Search results

HMF Design Clinic - SAMPLE

 

Overview:
The Hybrid Mesh Firewall Design Workshop is a comprehensive 2-hour interactive session designed to help organizations understand and leverage Cisco’s Hybrid Mesh Firewall capabilities. This workshop combines a targeted presentation, hands-on collaboration, and strategic planning to help customers modernize their firewall architecture, enhance security visibility, and optimize operational efficiency.


Agenda:

1. Introduction & Presentation (30 - minutes)

  • Overview of Cisco’s Hybrid Mesh Firewall solution
  • Key Advantages: unified policy management, improved visibility, operational simplification, and cost savings
  • Real-world examples and customer success stories
  • Discussion on integrating a hybrid mesh approach with existing infrastructures

2. Interactive Discussion & White-boarding (45 Minutes)

  • Open dialogue between customers and Cisco Solutions Engineers (SEs) on current firewall management practices
  • Identification and mapping of all firewall types, vendors, and locations within the customer’s environment
  • White-boarding session to illustrate current state, highlight challenges, and reveal potential gaps in visibility or management
  • Discussion of integration opportunities and quick wins for hybrid mesh deployment

3. Demonstration and Discussion (15 minutes)

  • Summary of key findings from the discussion and whiteboarding
  • Collaborative development of a high-level roadmap for adopting a hybrid mesh firewall solution
  • Recommendations on next steps to streamline operations, reduce costs, and improve security posture
  • Q&A and assignment of follow-up actions or resources

Key Takeaways:

  • Clear understanding of Cisco’s Hybrid Mesh Firewall solution and its advantages
  • A detailed map of the customer’s current firewall landscape
  • Identification of immediate opportunities and long-term strategies for transformation
  • A customized roadmap to help achieve a unified, scalable, and efficient security architecture

Who Should Attend:

  • IT and Network Security Leaders
  • Firewall and Infrastructure Administrators
  • Information Security Teams
  • Cisco SEs and Technical Architects

Format:

  • 2-hour session (in-person or virtual)
  • Combination of presentation, discussion, and collaborative white-boarding
  • Actionable deliverables and next steps tailored to customer environment

 

Notes:

  • Ensure stakeholders from all relevant teams participate for a holistic view.
  • Bring network topology diagrams and inventory lists for deeper engagement.
  • The session is interactive and tailored to specific customer needs.
Event Date 2026-01-28
Event Location Timezone Asia/Singapore
Event Start Time 11:30 AM
Event End Time 1:00 PM
Capacity 5
Registered 0
Available Place 5
Created By Sandeep Yadav
Workshop Length in Hours 2
Geolocation: apjc
Type of event: sales
Location Kuala Lumpur

The event was cancelled. We are not longer accepting registration

ZTA Workshop

Course Title:
Designing and Deploying Zero Trust Access with Cisco Secure Access


Course Description:
Step into the role of a network security administrator in this guided, hands-on workshop. You’ll learn how to design, deploy, and validate a modern Zero Trust Access solution using Cisco Secure Access. Acting as the administrator for the fictional organization PseudoCo, you will configure secure connectivity between remote users and private applications hosted in a secure data center.

You’ll have full administrative access to a dedicated virtual data center environment in Cisco’s dCloud, pre-provisioned for Secure Access integration. Each participant also receives a unique Secure Access organization, enabling you to configure and test infrastructure in any Secure Access region, with recommendations to align settings with your specific dCloud Data Center location.


Workshop Highlights

  • Real-World Zero Trust Scenarios: Configure secure connectivity for remote users and private applications.
  • Hands-On Labs: Access to a fully provisioned virtual data center and unique Secure Access organization.
  • End-to-End Deployment: Learn to set up VPNs, IP pools, and tunnels for seamless, secure access.
  • Expert Guidance: Step-by-step lab exercises and access to proctors for support.

Key Takeaways

  • Practical experience deploying Zero Trust Access solutions using Cisco Secure Access.
  • Skills to configure and validate secure connections between distributed users and applications.
  • Understanding of best practices for aligning Secure Access configurations with data center regions.

Who Should Attend

  • IT and network administrators responsible for securing enterprise access.
  • Security engineers and architects interested in Zero Trust methodologies.
  • Anyone preparing to deploy Cisco Secure Access solutions in their organization.

