Cisco Sales Expert (CSE) - Security
1 Introduction to Cisco Security Solutions
1-1 Overview of Cisco Security Portfolio
1-2 Understanding the Security Market Landscape
1-3 Cisco Security Solutions Value Proposition
2 Cisco Secure Network Solutions
2-1 Cisco Secure Firewall
2-1 1 Firewall Technologies and Deployment Models
2-1 2 Advanced Threat Protection Features
2-1 3 Integration with Cisco SecureX
2-2 Cisco Secure Network Access
2-2 1 Cisco Identity Services Engine (ISE)
2-2 2 Cisco AnyConnect Secure Mobility Client
2-2 3 Cisco DNA Center for Network Management
2-3 Cisco Secure Internet Gateway (SIG)
2-3 1 Cloud-Delivered Security Services
2-3 2 Integration with Cisco Umbrella
2-3 3 Secure Internet Access for Remote Users
3 Cisco Secure Endpoint Solutions
3-1 Cisco Secure Endpoint (AMP for Endpoints)
3-1 1 Endpoint Detection and Response (EDR)
3-1 2 Advanced Malware Protection (AMP)
3-1 3 Integration with Cisco Threat Response
3-2 Cisco Secure Endpoint Management
3-2 1 Managing Endpoints with Cisco Secure Endpoint
3-2 2 Policy Management and Enforcement
3-2 3 Reporting and Analytics
4 Cisco Secure Cloud and SaaS Solutions
4-1 Cisco Secure Cloud Security Solutions
4-1 1 Cisco Cloud Security Architecture
4-1 2 Cisco Secure Cloud Analytics (Stealthwatch Cloud)
4-1 3 Cisco Secure Cloud Email (Cisco Email Security)
4-2 Cisco Secure SaaS Solutions
4-2 1 Cisco Secure SaaS Applications
4-2 2 Cisco Secure SaaS Integration with Cisco SecureX
4-2 3 Managing SaaS Security with Cisco Secure SaaS
5 Cisco Secure Collaboration Solutions
5-1 Cisco Secure Collaboration Architecture
5-1 1 Cisco Webex Security Features
5-1 2 Cisco Secure Collaboration with Cisco Defense Orchestrator
5-1 3 Secure Collaboration in Hybrid Work Environments
5-2 Cisco Secure Voice and Video Solutions
5-2 1 Cisco Secure Voice Solutions
5-2 2 Cisco Secure Video Conferencing
5-2 3 Integration with Cisco SecureX
6 Cisco Secure Identity and Access Management
6-1 Cisco Secure Identity Solutions
6-1 1 Cisco Identity Services Engine (ISE)
6-1 2 Cisco Duo Security
6-1 3 Cisco Secure Access Solutions
6-2 Cisco Secure Access Management
6-2 1 Access Policy Management
6-2 2 Multi-Factor Authentication (MFA)
6-2 3 Identity and Access Management in Hybrid Environments
7 Cisco Secure Threat Defense and Response
7-1 Cisco Secure Threat Defense Solutions
7-1 1 Cisco Secure Threat Defense Architecture
7-1 2 Cisco Secure Threat Intelligence
7-1 3 Cisco Secure Threat Defense with Cisco SecureX
7-2 Cisco Secure Threat Response
7-2 1 Incident Response and Management
7-2 2 Threat Hunting and Investigation
7-2 3 Integration with Cisco SecureX
8 Cisco SecureX Platform
8-1 Overview of Cisco SecureX
8-1 1 SecureX Architecture and Components
8-1 2 SecureX Orchestration and Automation
8-1 3 SecureX Integration with Cisco Security Solutions
8-2 Using Cisco SecureX
8-2 1 SecureX Dashboard and Reporting
8-2 2 SecureX Workflow Creation and Management
8-2 3 SecureX Threat Response and Investigation
9 Sales and Business Development for Cisco Security Solutions
9-1 Sales Strategies for Cisco Security Solutions
9-1 1 Positioning Cisco Security Solutions
9-1 2 Addressing Customer Security Challenges
9-1 3 Building Security Solution Proposals
9-2 Business Development for Cisco Security
9-2 1 Partnering with Cisco Security Ecosystem
9-2 2 Developing Security Solution Roadmaps
9-2 3 Driving Security Sales Growth
10 Certification Exam Preparation
10-1 Understanding the Exam Structure
10-1 1 Exam Domains and Objectives
10-1 2 Sample Exam Questions and Practice
10-1 3 Preparing for the Exam
6-1 Cisco Secure Identity Solutions Explained

