The Introducing Cisco Cloud Consumer Security (SECICC)

Course Description

You can gain a technical overview of the fundamental ideas and elements of the Cloud as well as the Cisco® solutions that are utilised to offer thorough security in your cloud-based environment by taking the Introducing Cisco Cloud Consumer Security (SECICC) v1.0 course. You will learn the fundamentals from the viewpoint of a cloud consumer in this mostly lecture-based course, covering how to secure environments for cloud and software as a service (SaaS) application settings. In this introductory training, you will learn how to use Cisco Stealthwatch Cloud, Cisco CloudLock, Cisco Umbrella, and other tools to secure your users when they use cloud-based applications.

Prerequisites

Although there are no requirements for this course, having the following knowledge and abilities will help you benefit the most from it.

  • Basic knowledge of computers.
  • Basic knowledge of PC operating systems.
  • Internet literacy basics.
  • Basic expertise in IP addresses.
  • We also advise that you possess the following competencies:.
  • Prior familiarity with the fundamentals of virtualization software and cloud computing.

Target Audience

This course benefits Cloud consumers and administrators of public Cloud, private Cloud, and hybrid cloud infrastructures:

  • Security architects
  • Cloud architects
  • Network engineers and administrators
  • System engineers and administrators
  • Cloud security consumers
  • Cloud application administrators
  • IT managers
  • Line of business managers
  • Cisco integrators and partner

Learning Objectives

When you finish this course, you ought to be able to:

  • Describe the models, ideas, and designs for public, private, and hybrid clouds.
  • Describe the ideas and elements involved in safeguarding cloud environments.
  • Give an overview of Cisco's security solutions for Amazon Web Services (AWS).
  • Establish strategies to ensure SaaS application utilisation

Content Outline

  • Describe the Evolution of Cloud Computing
  • Explain Cloud Service Models
  • Explore Cloud Deployment Models
  • Describe the Cisco Threat-Centric Approach to Network Security
  • Describe Cloud Physical Environment Security
  • Describe Cloud Network Infrastructure Security
  • Explain Application Security
  • Explore Cloud Management and API Security
  • Describe Cisco Cloud-Based Security Solutions
  • Describe Network Functions Virtualization (NFV), Virtual Network Function (VNF), and Secure Agile Exchange (SAE)
  • Describe Cisco CloudCenter for multi-cloud Management
  • Describe Cisco Stealthwatch
  • Identify AWS Security Offerings
  • Identify Cisco Security Solutions in AWS
  • Describe SaaS Applications
  • Describe SaaS Security Challenges
  • Explain Cloud Access Security Broker
  • Describe Cisco CloudLock
  • Describe OAuth and OAuth Attacks
  • Describe Cisco Advanced Malware Protection for Endpoints
  • Describe Cisco Cloud Email Security
  • Describe Cisco Umbrella

FAQs

An efficient security platform that is open, automated, and easy to operate is offered by Cisco Cloud Security. Additionally, it is supported by market-leading threat data provided by the Cisco Talos security intelligence and research team.

Although there are no requirements for this course, having the following knowledge and abilities will help you benefit the most from it.

  • Basic knowledge of computers.
  • Basic knowledge of PC operating systems.
  • Internet literacy basics.
  • Basic expertise in IP addresses.
  • We also advise that you possess the following competencies:.
  • prior familiarity with the fundamentals of virtualization software and cloud computing.

This course provides an overview of the ways that Cisco cloud security solutions may protect cloud environments so that they can:

  • Get ahead of threats: Reduce the amount of time needed to clean up infections by stopping malware before it gets to your network and endpoints.
  • Protect the Cloud further: Users should be protected everywhere they go and whenever they access the Internet by eliminating blind zones.
  • Users, data, and apps that are secure: Defend users, data, and cloud-based applications from hacked accounts, cloud-native threads, and data breaches. bolster legal compliance
  • enabling extremely safe cloud usage Boost user productivity while enhancing security.

We would always recommend you attend the live session to practice & clarify the doubts instantly and get more value from your investment. However, if, due to some contingency, you have to skip the class, Radiant Techlearning will help you with the recorded session of that particular day. However, those recorded sessions are not meant only for personal consumption and NOT for distribution or any commercial use.

Technical issues are unpredictable and might occur with you as well. Participants must ensure that they have the system with the required configuration and good internet speed to access online labs.

If the problem persists or you face any challenge during class, you can report it to us or your trainer. In that case, Radiant would provide you with the recorded session of that particular day. However, those recorded sessions are not meant only for personal consumption and NOT for distribution or any commercial use.

Once we receive your enrollment request, we will share the enrollment details with you to select and complete the enrollment process. 

You can email us at the below (whichever is applicable) to know the upcoming schedule for a specific technology training program. 

Individual:  training@radianttechlearning.com  

Corporate: Corporate@radiantechlearning.com 

Radiant Techlearning has a data center containing a Virtual Training environment for participants' hand-on-practice. Participants can easily access these labs over Cloud with the help of a remote desktop connection. Radiant virtual labs allow you to learn from anywhere and in any time zone.

Send a Message.


  • Enroll