ZTAiCAL Export
ZTA Workshop

Course Title:
Designing and Deploying Zero Trust Access with Cisco Secure Access
Course Description:
Step into the role of a network security administrator in this guided, hands-on workshop. You’ll learn how to design, deploy, and validate a modern Zero Trust Access solution using Cisco Secure Access. Acting as the administrator for the fictional organization PseudoCo, you will configure secure connectivity between remote users and private applications hosted in a secure data center.
You’ll have full administrative access to a dedicated virtual data center environment in Cisco’s dCloud, pre-provisioned for Secure Access integration. Each participant also receives a unique Secure Access organization, enabling you to configure and test infrastructure in any Secure Access region, with recommendations to align settings with your specific dCloud Data Center location.
Workshop Highlights
- Real-World Zero Trust Scenarios: Configure secure connectivity for remote users and private applications.
- Hands-On Labs: Access to a fully provisioned virtual data center and unique Secure Access organization.
- End-to-End Deployment: Learn to set up VPNs, IP pools, and tunnels for seamless, secure access.
- Expert Guidance: Step-by-step lab exercises and access to proctors for support.
Key Takeaways
- Practical experience deploying Zero Trust Access solutions using Cisco Secure Access.
- Skills to configure and validate secure connections between distributed users and applications.
- Understanding of best practices for aligning Secure Access configurations with data center regions.
Who Should Attend
- IT and network administrators responsible for securing enterprise access.
- Security engineers and architects interested in Zero Trust methodologies.
- Anyone preparing to deploy Cisco Secure Access solutions in their organization.
Workshop Format
- Hands-On Labs: Interactive, guided exercises in a live dCloud virtual environment.
- Instructor Support: Direct assistance from proctors and subject matter experts.
- Individual Access: Each attendee receives their own Secure Access organization and isolated lab environment.
Prerequisites
- Familiarity with basic networking and security concepts.
- Prior experience with remote access technologies or Cisco solutions is helpful but not required.
- Access to a Cisco dCloud account (provided as part of the course).
Why Attend?
This workshop offers a unique, practical opportunity to master Zero Trust Access with Cisco Secure Access in a risk-free, fully supported lab environment. You’ll leave with the confidence and know-how to implement secure, modern access solutions tailored to your organization’s needs.
| Event Date | 2026-02-06 |
| Event Location Timezone | Asia/Singapore |
| Event Start Time | 10:00 AM |
| Event End Time | 2:00 PM |
| Capacity | 10 |
| Registered | 0 |
| Available Place | 10 |
| Created By | Sandeep Yadav |
| Geolocation: | apjc |
| Type of event: | sales |
| Location | Cisco Systems Malaysia SDN BHD |
Zero Trust Access Design Clinic Beta
Overview:
The Zero Trust Access Design Workshop is a comprehensive 2-hour interactive session designed to help organizations understand and leverage Cisco’s Zero Trust Access capabilities. This workshop combines a targeted presentation, hands-on collaboration, and strategic planning to help customers modernize their zero trust architecture, enhance security visibility, and optimize operational efficiency.
Agenda:
1. Introduction & Presentation (30 - minutes)
- Overview of Cisco’s Zero Trust Access solution
- Key Advantages: unified policy management, improved visibility, operational simplification, and cost savings
- Real-world examples and customer success stories
- Discussion on integrating a zero trust approach with existing infrastructures
2. Interactive Discussion & White-boarding (45 Minutes)
- Open dialogue between customers and Cisco Solutions Engineers (SEs) on current zero trust management practices
- Identification and mapping of all access types, vendors, and resource locations within the customer’s environment
- White-boarding session to illustrate current state, highlight challenges, and reveal potential gaps in visibility or management
- Discussion of integration opportunities and quick wins for zero trust deployment
3. Demonstration and Discussion (15 minutes)
- Summary of key findings from the discussion and whiteboarding
- Collaborative development of a high-level roadmap for adopting a zero trust access solution
- Recommendations on next steps to streamline operations, reduce costs, and improve security posture
- Q&A and assignment of follow-up actions or resources
Key Takeaways:
- Clear understanding of Cisco’s Zero Trust Access solution and its advantages
- A detailed map of the customer’s current zero trust acess landscape
- Identification of immediate opportunities and long-term strategies for transformation
- A customized roadmap to help achieve a unified, scalable, and efficient security architecture
Who Should Attend:
- CISO and Security Leaders
- Network and Identity Administrators & Teams
- SecOps Leaders and Staff
- Cisco SEs and Technical Architects
Format:
- 2-hour session (in-person or virtual)
- Combination of presentation, discussion, and collaborative white-boarding
- Actionable deliverables and next steps tailored to customer environment
Notes:
- Ensure stakeholders from all relevant teams participate for a holistic view.
