Cisco Sales Expert (CSE) - Security
1 Introduction to Cisco Security Solutions
1-1 Overview of Cisco Security Portfolio
1-2 Understanding the Security Market Landscape
1-3 Cisco Security Solutions Value Proposition
2 Cisco Secure Network Solutions
2-1 Cisco Secure Firewall
2-1 1 Firewall Technologies and Deployment Models
2-1 2 Advanced Threat Protection Features
2-1 3 Integration with Cisco SecureX
2-2 Cisco Secure Network Access
2-2 1 Cisco Identity Services Engine (ISE)
2-2 2 Cisco AnyConnect Secure Mobility Client
2-2 3 Cisco DNA Center for Network Management
2-3 Cisco Secure Internet Gateway (SIG)
2-3 1 Cloud-Delivered Security Services
2-3 2 Integration with Cisco Umbrella
2-3 3 Secure Internet Access for Remote Users
3 Cisco Secure Endpoint Solutions
3-1 Cisco Secure Endpoint (AMP for Endpoints)
3-1 1 Endpoint Detection and Response (EDR)
3-1 2 Advanced Malware Protection (AMP)
3-1 3 Integration with Cisco Threat Response
3-2 Cisco Secure Endpoint Management
3-2 1 Managing Endpoints with Cisco Secure Endpoint
3-2 2 Policy Management and Enforcement
3-2 3 Reporting and Analytics
4 Cisco Secure Cloud and SaaS Solutions
4-1 Cisco Secure Cloud Security Solutions
4-1 1 Cisco Cloud Security Architecture
4-1 2 Cisco Secure Cloud Analytics (Stealthwatch Cloud)
4-1 3 Cisco Secure Cloud Email (Cisco Email Security)
4-2 Cisco Secure SaaS Solutions
4-2 1 Cisco Secure SaaS Applications
4-2 2 Cisco Secure SaaS Integration with Cisco SecureX
4-2 3 Managing SaaS Security with Cisco Secure SaaS
5 Cisco Secure Collaboration Solutions
5-1 Cisco Secure Collaboration Architecture
5-1 1 Cisco Webex Security Features
5-1 2 Cisco Secure Collaboration with Cisco Defense Orchestrator
5-1 3 Secure Collaboration in Hybrid Work Environments
5-2 Cisco Secure Voice and Video Solutions
5-2 1 Cisco Secure Voice Solutions
5-2 2 Cisco Secure Video Conferencing
5-2 3 Integration with Cisco SecureX
6 Cisco Secure Identity and Access Management
6-1 Cisco Secure Identity Solutions
6-1 1 Cisco Identity Services Engine (ISE)
6-1 2 Cisco Duo Security
6-1 3 Cisco Secure Access Solutions
6-2 Cisco Secure Access Management
6-2 1 Access Policy Management
6-2 2 Multi-Factor Authentication (MFA)
6-2 3 Identity and Access Management in Hybrid Environments
7 Cisco Secure Threat Defense and Response
7-1 Cisco Secure Threat Defense Solutions
7-1 1 Cisco Secure Threat Defense Architecture
7-1 2 Cisco Secure Threat Intelligence
7-1 3 Cisco Secure Threat Defense with Cisco SecureX
7-2 Cisco Secure Threat Response
7-2 1 Incident Response and Management
7-2 2 Threat Hunting and Investigation
7-2 3 Integration with Cisco SecureX
8 Cisco SecureX Platform
8-1 Overview of Cisco SecureX
8-1 1 SecureX Architecture and Components
8-1 2 SecureX Orchestration and Automation
8-1 3 SecureX Integration with Cisco Security Solutions
8-2 Using Cisco SecureX
8-2 1 SecureX Dashboard and Reporting
8-2 2 SecureX Workflow Creation and Management
8-2 3 SecureX Threat Response and Investigation
9 Sales and Business Development for Cisco Security Solutions
9-1 Sales Strategies for Cisco Security Solutions
9-1 1 Positioning Cisco Security Solutions
9-1 2 Addressing Customer Security Challenges
9-1 3 Building Security Solution Proposals
9-2 Business Development for Cisco Security
9-2 1 Partnering with Cisco Security Ecosystem
9-2 2 Developing Security Solution Roadmaps
9-2 3 Driving Security Sales Growth
10 Certification Exam Preparation
10-1 Understanding the Exam Structure
10-1 1 Exam Domains and Objectives
10-1 2 Sample Exam Questions and Practice
10-1 3 Preparing for the Exam
8-1-2 SecureX Orchestration and Automation Explained