Workshop Format

  • Hands-On Labs: Interactive, guided exercises in a live dCloud virtual environment.
  • Instructor Support: Direct assistance from proctors and subject matter experts.
  • Individual Access: Each attendee receives their own Secure Access organization and isolated lab environment.

Prerequisites

  • Familiarity with basic networking and security concepts.
  • Prior experience with remote access technologies or Cisco solutions is helpful but not required.
  • Access to a Cisco dCloud account (provided as part of the course).

Why Attend?

This workshop offers a unique, practical opportunity to master Zero Trust Access with Cisco Secure Access in a risk-free, fully supported lab environment. You’ll leave with the confidence and know-how to implement secure, modern access solutions tailored to your organization’s needs.

Event Date 2026-02-06
Event Location Timezone Asia/Singapore
Event Start Time 10:00 AM
Event End Time 2:00 PM
Capacity 10
Registered 0
Available Place 10
Created By Sandeep Yadav
Geolocation: apjc
Type of event: sales
Location Cisco Systems Malaysia SDN BHD

The event was cancelled. We are not longer accepting registration

AL Rajhi Bank

Overview:
The Zero Trust Access Design Workshop is a comprehensive 2-hour interactive session designed to help organizations understand and leverage Cisco’s Zero Trust Access capabilities. This workshop combines a targeted presentation, hands-on collaboration, and strategic planning to help customers modernize their zero trust architecture, enhance security visibility, and optimize operational efficiency.


Agenda:

1. Introduction & Presentation (15 - minutes)

  • Overview of Cisco's Zero Trust Access solution
  • Key Advantages: unified policy management, improved visibility, operational simplification, and cost savings
  • Real-world examples and customer success stories
  • Discussion on integrating a zero trust approach with existing infrastructure

2. Interactive Discussion & White-boarding (45 Minutes)

  • Identification and mapping of all access types, vendors, and resource locations within the customer's environment
  • White-boarding session to discuss current state, capture the challenges, and reveal potential gaps in visibility, security or management
  • Discussion of integration opportunities and quick wins for zero trust deployment

3. Demonstration and Discussion (15 minutes)

  • Summary of key findings from the discussion and whiteboarding
  • Collaborative development of a high-level roadmap for adopting a zero trust access solution
  • Recommendations on next steps to streamline operations, reduce costs, and improve security posture
  • Q&A and assignment of follow-up actions or resources

Key Takeaways:
Clear understanding of Cisco's Zero Trust Access solution and its advantages
A detailed map of the customer's current zero trust access landscape
Identification of immediate opportunities and long-term strategies for transformation


Who Should Attend:

  • CISO and Security Leaders
  • Network and Identity Administrators & Teams
  • SecOps Leaders and Staff
  • Cisco SEs and Technical Architects

Notes:

  • Ensure stakeholders from all relevant teams participate for a holistic view.
  • Bring network topology diagrams and inventory lists for deeper engagement.
  • The session is interactive and tailored to specific customer needs.
Event Date 2026-02-09
Event Location Timezone Asia/Singapore
Event Start Time 10:00 AM
Event End Time 12:00 PM
Capacity 10
Registered 1
Available Place 9
Created By Sandeep Yadav
Workshop Length in Hours 2
Geolocation: apjc
Type of event: sales
SnC SFDC Deal ID 82955021
Location AL Rajhi Bank Malaysia

We are no longer accepting registration for this event

MISC Zero Trust Access

Course Title:
Designing and Deploying Zero Trust Access


Course Description:
Step into the role of a network security administrator in this guided, hands-on workshop. You’ll learn how to design, deploy, and validate a modern Zero Trust Access solution using Cisco Secure Access. Acting as the administrator for the fictional organization PseudoCo, you will configure secure connectivity between remote users and private applications hosted in a secure data center.

You’ll have full administrative access to a dedicated virtual data center environment in Cisco’s dCloud, pre-provisioned for Secure Access integration. Each participant also receives a unique Secure Access organization, enabling you to configure and test infrastructure in any Secure Access region, with recommendations to align settings with your specific dCloud Data Center location.