- Bring network topology diagrams and inventory lists for deeper engagement.
- The session is interactive and tailored to specific customer needs.
| Event Date | 2026-02-06 |
| Event Location Timezone | America/Los_Angeles |
| Event Start Time | 10:00 AM |
| Event End Time | 12:00 PM |
| Capacity | 40 |
| Registered | 18 |
| Available Place | 22 |
| Created By | Andy Peterson |
| Workshop Length in Hours | 2 |
| Geolocation: | amer |
| Type of event: | cisco-internal |
| Webex URL | https://cisco.webex.com/cisco/j.php?MTID=m9aa2b3de5f46a04088309b29ae0cab93 |
| Location | Virtual |
AL Rajhi Bank
Overview:
The Zero Trust Access Design Workshop is a comprehensive 2-hour interactive session designed to help organizations understand and leverage Cisco’s Zero Trust Access capabilities. This workshop combines a targeted presentation, hands-on collaboration, and strategic planning to help customers modernize their zero trust architecture, enhance security visibility, and optimize operational efficiency.
Agenda:
1. Introduction & Presentation (15 - minutes)
- Overview of Cisco's Zero Trust Access solution
- Key Advantages: unified policy management, improved visibility, operational simplification, and cost savings
- Real-world examples and customer success stories
- Discussion on integrating a zero trust approach with existing infrastructure
2. Interactive Discussion & White-boarding (45 Minutes)
- Identification and mapping of all access types, vendors, and resource locations within the customer's environment
- White-boarding session to discuss current state, capture the challenges, and reveal potential gaps in visibility, security or management
- Discussion of integration opportunities and quick wins for zero trust deployment
3. Demonstration and Discussion (15 minutes)
- Summary of key findings from the discussion and whiteboarding
- Collaborative development of a high-level roadmap for adopting a zero trust access solution
- Recommendations on next steps to streamline operations, reduce costs, and improve security posture
- Q&A and assignment of follow-up actions or resources
Key Takeaways:
Clear understanding of Cisco's Zero Trust Access solution and its advantages
A detailed map of the customer's current zero trust access landscape
Identification of immediate opportunities and long-term strategies for transformation
Who Should Attend:
- CISO and Security Leaders
- Network and Identity Administrators & Teams
- SecOps Leaders and Staff
- Cisco SEs and Technical Architects
Notes:
- Ensure stakeholders from all relevant teams participate for a holistic view.
- Bring network topology diagrams and inventory lists for deeper engagement.
- The session is interactive and tailored to specific customer needs.
| Event Date | 2026-02-09 |
| Event Location Timezone | Asia/Singapore |
| Event Start Time | 10:00 AM |
| Event End Time | 12:00 PM |
| Capacity | 10 |
| Registered | 1 |
| Available Place | 9 |
| Created By | Sandeep Yadav |
| Workshop Length in Hours | 2 |
| Geolocation: | apjc |
| Type of event: | sales |
| SnC SFDC Deal ID | 82955021 |
| Location | AL Rajhi Bank Malaysia |
ZTA Design Clinic - Domain Specialists Training
Overview:
The Zero Trust Access Design Workshop is a comprehensive 2-hour interactive session designed to help organizations understand and leverage Cisco’s Zero Trust Access capabilities. This workshop combines a targeted presentation, hands-on collaboration, and strategic planning to help customers modernize their zero trust architecture, enhance security visibility, and optimize operational efficiency.
