Cisco Sales Expert (CSE) - Security
1 Introduction to Cisco Security Solutions
1-1 Overview of Cisco Security Portfolio
1-2 Understanding the Security Market Landscape
1-3 Cisco Security Solutions Value Proposition
2 Cisco Secure Network Solutions
2-1 Cisco Secure Firewall
2-1 1 Firewall Technologies and Deployment Models
2-1 2 Advanced Threat Protection Features
2-1 3 Integration with Cisco SecureX
2-2 Cisco Secure Network Access
2-2 1 Cisco Identity Services Engine (ISE)
2-2 2 Cisco AnyConnect Secure Mobility Client
2-2 3 Cisco DNA Center for Network Management
2-3 Cisco Secure Internet Gateway (SIG)
2-3 1 Cloud-Delivered Security Services
2-3 2 Integration with Cisco Umbrella
2-3 3 Secure Internet Access for Remote Users
3 Cisco Secure Endpoint Solutions
3-1 Cisco Secure Endpoint (AMP for Endpoints)
3-1 1 Endpoint Detection and Response (EDR)
3-1 2 Advanced Malware Protection (AMP)
3-1 3 Integration with Cisco Threat Response
3-2 Cisco Secure Endpoint Management
3-2 1 Managing Endpoints with Cisco Secure Endpoint
3-2 2 Policy Management and Enforcement
3-2 3 Reporting and Analytics
4 Cisco Secure Cloud and SaaS Solutions
4-1 Cisco Secure Cloud Security Solutions
4-1 1 Cisco Cloud Security Architecture
4-1 2 Cisco Secure Cloud Analytics (Stealthwatch Cloud)
4-1 3 Cisco Secure Cloud Email (Cisco Email Security)
4-2 Cisco Secure SaaS Solutions
4-2 1 Cisco Secure SaaS Applications
4-2 2 Cisco Secure SaaS Integration with Cisco SecureX
4-2 3 Managing SaaS Security with Cisco Secure SaaS
5 Cisco Secure Collaboration Solutions
5-1 Cisco Secure Collaboration Architecture
5-1 1 Cisco Webex Security Features
5-1 2 Cisco Secure Collaboration with Cisco Defense Orchestrator
5-1 3 Secure Collaboration in Hybrid Work Environments
5-2 Cisco Secure Voice and Video Solutions
5-2 1 Cisco Secure Voice Solutions
5-2 2 Cisco Secure Video Conferencing
5-2 3 Integration with Cisco SecureX
6 Cisco Secure Identity and Access Management
6-1 Cisco Secure Identity Solutions
6-1 1 Cisco Identity Services Engine (ISE)
6-1 2 Cisco Duo Security
6-1 3 Cisco Secure Access Solutions
6-2 Cisco Secure Access Management
6-2 1 Access Policy Management
6-2 2 Multi-Factor Authentication (MFA)
6-2 3 Identity and Access Management in Hybrid Environments
7 Cisco Secure Threat Defense and Response
7-1 Cisco Secure Threat Defense Solutions
7-1 1 Cisco Secure Threat Defense Architecture
7-1 2 Cisco Secure Threat Intelligence
7-1 3 Cisco Secure Threat Defense with Cisco SecureX
7-2 Cisco Secure Threat Response
7-2 1 Incident Response and Management
7-2 2 Threat Hunting and Investigation
7-2 3 Integration with Cisco SecureX
8 Cisco SecureX Platform
8-1 Overview of Cisco SecureX
8-1 1 SecureX Architecture and Components
8-1 2 SecureX Orchestration and Automation
8-1 3 SecureX Integration with Cisco Security Solutions
8-2 Using Cisco SecureX
8-2 1 SecureX Dashboard and Reporting
8-2 2 SecureX Workflow Creation and Management
8-2 3 SecureX Threat Response and Investigation
9 Sales and Business Development for Cisco Security Solutions
9-1 Sales Strategies for Cisco Security Solutions
9-1 1 Positioning Cisco Security Solutions
9-1 2 Addressing Customer Security Challenges
9-1 3 Building Security Solution Proposals
9-2 Business Development for Cisco Security
9-2 1 Partnering with Cisco Security Ecosystem
9-2 2 Developing Security Solution Roadmaps
9-2 3 Driving Security Sales Growth
10 Certification Exam Preparation
10-1 Understanding the Exam Structure
10-1 1 Exam Domains and Objectives
10-1 2 Sample Exam Questions and Practice
10-1 3 Preparing for the Exam
Cisco Duo Security Explained

Cisco Duo Security Explained

Key Concepts

Multi-Factor Authentication (MFA)

Multi-Factor Authentication (MFA) is a security process that requires users to provide two or more verification factors to gain access to a resource. Cisco Duo Security uses MFA to enhance security by ensuring that users are who they claim to be. Common factors include something the user knows (password), something the user has (mobile device), and something the user is (biometric data).

For example, when logging into a corporate network, a user might be required to enter a password and then confirm their identity by approving a push notification sent to their mobile device.

Device Health Checks

Device Health Checks ensure that only trusted and secure devices can access corporate resources. Cisco Duo Security evaluates the health and security posture of devices, including their operating system, installed applications, and security settings. If a device is deemed insecure, access can be blocked or restricted.

Consider a scenario where an employee tries to access company data from a personal laptop that lacks up-to-date antivirus software. Duo Security can detect this and prevent access until the device is secured.

Adaptive Authentication

Adaptive Authentication dynamically adjusts the level of security required based on the context of the access request. Cisco Duo Security uses contextual factors such as user behavior, location, time of day, and device type to determine the appropriate security measures. This ensures that high-risk access attempts receive more scrutiny while low-risk ones are streamlined.

For instance, if a user typically logs in from their office during business hours, Duo Security might require only a password. However, if the same user attempts to log in from a different country at midnight, Duo might enforce MFA to verify their identity.

Single Sign-On (SSO)

Single Sign-On (SSO) allows users to authenticate once and gain access to multiple applications without needing to re-enter credentials. Cisco Duo Security integrates with SSO solutions to provide a seamless and secure authentication experience. This reduces the burden on users while maintaining strong security.

Imagine a company where employees need to access multiple applications like email, CRM, and HR systems. With Duo Security and SSO, employees can log in once and access all these applications without re-authenticating.

Security Policies

Security Policies define the rules and conditions under which users are granted or denied access to resources. Cisco Duo Security allows organizations to create and enforce granular security policies based on user roles, device types, locations, and other factors. These policies ensure that access is granted only when appropriate.

For example, a security policy might require MFA for all remote access but allow password-only access for on-site employees during business hours.

Examples and Analogies

Multi-Factor Authentication (MFA): Think of MFA as a layered security system where multiple locks must be opened to access a room. Just as multiple locks provide stronger security, MFA ensures that users must provide multiple proofs of identity.

Device Health Checks: Consider device health checks as a security guard who inspects the condition of vehicles before allowing them into a secure area. Similarly, Duo Security inspects devices to ensure they meet security standards.

Adaptive Authentication: Imagine adaptive authentication as a smart thermostat that adjusts the temperature based on the environment. Similarly, Duo Security adjusts security measures based on the context of the access request.

Single Sign-On (SSO): Think of SSO as a universal key that opens multiple doors. Just as one key simplifies access to multiple rooms, SSO simplifies access to multiple applications.

Security Policies: Consider security policies as traffic rules that govern how vehicles move. Similarly, security policies govern how users access resources, ensuring that access is controlled and secure.

By understanding these key concepts, you can appreciate how Cisco Duo Security provides comprehensive protection for user authentication, device security, and access control, ensuring a secure and seamless experience for users and administrators alike.