Workshop Highlights

  • Real-World Zero Trust Scenarios: Configure secure connectivity for remote users and private applications.
  • Hands-On Labs: Access to a fully provisioned virtual data center and unique Secure Access organization.
  • End-to-End Deployment: Learn to set up VPNs, IP pools, and tunnels for seamless, secure access.
  • Expert Guidance: Step-by-step lab exercises and access to proctors for support.

Key Takeaways

  • Practical experience deploying Zero Trust Access solutions using Cisco Secure Access.
  • Skills to configure and validate secure connections between distributed users and applications.
  • Understanding of best practices for aligning Secure Access configurations with data center regions.

Who Should Attend

  • IT and network administrators responsible for securing enterprise access.
  • Security engineers and architects interested in Zero Trust methodologies.
  • Anyone preparing to deploy Cisco Secure Access solutions in their organization.

Workshop Format

  • Hands-On Labs: Interactive, guided exercises in a live dCloud virtual environment.
  • Instructor Support: Direct assistance from proctors and subject matter experts.
  • Individual Access: Each attendee receives their own Secure Access organization and isolated lab environment.

Prerequisites

  • Familiarity with basic networking and security concepts.
  • Prior experience with remote access technologies or Cisco solutions is helpful but not required.
  • Access to a Cisco dCloud account (provided as part of the course).

Why Attend?

This workshop offers a unique, practical opportunity to master Zero Trust Access with Cisco Secure Access in a risk-free, fully supported lab environment. You’ll leave with the confidence and know-how to implement secure, modern access solutions tailored to your organization’s needs.

Event Date 2026-02-12
Event Location Timezone Asia/Singapore
Event Start Time 8:30 AM
Event End Time 3:00 PM
Capacity 15
Registered 0
Available Place 15
Created By Sandeep Yadav
Workshop Length in Hours 4
Geolocation: apjc
Type of event: sales
Location Cisco Systems Malaysia SDN BHD

The event was cancelled. We are not longer accepting registration

MISC ZTA Design Clinic

Overview:
The Zero Trust Access Design Workshop is a comprehensive 2-hour interactive session designed to help organizations understand and leverage Cisco’s Zero Trust Access capabilities. This workshop combines a targeted presentation, hands-on collaboration, and strategic planning to help customers modernize their zero trust architecture, enhance security visibility, and optimize operational efficiency.


Agenda:

1. Introduction & Presentation (15 - minutes)

  • Overview of Cisco's Zero Trust Access solution
  • Key Advantages: unified policy management, improved visibility, operational simplification, and cost savings
  • Real-world examples and customer success stories
  • Discussion on integrating a zero trust approach with existing infrastructure

2. Interactive Discussion & White-boarding (45 Minutes)

  • Identification and mapping of all access types, vendors, and resource locations within the customer's environment
  • White-boarding session to discuss current state, capture the challenges, and reveal potential gaps in visibility, security or management
  • Discussion of integration opportunities and quick wins for zero trust deployment

3. Demonstration and Discussion (15 minutes)

  • Summary of key findings from the discussion and whiteboarding
  • Collaborative development of a high-level roadmap for adopting a zero trust access solution
  • Recommendations on next steps to streamline operations, reduce costs, and improve security posture
  • Q&A and assignment of follow-up actions or resources

Key Takeaways:
Clear understanding of Cisco's Zero Trust Access solution and its advantages
A detailed map of the customer's current zero trust access landscape
Identification of immediate opportunities and long-term strategies for transformation


Who Should Attend:

  • CISO and Security Leaders
  • Network and Identity Administrators & Teams
  • SecOps Leaders and Staff
  • Cisco SEs and Technical Architects

Notes:

  • Ensure stakeholders from all relevant teams participate for a holistic view.
  • Bring network topology diagrams and inventory lists for deeper engagement.
  • The session is interactive and tailored to specific customer needs.
Event Date 2026-02-12
Event Location Timezone Asia/Singapore
Event Start Time 11:30 AM
Event End Time 1:00 PM
Capacity 10
Registered 4
Available Place 6
Created By Sandeep Yadav
Workshop Length in Hours 2
Geolocation: apjc
Type of event: sales
SnC SFDC Deal ID 82955021
Location MISC Berhad

We are no longer accepting registration for this event

BGC ZT

Course Title:
Designing and Deploying Zero Trust Access with Cisco Secure Access


Course Description:
Step into the role of a network security administrator in this guided, hands-on workshop. You’ll learn how to design, deploy, and validate a modern Zero Trust Access solution using Cisco Secure Access. Acting as the administrator for the fictional organization PseudoCo, you will configure secure connectivity between remote users and private applications hosted in a secure data center.