Agenda:
1. Introduction & Presentation (30 - minutes)
- Overview of Cisco’s Zero Trust Access solution
- Key Advantages: unified policy management, improved visibility, operational simplification, and cost savings
- Real-world examples and customer success stories
- Discussion on integrating a zero trust approach with existing infrastructures
2. Interactive Discussion & White-boarding (45 Minutes)
- Open dialogue between customers and Cisco Solutions Engineers (SEs) on current zero trust management practices
- Identification and mapping of all access types, vendors, and resource locations within the customer’s environment
- White-boarding session to illustrate current state, highlight challenges, and reveal potential gaps in visibility or management
- Discussion of integration opportunities and quick wins for zero trust deployment
3. Demonstration and Discussion (15 minutes)
- Summary of key findings from the discussion and whiteboarding
- Collaborative development of a high-level roadmap for adopting a zero trust access solution
- Recommendations on next steps to streamline operations, reduce costs, and improve security posture
- Q&A and assignment of follow-up actions or resources
Key Takeaways:
- Clear understanding of Cisco’s Zero Trust Access solution and its advantages
- A detailed map of the customer’s current zero trust acess landscape
- Identification of immediate opportunities and long-term strategies for transformation
- A customized roadmap to help achieve a unified, scalable, and efficient security architecture
Who Should Attend:
- CISO and Security Leaders
- Network and Identity Administrators & Teams
- SecOps Leaders and Staff
- Cisco SEs and Technical Architects
Format:
- 2-hour session (in-person or virtual)
- Combination of presentation, discussion, and collaborative white-boarding
- Actionable deliverables and next steps tailored to customer environment
Notes:
- Ensure stakeholders from all relevant teams participate for a holistic view.
- Bring network topology diagrams and inventory lists for deeper engagement.
- The session is interactive and tailored to specific customer needs.
| Event Date | 2026-02-11 |
| Event Location Timezone | America/Los_Angeles |
| Event Start Time | 8:00 AM |
| Event End Time | 9:00 AM |
| Capacity | 200 |
| Registered | 87 |
| Available Place | 113 |
| Created By | Andy Peterson |
| Workshop Length in Hours | 1 |
| Geolocation: | amer |
| Type of event: | cisco-internal |
| Location | Virtual |
MISC Zero Trust Access

Course Title:
Designing and Deploying Zero Trust Access
Course Description:
Step into the role of a network security administrator in this guided, hands-on workshop. You’ll learn how to design, deploy, and validate a modern Zero Trust Access solution using Cisco Secure Access. Acting as the administrator for the fictional organization PseudoCo, you will configure secure connectivity between remote users and private applications hosted in a secure data center.
You’ll have full administrative access to a dedicated virtual data center environment in Cisco’s dCloud, pre-provisioned for Secure Access integration. Each participant also receives a unique Secure Access organization, enabling you to configure and test infrastructure in any Secure Access region, with recommendations to align settings with your specific dCloud Data Center location.
Workshop Highlights
- Real-World Zero Trust Scenarios: Configure secure connectivity for remote users and private applications.
- Hands-On Labs: Access to a fully provisioned virtual data center and unique Secure Access organization.
- End-to-End Deployment: Learn to set up VPNs, IP pools, and tunnels for seamless, secure access.
- Expert Guidance: Step-by-step lab exercises and access to proctors for support.
Key Takeaways
- Practical experience deploying Zero Trust Access solutions using Cisco Secure Access.
- Skills to configure and validate secure connections between distributed users and applications.
- Understanding of best practices for aligning Secure Access configurations with data center regions.
Who Should Attend
- IT and network administrators responsible for securing enterprise access.
- Security engineers and architects interested in Zero Trust methodologies.
- Anyone preparing to deploy Cisco Secure Access solutions in their organization.
Workshop Format
- Hands-On Labs: Interactive, guided exercises in a live dCloud virtual environment.
- Instructor Support: Direct assistance from proctors and subject matter experts.
- Individual Access: Each attendee receives their own Secure Access organization and isolated lab environment.
Prerequisites
- Familiarity with basic networking and security concepts.
- Prior experience with remote access technologies or Cisco solutions is helpful but not required.
- Access to a Cisco dCloud account (provided as part of the course).
Why Attend?
This workshop offers a unique, practical opportunity to master Zero Trust Access with Cisco Secure Access in a risk-free, fully supported lab environment. You’ll leave with the confidence and know-how to implement secure, modern access solutions tailored to your organization’s needs.
| Event Date | 2026-02-12 |
| Event Location Timezone | Asia/Singapore |
| Event Start Time | 8:30 AM |
| Event End Time | 3:00 PM |
| Capacity | 15 |
| Registered | 0 |
| Available Place | 15 |
| Created By | Sandeep Yadav |
| Workshop Length in Hours | 4 |
| Geolocation: | apjc |
| Type of event: | sales |
| Location | Cisco Systems Malaysia SDN BHD |
MISC ZTA Design Clinic
Overview:
The Zero Trust Access Design Workshop is a comprehensive 2-hour interactive session designed to help organizations understand and leverage Cisco’s Zero Trust Access capabilities. This workshop combines a targeted presentation, hands-on collaboration, and strategic planning to help customers modernize their zero trust architecture, enhance security visibility, and optimize operational efficiency.
