-2 2 Cisco Secure Video Conferencing
5-2 3 Integration with Cisco SecureX
6 Cisco Secure Identity and Access Management
6-1 Cisco Secure Identity Solutions
6-1 1 Cisco Identity Services Engine (ISE)
6-1 2 Cisco Duo Security
6-1 3 Cisco Secure Access Solutions
6-2 Cisco Secure Access Management
6-2 1 Access Policy Management
6-2 2 Multi-Factor Authentication (MFA)
6-2 3 Identity and Access Management in Hybrid Environments
7 Cisco Secure Threat Defense and Response
7-1 Cisco Secure Threat Defense Solutions
7-1 1 Cisco Secure Threat Defense Architecture
7-1 2 Cisco Secure Threat Intelligence
7-1 3 Cisco Secure Threat Defense with Cisco SecureX
7-2 Cisco Secure Threat Response
7-2 1 Incident Response and Management
7-2 2 Threat Hunting and Investigation
7-2 3 Integration with Cisco SecureX
8 Cisco SecureX Platform
8-1 Overview of Cisco SecureX
8-1 1 SecureX Architecture and Components
8-1 2 SecureX Orchestration and Automation
8-1 3 SecureX Integration with Cisco Security Solutions
8-2 Using Cisco SecureX
8-2 1 SecureX Dashboard and Reporting
8-2 2 SecureX Workflow Creation and Management
8-2 3 SecureX Threat Response and Investigation
9 Sales and Business Development for Cisco Security Solutions
9-1 Sales Strategies for Cisco Security Solutions
9-1 1 Positioning Cisco Security Solutions
9-1 2 Addressing Customer Security Challenges
9-1 3 Building Security Solution Proposals
9-2 Business Development for Cisco Security
9-2 1 Partnering with Cisco Security Ecosystem
9-2 2 Developing Security Solution Roadmaps
9-2 3 Driving Security Sales Growth
10 Certification Exam Preparation
10-1 Understanding the Exam Structure
10-1 1 Exam Domains and Objectives
10-1 2 Sample Exam Questions and Practice
10-1 3 Preparing for the Exam
Cisco Cloud Security Architecture Explained

Cisco Cloud Security Architecture Explained

Key Concepts

Cloud Security Posture Management (CSPM)

Cloud Security Posture Management (CSPM) is a critical component of Cisco's Cloud Security Architecture. CSPM continuously monitors and assesses the security posture of cloud environments to identify and remediate misconfigurations and vulnerabilities. It provides visibility into cloud resources, compliance with security policies, and automated remediation actions to ensure a robust security posture.

For example, CSPM can detect if a cloud storage bucket is left open and accessible to the public, which could lead to data breaches. It can then automatically apply the necessary security controls to close the bucket and protect the data.

Cloud Access Security Broker (CASB)

Cloud Access Security Broker (CASB) acts as an intermediary between cloud service providers and users, enforcing security policies and providing visibility into cloud usage. CASB solutions monitor and control access to cloud applications, protect data in the cloud, and ensure compliance with organizational policies and regulatory requirements.

Consider a scenario where employees use various cloud applications for work. CASB can monitor these applications to ensure that sensitive data is not being shared inappropriately and that users are accessing the applications securely, thereby protecting the organization from data leaks and unauthorized access.

Secure Web Gateway (SWG)

Secure Web Gateway (SWG) provides protection against web-based threats by filtering web traffic and enforcing security policies. SWG solutions block access to malicious websites, prevent data exfiltration, and enforce acceptable use policies. They are essential for protecting users and data in cloud environments.

Imagine a company with remote employees who access the internet through various devices. SWG ensures that these employees can only access safe and approved websites, preventing them from visiting phishing sites or downloading malware, thereby safeguarding the organization's network and data.

Zero Trust Network Access (ZTNA)

Zero Trust Network Access (ZTNA) is a security model that assumes no trust by default, even for users within the network. ZTNA solutions provide granular access control, continuous authentication, and monitoring to ensure that only authorized users and devices can access specific resources. This model is particularly important in cloud environments where traditional network perimeters are less defined.

Consider a financial institution where employees need access to sensitive customer data. ZTNA ensures that each employee is continuously authenticated and authorized to access only the data and applications they need, reducing the risk of unauthorized access and data breaches.

Examples and Analogies

CSPM: Think of CSPM as a security guard who continuously patrols a building, checking for unlocked doors and potential threats. Just as the guard ensures the building is secure, CSPM ensures the cloud environment is secure and compliant.

CASB: Consider CASB as a bouncer at a nightclub who checks IDs and ensures only authorized individuals enter. Similarly, CASB ensures that only authorized users and devices can access cloud applications, protecting the organization's data.

SWG: Imagine SWG as a traffic cop who directs vehicles to safe routes and prevents them from entering dangerous areas. SWG directs web traffic to safe websites and prevents access to malicious sites, protecting users and data.

ZTNA: Think of ZTNA as a smart lock system that requires continuous verification to access a room. Just as the smart lock ensures only authorized individuals can enter, ZTNA ensures only authorized users and devices can access specific resources in the cloud.

By understanding these key concepts, you can appreciate how Cisco's Cloud Security Architecture provides comprehensive protection for cloud environments, ensuring data security, compliance, and operational integrity.