You’ll have full administrative access to a dedicated virtual data center environment in Cisco’s dCloud, pre-provisioned for Secure Access integration. Each participant also receives a unique Secure Access organization, enabling you to configure and test infrastructure in any Secure Access region, with recommendations to align settings with your specific dCloud Data Center location.


Workshop Highlights

  • Real-World Zero Trust Scenarios: Configure secure connectivity for remote users and private applications.
  • Hands-On Labs: Access to a fully provisioned virtual data center and unique Secure Access organization.
  • End-to-End Deployment: Learn to set up VPNs, IP pools, and tunnels for seamless, secure access.
  • Expert Guidance: Step-by-step lab exercises and access to proctors for support.

Key Takeaways

  • Practical experience deploying Zero Trust Access solutions using Cisco Secure Access.
  • Skills to configure and validate secure connections between distributed users and applications.
  • Understanding of best practices for aligning Secure Access configurations with data center regions.

Who Should Attend

  • IT and network administrators responsible for securing enterprise access.
  • Security engineers and architects interested in Zero Trust methodologies.
  • Anyone preparing to deploy Cisco Secure Access solutions in their organization.

Workshop Format

  • Hands-On Labs: Interactive, guided exercises in a live dCloud virtual environment.
  • Instructor Support: Direct assistance from proctors and subject matter experts.
  • Individual Access: Each attendee receives their own Secure Access organization and isolated lab environment.

Prerequisites

  • Familiarity with basic networking and security concepts.
  • Prior experience with remote access technologies or Cisco solutions is helpful but not required.
  • Access to a Cisco dCloud account (provided as part of the course).

Why Attend?

This workshop offers a unique, practical opportunity to master Zero Trust Access with Cisco Secure Access in a risk-free, fully supported lab environment. You’ll leave with the confidence and know-how to implement secure, modern access solutions tailored to your organization’s needs.

Event Date 2026-02-22
Event Location Timezone Asia/Singapore
Event Start Time 9:00 AM
Event End Time 2:00 PM
Capacity 5
Registered 1
Available Place 4
Created By Sandeep Yadav
Workshop Length in Hours 4
Geolocation: apjc
Type of event: sales
Location Cisco

We are no longer accepting registration for this event

Bridgenet Malaysia ZTA Workshop

Course Title:
Designing and Deploying Zero Trust Access with Cisco Secure Access


Course Description:
Step into the role of a network security administrator in this guided, hands-on workshop. You’ll learn how to design, deploy, and validate a modern Zero Trust Access solution using Cisco Secure Access. Acting as the administrator for the fictional organization PseudoCo, you will configure secure connectivity between remote users and private applications hosted in a secure data center.

You’ll have full administrative access to a dedicated virtual data center environment in Cisco’s dCloud, pre-provisioned for Secure Access integration. Each participant also receives a unique Secure Access organization, enabling you to configure and test infrastructure in any Secure Access region, with recommendations to align settings with your specific dCloud Data Center location.


Workshop Highlights

  • Real-World Zero Trust Scenarios: Configure secure connectivity for remote users and private applications.
  • Hands-On Labs: Access to a fully provisioned virtual data center and unique Secure Access organization.
  • End-to-End Deployment: Learn to set up VPNs, IP pools, and tunnels for seamless, secure access.
  • Expert Guidance: Step-by-step lab exercises and access to proctors for support.

Key Takeaways

  • Practical experience deploying Zero Trust Access solutions using Cisco Secure Access.
  • Skills to configure and validate secure connections between distributed users and applications.
  • Understanding of best practices for aligning Secure Access configurations with data center regions.

Who Should Attend

  • IT and network administrators responsible for securing enterprise access.
  • Security engineers and architects interested in Zero Trust methodologies.
  • Anyone preparing to deploy Cisco Secure Access solutions in their organization.

Workshop Format

  • Hands-On Labs: Interactive, guided exercises in a live dCloud virtual environment.
  • Instructor Support: Direct assistance from proctors and subject matter experts.
  • Individual Access: Each attendee receives their own Secure Access organization and isolated lab environment.

