Cisco Sales Expert (CSE) - Security
1 Introduction to Cisco Security Solutions
1-1 Overview of Cisco Security Portfolio
1-2 Understanding the Security Market Landscape
1-3 Cisco Security Solutions Value Proposition
2 Cisco Secure Network Solutions
2-1 Cisco Secure Firewall
2-1 1 Firewall Technologies and Deployment Models
2-1 2 Advanced Threat Protection Features
2-1 3 Integration with Cisco SecureX
2-2 Cisco Secure Network Access
2-2 1 Cisco Identity Services Engine (ISE)
2-2 2 Cisco AnyConnect Secure Mobility Client
2-2 3 Cisco DNA Center for Network Management
2-3 Cisco Secure Internet Gateway (SIG)
2-3 1 Cloud-Delivered Security Services
2-3 2 Integration with Cisco Umbrella
2-3 3 Secure Internet Access for Remote Users
3 Cisco Secure Endpoint Solutions
3-1 Cisco Secure Endpoint (AMP for Endpoints)
3-1 1 Endpoint Detection and Response (EDR)
3-1 2 Advanced Malware Protection (AMP)
3-1 3 Integration with Cisco Threat Response
3-2 Cisco Secure Endpoint Management
3-2 1 Managing Endpoints with Cisco Secure Endpoint
3-2 2 Policy Management and Enforcement
3-2 3 Reporting and Analytics
4 Cisco Secure Cloud and SaaS Solutions
4-1 Cisco Secure Cloud Security Solutions
4-1 1 Cisco Cloud Security Architecture
4-1 2 Cisco Secure Cloud Analytics (Stealthwatch Cloud)
4-1 3 Cisco Secure Cloud Email (Cisco Email Security)
4-2 Cisco Secure SaaS Solutions
4-2 1 Cisco Secure SaaS Applications
4-2 2 Cisco Secure SaaS Integration with Cisco SecureX
4-2 3 Managing SaaS Security with Cisco Secure SaaS
5 Cisco Secure Collaboration Solutions
5-1 Cisco Secure Collaboration Architecture
5-1 1 Cisco Webex Security Features
5-1 2 Cisco Secure Collaboration with Cisco Defense Orchestrator
5-1 3 Secure Collaboration in Hybrid Work Environments
5-2 Cisco Secure Voice and Video Solutions
5-2 1 Cisco Secure Voice Solutions
5-2 2 Cisco Secure Video Conferencing
5-2 3 Integration with Cisco SecureX
6 Cisco Secure Identity and Access Management
6-1 Cisco Secure Identity Solutions
6-1 1 Cisco Identity Services Engine (ISE)
6-1 2 Cisco Duo Security
6-1 3 Cisco Secure Access Solutions
6-2 Cisco Secure Access Management
6-2 1 Access Policy Management
6-2 2 Multi-Factor Authentication (MFA)
6-2 3 Identity and Access Management in Hybrid Environments
7 Cisco Secure Threat Defense and Response
7-1 Cisco Secure Threat Defense Solutions
7-1 1 Cisco Secure Threat Defense Architecture
7-1 2 Cisco Secure Threat Intelligence
7-1 3 Cisco Secure Threat Defense with Cisco SecureX
7-2 Cisco Secure Threat Response
7-2 1 Incident Response and Management
7-2 2 Threat Hunting and Investigation
7-2 3 Integration with Cisco SecureX
8 Cisco SecureX Platform
8-1 Overview of Cisco SecureX
8-1 1 SecureX Architecture and Components
8-1 2 SecureX Orchestration and Automation
8-1 3 SecureX Integration with Cisco Security Solutions
8-2 Using Cisco SecureX
8-2 1 SecureX Dashboard and Reporting
8-2 2 SecureX Workflow Creation and Management
8-2 3 SecureX Threat Response and Investigation
9 Sales and Business Development for Cisco Security Solutions
9-1 Sales Strategies for Cisco Security Solutions
9-1 1 Positioning Cisco Security Solutions
9-1 2 Addressing Customer Security Challenges
9-1 3 Building Security Solution Proposals
9-2 Business Development for Cisco Security
9-2 1 Partnering with Cisco Security Ecosystem
9-2 2 Developing Security Solution Roadmaps
9-2 3 Driving Security Sales Growth
10 Certification Exam Preparation
10-1 Understanding the Exam Structure
10-1 1 Exam Domains and Objectives
10-1 2 Sample Exam Questions and Practice
10-1 3 Preparing for the Exam
6-1-3 Cisco Secure Access Solutions Explained

