Cisco Sales Expert (CSE) - Security
1 Introduction to Cisco Security Solutions
1-1 Overview of Cisco Security Portfolio
1-2 Understanding the Security Market Landscape
1-3 Cisco Security Solutions Value Proposition
2 Cisco Secure Network Solutions
2-1 Cisco Secure Firewall
2-1 1 Firewall Technologies and Deployment Models
2-1 2 Advanced Threat Protection Features
2-1 3 Integration with Cisco SecureX
2-2 Cisco Secure Network Access
2-2 1 Cisco Identity Services Engine (ISE)
2-2 2 Cisco AnyConnect Secure Mobility Client
2-2 3 Cisco DNA Center for Network Management
2-3 Cisco Secure Internet Gateway (SIG)
2-3 1 Cloud-Delivered Security Services
2-3 2 Integration with Cisco Umbrella
2-3 3 Secure Internet Access for Remote Users
3 Cisco Secure Endpoint Solutions
3-1 Cisco Secure Endpoint (AMP for Endpoints)
3-1 1 Endpoint Detection and Response (EDR)
3-1 2 Advanced Malware Protection (AMP)
3-1 3 Integration with Cisco Threat Response
3-2 Cisco Secure Endpoint Management
3-2 1 Managing Endpoints with Cisco Secure Endpoint
3-2 2 Policy Management and Enforcement
3-2 3 Reporting and Analytics
4 Cisco Secure Cloud and SaaS Solutions
4-1 Cisco Secure Cloud Security Solutions
4-1 1 Cisco Cloud Security Architecture
4-1 2 Cisco Secure Cloud Analytics (Stealthwatch Cloud)
4-1 3 Cisco Secure Cloud Email (Cisco Email Security)
4-2 Cisco Secure SaaS Solutions
4-2 1 Cisco Secure SaaS Applications
4-2 2 Cisco Secure SaaS Integration with Cisco SecureX
4-2 3 Managing SaaS Security with Cisco Secure SaaS
5 Cisco Secure Collaboration Solutions
5-1 Cisco Secure Collaboration Architecture
5-1 1 Cisco Webex Security Features
5-1 2 Cisco Secure Collaboration with Cisco Defense Orchestrator
5-1 3 Secure Collaboration in Hybrid Work Environments
5-2 Cisco Secure Voice and Video Solutions
5-2 1 Cisco Secure Voice Solutions
5-2 2 Cisco Secure Video Conferencing
5-2 3 Integration with Cisco SecureX
6 Cisco Secure Identity and Access Management
6-1 Cisco Secure Identity Solutions
6-1 1 Cisco Identity Services Engine (ISE)
6-1 2 Cisco Duo Security
6-1 3 Cisco Secure Access Solutions
6-2 Cisco Secure Access Management
6-2 1 Access Policy Management
6-2 2 Multi-Factor Authentication (MFA)
6-2 3 Identity and Access Management in Hybrid Environments
7 Cisco Secure Threat Defense and Response
7-1 Cisco Secure Threat Defense Solutions
7-1 1 Cisco Secure Threat Defense Architecture
7-1 2 Cisco Secure Threat Intelligence
7-1 3 Cisco Secure Threat Defense with Cisco SecureX
7-2 Cisco Secure Threat Response
7-2 1 Incident Response and Management
7-2 2 Threat Hunting and Investigation
7-2 3 Integration with Cisco SecureX
8 Cisco SecureX Platform
8-1 Overview of Cisco SecureX
8-1 1 SecureX Architecture and Components
8-1 2 SecureX Orchestration and Automation
8-1 3 SecureX Integration with Cisco Security Solutions
8-2 Using Cisco SecureX
8-2 1 SecureX Dashboard and Reporting
8-2 2 SecureX Workflow Creation and Management
8-2 3 SecureX Threat Response and Investigation
9 Sales and Business Development for Cisco Security Solutions
9-1 Sales Strategies for Cisco Security Solutions
9-1 1 Positioning Cisco Security Solutions
9-1 2 Addressing Customer Security Challenges
9-1 3 Building Security Solution Proposals
9-2 Business Development for Cisco Security
9-2 1 Partnering with Cisco Security Ecosystem
9-2 2 Developing Security Solution Roadmaps
9-2 3 Driving Security Sales Growth
10 Certification Exam Preparation
10-1 Understanding the Exam Structure
10-1 1 Exam Domains and Objectives
10-1 2 Sample Exam Questions and Practice
10-1 3 Preparing for the Exam
7-1-2 Cisco Secure Threat Intelligence Explained

7-1-2 Cisco Secure Threat Intelligence Explained

Key Concepts

Threat Intelligence

Threat Intelligence is the process of collecting, analyzing, and disseminating information about potential or existing threats to an organization's security. It provides insights into the tactics, techniques, and procedures (TTPs) used by adversaries, helping organizations proactively defend against cyber threats.

Threat Sources

Threat Sources are the origins from which threat intelligence is gathered. These can include open-source intelligence (OSINT), dark web monitoring, social media, and proprietary threat feeds. Cisco Secure Threat Intelligence leverages a vast array of threat sources to provide comprehensive and up-to-date threat data.

Threat Indicators

Threat Indicators are specific pieces of information that suggest the presence of a threat. These can include IP addresses, domain names, file hashes, and behavioral patterns. Cisco Secure Threat Intelligence uses threat indicators to identify and block malicious activities before they can cause harm.

Threat Analysis

Threat Analysis involves evaluating threat indicators to determine their relevance and potential impact on the organization. This process includes correlating data from multiple sources, identifying trends, and predicting future threats. Cisco Secure Threat Intelligence employs advanced analytics and machine learning to perform thorough threat analysis.

Threat Response

Threat Response is the action taken to mitigate or eliminate the impact of identified threats. This can include blocking malicious IP addresses, updating security policies, and deploying countermeasures. Cisco Secure Threat Intelligence enables organizations to respond swiftly and effectively to emerging threats.

Examples and Analogies

Threat Intelligence: Think of threat intelligence as a weather forecast that predicts potential storms. Just as a weather forecast helps prepare for adverse conditions, threat intelligence helps organizations prepare for cyber threats.

Threat Sources: Consider threat sources as different news channels reporting on global events. Each channel provides unique insights, and combining them gives a comprehensive view of the situation.

Threat Indicators: Imagine threat indicators as early warning signs of a fire, such as smoke or heat. Identifying these signs allows for timely action to prevent a larger disaster.

Threat Analysis: Think of threat analysis as a detective investigating a crime scene. By examining all the evidence, the detective can piece together the sequence of events and identify the perpetrator.

Threat Response: Consider threat response as emergency services reacting to a fire. Quick and coordinated actions are necessary to contain and extinguish the fire before it causes significant damage.

By understanding these key concepts, you can appreciate how Cisco Secure Threat Intelligence provides valuable insights and actionable data to protect organizations from evolving cyber threats.