Prerequisites

  • Familiarity with basic networking and security concepts.
  • Prior experience with remote access technologies or Cisco solutions is helpful but not required.
  • Access to a Cisco dCloud account (provided as part of the course).

Why Attend?

This workshop offers a unique, practical opportunity to master Zero Trust Access with Cisco Secure Access in a risk-free, fully supported lab environment. You’ll leave with the confidence and know-how to implement secure, modern access solutions tailored to your organization’s needs.

Event Date 2026-03-11
Event Location Timezone Asia/Singapore
Event Start Time 10:45 AM
Event End Time 3:30 PM
Capacity 15
Registered 12
Available Place 3
Created By Sandeep Yadav
Workshop Length in Hours 4
Geolocation: apjc
Type of event: cisco-internal
Location Bridgenet Solutions Sdn Bhd

We are no longer accepting registration for this event

Malaysia Firewall Test Drive Ver. 10.0

 

 

In today’s rapidly evolving cybersecurity landscape, safeguarding your network from sophisticated threats requires more than just traditional firewalls. Cisco Next-Generation Firewalls (NGFW) provide advanced threat protection, deep visibility, and unparalleled control across your organization’s infrastructure. This comprehensive hands-on workshop is designed to equip IT professionals, network administrators, and security architects with the skills and knowledge they need to deploy, configure, and manage Cisco NGFWs effectively.

Join us for an interactive, instructor-led experience where theory meets practice. Learn how to secure your enterprise while exploring real-world scenarios through live lab exercises. Whether you're new to NGFWs or looking to deepen your expertise, this workshop will provide actionable insights into leveraging Cisco's cutting-edge security technologies.


What You'll Learn:

  1. Introduction to Cisco NGFW:

    • Overview of NGFW capabilities, architecture, and key features.
    • Understanding how Cisco NGFW integrates with your existing security ecosystem.
  2. Deployment and Configuration:

    • Hands-on setup of Cisco NGFW in various network environments.
    • Configuring access control policies, application visibility, and URL filtering.
  3. Advanced Threat Protection:

    • Exploring Cisco’s Talos Threat Intelligence for proactive threat management.
    • Implementing intrusion prevention systems (IPS) and advanced malware protection (AMP).
  4. Deep Packet Inspection and Traffic Analysis:

    • Using Cisco NGFW to identify and control encrypted traffic with SSL/TLS inspection.
    • Monitoring network traffic and analyzing logs for suspicious activity.
  5. Securing Remote Workforces:

    • Configuring VPNs and Zero Trust capabilities for secure remote access.
    • Protecting endpoints with Cisco Secure Endpoint integration.

Who Should Attend:

  • Network security engineers and administrators.
  • IT professionals involved in cybersecurity implementation and management.
  • Organizations looking to enhance their network security posture with Cisco technologies.

Workshop Highlights:

  • Hands-On Lab Exercises: Gain practical experience with Cisco NGFW in a simulated enterprise environment.
  • Expert-Led Instruction: Learn from certified Cisco professionals with real-world experience.
  • Real-World Use Cases: Explore scenarios such as ransomware mitigation, insider threat detection, and secure hybrid cloud integration.
  • Q&A and Support: Get your questions answered by experts and take home actionable insights.

Prerequisites:

  • You will need to bring a laptop as this is a hands-on workshop
  • Basic understanding of networking concepts (e.g., TCP/IP, routing, and switching).
  • Familiarity with cybersecurity principles is recommended but not required.

Takeaways:

  • Comprehensive workshop material (slides, configurations, and guides).
  • Certificate of Completion to validate your knowledge.
  • Practical skills to deploy and manage Cisco NGFWs in your own network environment.

Why Attend?

By the end of this workshop, you’ll have the confidence and expertise to leverage Cisco Next-Generation Firewalls to safeguard your organization’s digital assets, ensure compliance, and mitigate modern cyber threats effectively. Don’t miss this opportunity to stay ahead in the ever-changing field of cybersecurity.

Event Date 2026-04-09
Event Location Timezone Asia/Singapore
Event Start Time 9:00 AM
Event End Time 2:00 PM
Capacity 30
Registered 0
Available Place 30
Created By Sandeep Yadav
Workshop Length in Hours 4
Geolocation: apjc
Type of event: marketing