Workshop Short Description Templates
- Details
- By Jamie Cresdee
- Category: Workshop Short Description Templates
- Hits: 91
Secure Workload Test Drive: 3 Hour hands on experience with Secure Workload. Space is limited to 20 customers per session !!
Cisco Secure Workload Test Drive
Today’s applications and the security threats that confront them are dynamic and continually changing.
Organizations are looking for flexibility, performance, and security, whether they deploy an application on-premises or in the cloud. Enter bare-metal, virtualization, microservices, and containerization across private and public clouds, and it becomes an architectural and operational challenge to enforce a consistent security policy. Cisco Secure Workload can enhance security with segmentation and reduce risk by decreasing your workload’s attack surface quickly and consistently without adding complexity.
Join this interactive, 3 hour, hands-on experience with Cisco Secure Workload (formerly Tetration) to learn how to:
Gain visibility into what’s running and critical by identifying workloads and enforcing policies
Contain breaches and minimize lateral movement with application micro-segmentation
Alert or block communications by continuously monitoring and responding to indicators of compromise
Prior to the session, please go to https://id.cisco.com/signin/register for a CCO account. This will be needed and is mandatory to access the hands-on lab.
- Details
- By Jamie Cresdee
- Category: Workshop Short Description Templates
- Hits: 96
Secure Workload Webinar: 1 Hour presentation overview of Secure Workload and Use Cases.
Cisco Secure Workload Webinar
Enabling zero-trust segmentation in today’s highly complex application landscape can be extremely difficult to implement in the hybrid multi-cloud world. Lack of visibility, insufficient data, and inconsistent firewall policy frameworks expose these On-premises or Cloud applications to attackers.
Join us at this 1 hour Workshop and learn how to address the challenges of application security for your On-premises and Cloud Workloads with Cisco Secure Workload (formerly Tetration).
Join us as we discuss:
Simplifying the task of microsegmentation and demystifying its complexity
Understanding threats and your potential risks
Proactively identifying workload vulnerabilities, taking action to reduce risk, and protecting assets
- Details
- By Andy Peterson
- Category: Workshop Short Description Templates
- Hits: 355

Course Title:
Designing and Deploying Zero Trust Access with Cisco Secure Access
Course Description:
Step into the role of a network security administrator in this guided, hands-on workshop. You’ll learn how to design, deploy, and validate a modern Zero Trust Access solution using Cisco Secure Access. Acting as the administrator for the fictional organization PseudoCo, you will configure secure connectivity between remote users and private applications hosted in a secure data center.
You’ll have full administrative access to a dedicated virtual data center environment in Cisco’s dCloud, pre-provisioned for Secure Access integration. Each participant also receives a unique Secure Access organization, enabling you to configure and test infrastructure in any Secure Access region, with recommendations to align settings with your specific dCloud Data Center location.
Workshop Highlights
- Real-World Zero Trust Scenarios: Configure secure connectivity for remote users and private applications.
- Hands-On Labs: Access to a fully provisioned virtual data center and unique Secure Access organization.
- End-to-End Deployment: Learn to set up VPNs, IP pools, and tunnels for seamless, secure access.
- Expert Guidance: Step-by-step lab exercises and access to proctors for support.
Key Takeaways
- Practical experience deploying Zero Trust Access solutions using Cisco Secure Access.
- Skills to configure and validate secure connections between distributed users and applications.
- Understanding of best practices for aligning Secure Access configurations with data center regions.
Who Should Attend
- IT and network administrators responsible for securing enterprise access.
- Security engineers and architects interested in Zero Trust methodologies.
- Anyone preparing to deploy Cisco Secure Access solutions in their organization.
Workshop Format
- Hands-On Labs: Interactive, guided exercises in a live dCloud virtual environment.
- Instructor Support: Direct assistance from proctors and subject matter experts.
- Individual Access: Each attendee receives their own Secure Access organization and isolated lab environment.
Prerequisites
- Familiarity with basic networking and security concepts.
- Prior experience with remote access technologies or Cisco solutions is helpful but not required.
- Access to a Cisco dCloud account (provided as part of the course).
Why Attend?
This workshop offers a unique, practical opportunity to master Zero Trust Access with Cisco Secure Access in a risk-free, fully supported lab environment. You’ll leave with the confidence and know-how to implement secure, modern access solutions tailored to your organization’s needs.
- Details
- By Ahalya Das
- Category: Workshop Short Description Templates
- Hits: 1867

Overview:
The Hybrid Mesh Firewall Design Workshop is a comprehensive 2-hour interactive session designed to help organizations understand and leverage Cisco’s Hybrid Mesh Firewall capabilities. This workshop combines a targeted presentation, hands-on collaboration, and strategic planning to help customers modernize their firewall architecture, enhance security visibility, and optimize operational efficiency.
Agenda:
1. Introduction & Presentation (30 - minutes)
- Overview of Cisco’s Hybrid Mesh Firewall solution
- Key Advantages: unified policy management, improved visibility, operational simplification, and cost savings
- Real-world examples and customer success stories
- Discussion on integrating a hybrid mesh approach with existing infrastructures
2. Interactive Discussion & White-boarding (45 Minutes)
- Open dialogue between customers and Cisco Solutions Engineers (SEs) on current firewall management practices
- Identification and mapping of all firewall types, vendors, and locations within the customer’s environment
- White-boarding session to illustrate current state, highlight challenges, and reveal potential gaps in visibility or management
- Discussion of integration opportunities and quick wins for hybrid mesh deployment
3. Demonstration and Discussion (15 minutes)
- Summary of key findings from the discussion and whiteboarding
- Collaborative development of a high-level roadmap for adopting a hybrid mesh firewall solution
- Recommendations on next steps to streamline operations, reduce costs, and improve security posture
- Q&A and assignment of follow-up actions or resources
Key Takeaways:
- Clear understanding of Cisco’s Hybrid Mesh Firewall solution and its advantages
- A detailed map of the customer’s current firewall landscape
- Identification of immediate opportunities and long-term strategies for transformation
- A customized roadmap to help achieve a unified, scalable, and efficient security architecture
Who Should Attend:
- IT and Network Security Leaders
- Firewall and Infrastructure Administrators
- Information Security Teams
- Cisco SEs and Technical Architects
Format:
- 2-hour session (in-person or virtual)
- Combination of presentation, discussion, and collaborative white-boarding
- Actionable deliverables and next steps tailored to customer environment
Notes:
- Ensure stakeholders from all relevant teams participate for a holistic view.
- Bring network topology diagrams and inventory lists for deeper engagement.
- The session is interactive and tailored to specific customer needs.
Page 1 of 3
