1 - Introducing the Cloud and Cloud Security
Describe the Evolution of Cloud ComputingExplain the Cloud Service ModelsExplore the Security Responsibilities Within the Infrastructure as a Service (IaaS) Service ModelExplore the Security Responsibilities Within the Platform as a Service (PaaS) Service ModelExplore the Security Responsibilities Within the SaaS Service ModelDescribe Cloud Deployment ModelsDescribe Cloud Security Basics
2 - Implementing the Cisco Security Solution for SaaS Access Control
Explore Security Challenges for Customers Using SaaSDescribe User and Entity Behavior Analytics, Data Loss Prevention (DLP), and Apps FirewallDescribe Cloud Access Security Broker (CASB)Describe Cisco CloudLock as the CASBDescribe OAuth and OAuth Attacks
3 - Deploying Cisco Cloud-Based Security Solutions for Endpoints and Content Security
Describe Cisco Cloud Security Solutions for EndpointsDescribe AMP for Endpoints ArchitectureDescribe Cisco UmbrellaDescribe Cisco Cloud Email SecurityDesign Comprehensive Endpoint Security
4 - Introducing Cisco Security Solutions for Cloud Protection and Visibility
Describe Network Function Virtualization (NFV)Describe Cisco Secure Architectures for Enterprises (Cisco SAFE)Describe Cisco NGFWv/Cisco Firepower Management Center VirtualDescribe Cisco ASAvDescribe Cisco Services Router 1000VDescribe Cisco Stealthwatch CloudDescribe Cisco Tetration Cloud Zero-Trust Model
5 - Describing the Network as the Sensor and Enforcer
Describe Cisco Stealthwatch EnterpriseDescribe Cisco ISE Functions and PersonasDescribe Cisco TrustSecDescribe Cisco Stealthwatch and Cisco ISE IntegrationDescribe Cisco Encrypted Traffic Analytics (ETA)
6 - Implementing Cisco Security Solutions in AWS
Explain AWS Security OfferingsDescribe AWS Elastic Compute Cloud (EC2) and Virtual Private Cloud (VPC)Discover Cisco Security Solutions in AWSExplain Cisco Stealthwatch Cloud in AWS
7 - Describing Cloud Security Management
Describe Cloud Management and APIsExplain API ProtectionIllustrate an API Example: Integrate to ISE Using pxGridIdentify SecDevOps Best PracticesIllustrate a Cisco Cloud Security Management Tool Example: Cisco Defense OrchestratorIllustrate a Cisco Cloud Security Management Tool Example: Cisco CloudCenter™Describe Cisco Application Centric Infrastructure (ACI)Describe AWS Reporting Tools
Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Who is it For?
This course is open to engineers, administrators, and security-minded users of public, private, and hybrid cloud infrastructures responsible for implementing security in cloud environments:Security architectsCloud architectsSecurity engineersCloud engineersSystem engineersCisco integrators and partners
To fully benefit from this course, you should have completed the following course or obtained the equivalent knowledge and skills:Knowledge of cloud computing and virtualization software basics.Ability to perform basic UNIX-like OS commands.Cisco CCNP® security knowledge or understanding of the following topic areas:Implementing Cisco Edge Network Security Solutions (SENSS), Implementing Cisco Threat Control Solutions (SITCS), Implementing Cisco Secure Access Solutions (SISAS), Implementing Cisco Secure Mobility Solutions (SIMOS).