Cisco Sales Expert (CSE) - Security
1 Introduction to Cisco Security Solutions
1-1 Overview of Cisco Security Portfolio
1-2 Understanding the Security Market Landscape
1-3 Cisco Security Solutions Value Proposition
2 Cisco Secure Network Solutions
2-1 Cisco Secure Firewall
2-1 1 Firewall Technologies and Deployment Models
2-1 2 Advanced Threat Protection Features
2-1 3 Integration with Cisco SecureX
2-2 Cisco Secure Network Access
2-2 1 Cisco Identity Services Engine (ISE)
2-2 2 Cisco AnyConnect Secure Mobility Client
2-2 3 Cisco DNA Center for Network Management
2-3 Cisco Secure Internet Gateway (SIG)
2-3 1 Cloud-Delivered Security Services
2-3 2 Integration with Cisco Umbrella
2-3 3 Secure Internet Access for Remote Users
3 Cisco Secure Endpoint Solutions
3-1 Cisco Secure Endpoint (AMP for Endpoints)
3-1 1 Endpoint Detection and Response (EDR)
3-1 2 Advanced Malware Protection (AMP)
3-1 3 Integration with Cisco Threat Response
3-2 Cisco Secure Endpoint Management
3-2 1 Managing Endpoints with Cisco Secure Endpoint
3-2 2 Policy Management and Enforcement
3-2 3 Reporting and Analytics
4 Cisco Secure Cloud and SaaS Solutions
4-1 Cisco Secure Cloud Security Solutions
4-1 1 Cisco Cloud Security Architecture
4-1 2 Cisco Secure Cloud Analytics (Stealthwatch Cloud)
4-1 3 Cisco Secure Cloud Email (Cisco Email Security)
4-2 Cisco Secure SaaS Solutions
4-2 1 Cisco Secure SaaS Applications
4-2 2 Cisco Secure SaaS Integration with Cisco SecureX
4-2 3 Managing SaaS Security with Cisco Secure SaaS
5 Cisco Secure Collaboration Solutions
5-1 Cisco Secure Collaboration Architecture
5-1 1 Cisco Webex Security Features
5-1 2 Cisco Secure Collaboration with Cisco Defense Orchestrator
5-1 3 Secure Collaboration in Hybrid Work Environments
5-2 Cisco Secure Voice and Video Solutions
5-2 1 Cisco Secure Voice Solutions
5-2 2 Cisco Secure Video Conferencing
5-2 3 Integration with Cisco SecureX
6 Cisco Secure Identity and Access Management
6-1 Cisco Secure Identity Solutions
6-1 1 Cisco Identity Services Engine (ISE)
6-1 2 Cisco Duo Security
6-1 3 Cisco Secure Access Solutions
6-2 Cisco Secure Access Management
6-2 1 Access Policy Management
6-2 2 Multi-Factor Authentication (MFA)
6-2 3 Identity and Access Management in Hybrid Environments
7 Cisco Secure Threat Defense and Response
7-1 Cisco Secure Threat Defense Solutions
7-1 1 Cisco Secure Threat Defense Architecture
7-1 2 Cisco Secure Threat Intelligence
7-1 3 Cisco Secure Threat Defense with Cisco SecureX
7-2 Cisco Secure Threat Response
7-2 1 Incident Response and Management
7-2 2 Threat Hunting and Investigation
7-2 3 Integration with Cisco SecureX
8 Cisco SecureX Platform
8-1 Overview of Cisco SecureX
8-1 1 SecureX Architecture and Components
8-1 2 SecureX Orchestration and Automation
8-1 3 SecureX Integration with Cisco Security Solutions
8-2 Using Cisco SecureX
8-2 1 SecureX Dashboard and Reporting
8-2 2 SecureX Workflow Creation and Management
8-2 3 SecureX Threat Response and Investigation
9 Sales and Business Development for Cisco Security Solutions
9-1 Sales Strategies for Cisco Security Solutions
9-1 1 Positioning Cisco Security Solutions
9-1 2 Addressing Customer Security Challenges
9-1 3 Building Security Solution Proposals
9-2 Business Development for Cisco Security
9-2 1 Partnering with Cisco Security Ecosystem
9-2 2 Developing Security Solution Roadmaps
9-2 3 Driving Security Sales Growth
10 Certification Exam Preparation
10-1 Understanding the Exam Structure
10-1 1 Exam Domains and Objectives
10-1 2 Sample Exam Questions and Practice
10-1 3 Preparing for the Exam
6-2 Cisco Secure Access Management Explained

6-2 Cisco Secure Access Management Explained

Key Concepts

Access Control Policies

Access Control Policies define the rules and conditions under which users and devices can access network resources. Cisco Secure Access Management solutions provide tools to create and manage these policies, ensuring that only authorized users and devices can access specific resources.

For example, a company can create an access control policy that allows employees to access corporate email and intranet but restricts access to sensitive financial data to only authorized finance team members.

Network Segmentation

Network Segmentation involves dividing a network into smaller, isolated segments to enhance security and control. Cisco Secure Access Management solutions enable network segmentation by creating virtual LANs (VLANs) and using firewalls to enforce access control between segments.

Consider a healthcare facility that uses network segmentation to isolate patient data from general network traffic. This ensures that even if a breach occurs in the general network, sensitive patient data remains protected.

User and Device Authentication

User and Device Authentication ensures that only authenticated users and devices can access the network. Cisco Secure Access Management solutions support multi-factor authentication (MFA) and device posture checks to verify the identity and security status of users and devices.

Imagine a university that requires students to authenticate using their student ID and a one-time password to access the campus Wi-Fi. Additionally, the university checks the device's security posture to ensure it meets minimum security requirements.

Policy Enforcement

Policy Enforcement ensures that access control policies are consistently applied across the network. Cisco Secure Access Management solutions use network access control (NAC) technologies to enforce policies at the point of entry, ensuring that users and devices comply with security requirements.

For instance, a financial institution uses policy enforcement to ensure that all devices connecting to the corporate network have up-to-date antivirus software and operating system patches. Devices that do not meet these requirements are denied access.

Monitoring and Reporting

Monitoring and Reporting provide visibility into network access activities and compliance with access control policies. Cisco Secure Access Management solutions offer real-time monitoring, alerting, and reporting capabilities to detect and respond to unauthorized access attempts and policy violations.

Consider a retail chain that uses monitoring and reporting to track access to its point-of-sale (POS) systems. The solution generates alerts if unauthorized devices attempt to connect to the POS network, allowing the IT team to take immediate action.

Examples and Analogies

Access Control Policies: Think of access control policies as a bouncer at a nightclub who checks IDs and ensures only authorized individuals enter. Similarly, access control policies ensure that only authenticated users can access resources.

Network Segmentation: Consider network segmentation as dividing a large room into smaller, isolated sections. Just as the sections provide privacy, network segments enhance security by isolating sensitive data.

User and Device Authentication: Imagine user and device authentication as a secure door that requires both a key and a fingerprint to unlock. Just as the door adds an extra layer of security, authentication ensures only verified users and devices can access the network.

Policy Enforcement: Think of policy enforcement as a traffic cop who ensures all vehicles follow the rules of the road. Similarly, policy enforcement ensures that all users and devices comply with security policies.

Monitoring and Reporting: Consider monitoring and reporting as a security camera system that continuously monitors a building for suspicious activities. Just as the cameras provide visibility, monitoring and reporting provide visibility into network access activities.

By understanding these key concepts, you can appreciate how Cisco Secure Access Management solutions provide comprehensive control and protection for network access, ensuring secure and compliant access to resources.