Cisco Secure Access refers to a suite of solutions designed to ensure secure, seamless access to networks, applications, and data for users, regardless of location or device. It focuses on providing strong authentication, robust network security, and comprehensive threat protection, all while maintaining a user-friendly experience. The solutions are built to support the Zero Trust security model, which assumes that threats may exist both inside and outside the network, and therefore all access requests must be verified, regardless of where they originate. In this course we will focusing on key concepts, tools, and strategies for implementing Cisco’s secure access solutions.
Pre-requisites:
Basic Networking Knowledge, familiarity with Security Fundamentals, experience with Cisco Products, basic understanding of VPN and Remote Access and Knowledge of Cloud Security.
Introduction to Cisco Secure Access
o Secure Access Services Overview
o Understanding licensing model
Secure Access Tiers
Essentials
Advantage
o Secure Access use cases
Secure Internet Access (SIA)
Secure Private Access (SPA)
Explore Zero Trust Approach – Zero Trust Network Access
o Cisco Secure Client (ZTNA)
o Zero Trust Access Module
Overview on VPN as a Service and secure remote access
o Remote Access
o Identity-Based Access Control
o Endpoint Posture Evaluation
o Granular Application Access Control
o Integration with ISE and RADIUS
Defend users and resources from malware
o Features of Secure Web Gateway
Content Filtering
Malware Scanning
Detailed Reporting
Cloud Security features in Secure Access
o Discover Cloud Access Security Broker (CASB)
o Explore Firewall as a Service (FWaaS)
o Understanding Data Loss Prevention (DLP)
o Power of layer 7 application visibility and control
o Examine network traffic flow using IPS
Integration and automation between Catalyst SD-WAN and Secure Access
o Enhanced Threat Protection
o Consistent User Experience
o Simplified IT/Security Operations
Network Security Professionals, Cybersecurity Specialists, Cloud Security Engineers, Enterprise IT Managers, etc.