Cisco Sales Expert (CSE) - Security
1 Introduction to Cisco Security Solutions
1-1 Overview of Cisco Security Portfolio
1-2 Understanding the Security Market Landscape
1-3 Cisco Security Solutions Value Proposition
2 Cisco Secure Network Solutions
2-1 Cisco Secure Firewall
2-1 1 Firewall Technologies and Deployment Models
2-1 2 Advanced Threat Protection Features
2-1 3 Integration with Cisco SecureX
2-2 Cisco Secure Network Access
2-2 1 Cisco Identity Services Engine (ISE)
2-2 2 Cisco AnyConnect Secure Mobility Client
2-2 3 Cisco DNA Center for Network Management
2-3 Cisco Secure Internet Gateway (SIG)
2-3 1 Cloud-Delivered Security Services
2-3 2 Integration with Cisco Umbrella
2-3 3 Secure Internet Access for Remote Users
3 Cisco Secure Endpoint Solutions
3-1 Cisco Secure Endpoint (AMP for Endpoints)
3-1 1 Endpoint Detection and Response (EDR)
3-1 2 Advanced Malware Protection (AMP)
3-1 3 Integration with Cisco Threat Response
3-2 Cisco Secure Endpoint Management
3-2 1 Managing Endpoints with Cisco Secure Endpoint
3-2 2 Policy Management and Enforcement
3-2 3 Reporting and Analytics
4 Cisco Secure Cloud and SaaS Solutions
4-1 Cisco Secure Cloud Security Solutions
4-1 1 Cisco Cloud Security Architecture
4-1 2 Cisco Secure Cloud Analytics (Stealthwatch Cloud)
4-1 3 Cisco Secure Cloud Email (Cisco Email Security)
4-2 Cisco Secure SaaS Solutions
4-2 1 Cisco Secure SaaS Applications
4-2 2 Cisco Secure SaaS Integration with Cisco SecureX
4-2 3 Managing SaaS Security with Cisco Secure SaaS
5 Cisco Secure Collaboration Solutions
5-1 Cisco Secure Collaboration Architecture
5-1 1 Cisco Webex Security Features
5-1 2 Cisco Secure Collaboration with Cisco Defense Orchestrator
5-1 3 Secure Collaboration in Hybrid Work Environments
5-2 Cisco Secure Voice and Video Solutions
5-2 1 Cisco Secure Voice Solutions
5-2 2 Cisco Secure Video Conferencing
5-2 3 Integration with Cisco SecureX
6 Cisco Secure Identity and Access Management
6-1 Cisco Secure Identity Solutions
6-1 1 Cisco Identity Services Engine (ISE)
6-1 2 Cisco Duo Security
6-1 3 Cisco Secure Access Solutions
6-2 Cisco Secure Access Management
6-2 1 Access Policy Management
6-2 2 Multi-Factor Authentication (MFA)
6-2 3 Identity and Access Management in Hybrid Environments
7 Cisco Secure Threat Defense and Response
7-1 Cisco Secure Threat Defense Solutions
7-1 1 Cisco Secure Threat Defense Architecture
7-1 2 Cisco Secure Threat Intelligence
7-1 3 Cisco Secure Threat Defense with Cisco SecureX
7-2 Cisco Secure Threat Response
7-2 1 Incident Response and Management
7-2 2 Threat Hunting and Investigation
7-2 3 Integration with Cisco SecureX
8 Cisco SecureX Platform
8-1 Overview of Cisco SecureX
8-1 1 SecureX Architecture and Components
8-1 2 SecureX Orchestration and Automation
8-1 3 SecureX Integration with Cisco Security Solutions
8-2 Using Cisco SecureX
8-2 1 SecureX Dashboard and Reporting
8-2 2 SecureX Workflow Creation and Management
8-2 3 SecureX Threat Response and Investigation
9 Sales and Business Development for Cisco Security Solutions
9-1 Sales Strategies for Cisco Security Solutions
9-1 1 Positioning Cisco Security Solutions
9-1 2 Addressing Customer Security Challenges
9-1 3 Building Security Solution Proposals
9-2 Business Development for Cisco Security
9-2 1 Partnering with Cisco Security Ecosystem
9-2 2 Developing Security Solution Roadmaps
9-2 3 Driving Security Sales Growth
10 Certification Exam Preparation
10-1 Understanding the Exam Structure
10-1 1 Exam Domains and Objectives
10-1 2 Sample Exam Questions and Practice
10-1 3 Preparing for the Exam
Cisco Secure Collaboration Solutions Explained

Cisco Secure Collaboration Solutions Explained

Key Concepts

Cisco Webex Secure Video Conferencing

Cisco Webex Secure Video Conferencing provides end-to-end encryption for video meetings, ensuring that all communications are secure and private. It includes features such as secure meeting links, password protection, and participant authentication to prevent unauthorized access. Additionally, Webex offers real-time threat detection and response to protect against cyber threats during meetings.

For example, a global corporation can use Webex to hold secure virtual meetings with partners and clients. The end-to-end encryption ensures that sensitive discussions remain confidential, while participant authentication prevents unauthorized individuals from joining the meeting.

Cisco Jabber Secure Messaging

Cisco Jabber Secure Messaging enables secure communication through instant messaging, voice, and video calls. It provides encryption for all communications, ensuring that messages and calls are protected from interception. Jabber also includes features such as message logging and compliance with regulatory requirements, making it suitable for industries with strict data protection standards.

Consider a healthcare provider that uses Jabber for internal communications. The encryption ensures that patient information shared via messaging is secure, while message logging helps maintain compliance with healthcare regulations.

Cisco Unified Communications Manager (CUCM) Security

Cisco Unified Communications Manager (CUCM) Security provides comprehensive security for voice and video communications. It includes features such as secure call routing, encryption for voice and video traffic, and secure device registration. CUCM also offers advanced threat protection to detect and mitigate potential security threats in real-time.

Imagine a financial institution that relies on CUCM for its communication infrastructure. The secure call routing and encryption ensure that all communications are protected, while advanced threat protection safeguards against potential cyberattacks.

Cisco Secure Endpoint for Collaboration Devices

Cisco Secure Endpoint for Collaboration Devices provides security for collaboration devices such as video conferencing systems and IP phones. It includes features such as device authentication, secure firmware updates, and real-time threat detection. This ensures that collaboration devices are secure and protected from potential vulnerabilities.

For instance, a large enterprise can use Secure Endpoint to secure its video conferencing systems. Device authentication ensures that only authorized devices can connect, while real-time threat detection protects against potential security breaches.

Cisco Duo Secure Authentication

Cisco Duo Secure Authentication provides multi-factor authentication (MFA) for collaboration solutions, ensuring that only authorized users can access secure communications. Duo offers a user-friendly experience with features such as push notifications and SMS-based authentication. It also includes advanced security features such as device health checks and risk-based authentication.

Consider a government agency that uses Duo for secure authentication. The MFA ensures that only authorized personnel can access sensitive communications, while device health checks protect against compromised devices.

By leveraging these Cisco Secure Collaboration Solutions, organizations can ensure secure and reliable communication, protecting sensitive information and maintaining compliance with regulatory requirements.