6-1 Cisco Secure Identity Solutions Explained

Key Concepts

Identity and Access Management (IAM)

Identity and Access Management (IAM) is the framework for managing digital identities and controlling access to resources. Cisco Secure Identity Solutions provide tools to create, manage, and authenticate user identities, ensuring that only authorized users can access specific resources.

For example, a large enterprise can use IAM to manage the identities of its employees, contractors, and partners, ensuring that each user has the appropriate access to corporate resources.

Multi-Factor Authentication (MFA)

Multi-Factor Authentication (MFA) is a security mechanism that requires users to provide two or more verification factors to gain access to a resource. Cisco Secure Identity Solutions support MFA, adding an extra layer of security beyond just passwords.

Consider a financial institution that uses MFA for online banking. Users must provide a password and a one-time code sent to their mobile device to log in, significantly reducing the risk of unauthorized access.

Single Sign-On (SSO)

Single Sign-On (SSO) allows users to authenticate once and gain access to multiple applications without needing to re-enter credentials. Cisco Secure Identity Solutions offer SSO capabilities, simplifying the user experience while maintaining security.

Imagine a university where students use SSO to access various campus services like email, library resources, and course management systems. After logging in once, students can access all these services without needing to re-authenticate.

Role-Based Access Control (RBAC)

Role-Based Access Control (RBAC) is a method of regulating access to resources based on the roles of individual users within an organization. Cisco Secure Identity Solutions enable RBAC, ensuring that users have the appropriate permissions based on their roles.

For instance, a healthcare organization can use RBAC to grant doctors access to patient records and restrict access to administrative staff. This ensures that sensitive information is only accessible to those who need it.

Identity Federation

Identity Federation allows users to use a single set of credentials to access resources across multiple organizations or domains. Cisco Secure Identity Solutions support federation, enabling seamless access to cloud services and partner applications.

Consider a global corporation that uses Identity Federation to allow employees to access cloud-based applications from different vendors using their corporate credentials. This simplifies access management and enhances security.

Identity Governance and Administration (IGA)

Identity Governance and Administration (IGA) involves managing the lifecycle of user identities, including provisioning, de-provisioning, and access reviews. Cisco Secure Identity Solutions provide IGA tools to ensure compliance and efficient management of user identities.

For example, a government agency can use IGA to automatically provision new employees with the necessary access and de-provision access when employees leave the organization. This ensures that access rights are always up-to-date and compliant with regulations.

Examples and Analogies

Identity and Access Management (IAM): Think of IAM as a security guard who checks IDs and ensures only authorized individuals enter a building. Similarly, IAM ensures that only authenticated users can access resources.

Multi-Factor Authentication (MFA): Consider MFA as a door that requires both a key and a fingerprint to unlock. Just as the door adds an extra layer of security, MFA adds an extra layer of protection to user access.

Single Sign-On (SSO): Imagine SSO as a universal key that opens multiple doors in a building. Just as the key simplifies access, SSO simplifies user authentication across multiple applications.

Role-Based Access Control (RBAC): Think of RBAC as a library where different roles have access to different sections. Just as librarians control access to books, RBAC controls access to resources based on roles.

Identity Federation: Consider Identity Federation as a passport that allows you to travel across different countries. Just as the passport simplifies travel, federation simplifies access across different organizations.

Identity Governance and Administration (IGA): Imagine IGA as a human resources department that manages employee records and access rights. Just as HR ensures employees have the right access, IGA ensures users have the appropriate permissions.

By understanding these key concepts, you can appreciate how Cisco Secure Identity Solutions provide comprehensive management and protection of user identities, ensuring secure and efficient access to resources.