8-1-2 SecureX Orchestration and Automation Explained

Key Concepts

Orchestration

Orchestration in Cisco SecureX refers to the coordination and management of multiple security tools and processes to achieve a unified security operation. This involves integrating various security solutions, such as firewalls, intrusion detection systems, and endpoint protection, into a cohesive framework. Orchestration ensures that security tasks are performed efficiently and consistently across the entire network.

For example, when a security incident is detected, orchestration can automatically trigger responses from multiple security tools, such as isolating affected devices, blocking malicious IP addresses, and generating detailed reports, all in a coordinated manner.

Automation

Automation in Cisco SecureX involves using predefined rules and scripts to perform repetitive security tasks without human intervention. This reduces the time and effort required for manual processes, minimizes human error, and accelerates threat response times. Automation is particularly useful for tasks such as threat detection, incident response, and compliance reporting.

Consider a scenario where a phishing email is detected. Automation can automatically quarantine the email, block the sender's IP address, and notify the security team, all without requiring manual intervention.

Workflows

Workflows in Cisco SecureX are predefined sequences of actions that are executed in response to specific security events. These workflows can be customized to meet the specific needs of an organization and can include actions such as alerting, blocking, isolating, and reporting. Workflows ensure that security tasks are performed in a consistent and timely manner.

For instance, a workflow might be designed to automatically isolate a compromised device, block communication with the attacker's command and control servers, and generate a detailed incident report when a ransomware attack is detected.

Integration

Integration in Cisco SecureX refers to the ability to connect and coordinate various security tools and platforms within a unified security framework. This includes integrating Cisco security products, such as Firepower, Stealthwatch, and Umbrella, as well as third-party solutions. Integration ensures that security data and actions are shared seamlessly across different tools, enhancing overall security effectiveness.

For example, integrating Cisco Firepower with Cisco Stealthwatch allows for real-time threat detection and response, where Firepower blocks malicious traffic while Stealthwatch provides network visibility and context.

Playbooks

Playbooks in Cisco SecureX are predefined sets of actions and responses designed to address specific security incidents or scenarios. These playbooks provide a structured approach to incident response, ensuring that security teams follow best practices and respond effectively to threats. Playbooks can be customized and updated based on the organization's security policies and threat landscape.

Imagine a playbook for responding to a data breach. The playbook might include steps such as isolating affected systems, identifying the root cause, notifying stakeholders, and implementing remediation measures, all guided by predefined actions and responses.

Examples and Analogies

Orchestration: Think of orchestration as a conductor leading an orchestra. Just as the conductor coordinates the musicians to create harmonious music, orchestration coordinates security tools to create a unified security operation.

Automation: Consider automation as a smart home system that automatically adjusts lighting and temperature based on predefined settings. Similarly, automation in SecureX performs security tasks based on predefined rules and scripts.

Workflows: Imagine workflows as a recipe that guides you through the steps to prepare a dish. Just as the recipe ensures consistent results, workflows ensure consistent and timely execution of security tasks.

Integration: Think of integration as a universal remote control that operates multiple devices. Similarly, integration in SecureX connects and coordinates various security tools within a unified framework.

Playbooks: Consider playbooks as a guidebook for handling emergencies. Just as the guidebook provides structured steps for responding to emergencies, playbooks provide structured actions for responding to security incidents.

By understanding these key concepts, you can appreciate how Cisco SecureX Orchestration and Automation provide a comprehensive and efficient approach to managing security operations, ensuring timely and effective response to threats.