6-1-3 Cisco Secure Access Solutions Explained

Key Concepts

Zero Trust Architecture

Zero Trust Architecture is a security model that assumes no user or device is inherently trustworthy, regardless of their location or network status. In this model, every access request is verified and authenticated before granting access to resources. Cisco Secure Access Solutions leverage Zero Trust principles to ensure that only authorized users and devices can access sensitive data and applications.

For example, a company implementing Zero Trust would require all employees, whether working from the office or remotely, to authenticate themselves and their devices before accessing corporate resources. This ensures that even if a device is compromised, it cannot access critical data without proper authentication.

Secure Access Service Edge (SASE)

Secure Access Service Edge (SASE) is a cloud-based security model that converges network and security services into a unified platform. SASE provides secure access to applications and data from any location, ensuring consistent security policies are applied regardless of the user's location. Cisco Secure Access Solutions integrate SASE capabilities to deliver secure, seamless access to cloud-based applications and services.

Consider a global enterprise with employees accessing cloud applications from various locations. SASE ensures that all employees, regardless of their location, receive the same level of security and access control, protecting the organization from potential threats.

Identity-Driven Security

Identity-Driven Security focuses on using user identity as the primary factor for access control. By verifying the identity of users and devices, organizations can enforce granular access policies and ensure that only authorized individuals can access specific resources. Cisco Secure Access Solutions use identity-driven security to provide context-aware access control, enhancing security and compliance.

For instance, a financial institution can use identity-driven security to ensure that only senior managers have access to sensitive financial reports. By verifying the identity of users, the institution can enforce strict access controls and protect critical data.

Network Segmentation

Network Segmentation involves dividing a network into smaller, isolated segments to limit the spread of potential threats. By segmenting the network, organizations can apply specific security policies to each segment, reducing the risk of unauthorized access and data breaches. Cisco Secure Access Solutions use network segmentation to enhance security and improve network performance.

Imagine a hospital network with different departments, such as IT, patient records, and administration. Network segmentation ensures that each department's data is isolated, preventing unauthorized access and reducing the risk of data breaches.

Multi-Factor Authentication (MFA)

Multi-Factor Authentication (MFA) is a security mechanism that requires users to provide two or more verification factors to gain access to a resource. MFA enhances security by adding an additional layer of protection beyond just passwords. Cisco Secure Access Solutions implement MFA to ensure that only authenticated users can access sensitive data and applications.

For example, a remote worker accessing corporate email might be required to enter a password and a one-time code sent to their mobile device. This ensures that even if the password is compromised, unauthorized access is prevented.

Examples and Analogies

Zero Trust Architecture: Think of Zero Trust as a fortress where every visitor must show identification and pass through multiple security checkpoints. Similarly, Zero Trust ensures that every access request is thoroughly verified before granting access.

Secure Access Service Edge (SASE): Consider SASE as a secure highway that provides safe passage to various destinations, regardless of the traveler's starting point. Just as the highway ensures safe travel, SASE ensures secure access to applications and data from any location.

Identity-Driven Security: Imagine identity-driven security as a personalized key that unlocks only the doors you are authorized to enter. Similarly, identity-driven security ensures that users can access only the resources they are authorized to use.

Network Segmentation: Think of network segmentation as dividing a large house into separate, secure rooms. Just as each room has its own lock, network segmentation ensures that each segment is isolated and protected.

Multi-Factor Authentication (MFA): Consider MFA as a layered security system where you need multiple keys to unlock a safe. Similarly, MFA requires multiple verification factors to ensure secure access.

By understanding these key concepts, you can appreciate how Cisco Secure Access Solutions provide comprehensive security and access control, ensuring that only authorized users and devices can access sensitive data and applications.