Agenda:
1. Introduction & Presentation (15 - minutes)
- Overview of Cisco's Zero Trust Access solution
- Key Advantages: unified policy management, improved visibility, operational simplification, and cost savings
- Real-world examples and customer success stories
- Discussion on integrating a zero trust approach with existing infrastructure
2. Interactive Discussion & White-boarding (45 Minutes)
- Identification and mapping of all access types, vendors, and resource locations within the customer's environment
- White-boarding session to discuss current state, capture the challenges, and reveal potential gaps in visibility, security or management
- Discussion of integration opportunities and quick wins for zero trust deployment
3. Demonstration and Discussion (15 minutes)
- Summary of key findings from the discussion and whiteboarding
- Collaborative development of a high-level roadmap for adopting a zero trust access solution
- Recommendations on next steps to streamline operations, reduce costs, and improve security posture
- Q&A and assignment of follow-up actions or resources
Key Takeaways:
Clear understanding of Cisco's Zero Trust Access solution and its advantages
A detailed map of the customer's current zero trust access landscape
Identification of immediate opportunities and long-term strategies for transformation
Who Should Attend:
- CISO and Security Leaders
- Network and Identity Administrators & Teams
- SecOps Leaders and Staff
- Cisco SEs and Technical Architects
Notes:
- Ensure stakeholders from all relevant teams participate for a holistic view.
- Bring network topology diagrams and inventory lists for deeper engagement.
- The session is interactive and tailored to specific customer needs.
| Event Date | 2026-02-12 |
| Event Location Timezone | Asia/Singapore |
| Event Start Time | 11:30 AM |
| Event End Time | 1:00 PM |
| Capacity | 10 |
| Registered | 4 |
| Available Place | 6 |
| Created By | Sandeep Yadav |
| Workshop Length in Hours | 2 |
| Geolocation: | apjc |
| Type of event: | sales |
| SnC SFDC Deal ID | 82955021 |
| Location | MISC Berhad |
| Event Date | 2026-02-13 |
| Event Location Timezone | UTC |
| Event Start Time | 10:00 AM |
| Event End Time | 2:00 PM |
| Capacity | Unlimited |
| Registered | 0 |
| Created By | Surender Kumar |
| Geolocation: | apjc |
| Type of event: | cisco-internal |
ZTA Design Clinic Overview - APJC/EMEA
Overview:
The Zero Trust Access Design Workshop is a comprehensive 2-hour interactive session designed to help organizations understand and leverage Cisco’s Zero Trust Access capabilities. This workshop combines a targeted presentation, hands-on collaboration, and strategic planning to help customers modernize their zero trust architecture, enhance security visibility, and optimize operational efficiency.
Agenda:
1. Introduction & Presentation (30 - minutes)
- Overview of Cisco’s Zero Trust Access solution
- Key Advantages: unified policy management, improved visibility, operational simplification, and cost savings
- Real-world examples and customer success stories
- Discussion on integrating a zero trust approach with existing infrastructures
2. Interactive Discussion & White-boarding (45 Minutes)
- Open dialogue between customers and Cisco Solutions Engineers (SEs) on current zero trust management practices
- Identification and mapping of all access types, vendors, and resource locations within the customer’s environment
- White-boarding session to illustrate current state, highlight challenges, and reveal potential gaps in visibility or management
- Discussion of integration opportunities and quick wins for zero trust deployment
3. Demonstration and Discussion (15 minutes)
- Summary of key findings from the discussion and whiteboarding
- Collaborative development of a high-level roadmap for adopting a zero trust access solution
- Recommendations on next steps to streamline operations, reduce costs, and improve security posture
- Q&A and assignment of follow-up actions or resources
Key Takeaways:
- Clear understanding of Cisco’s Zero Trust Access solution and its advantages
- A detailed map of the customer’s current zero trust acess landscape
- Identification of immediate opportunities and long-term strategies for transformation
- A customized roadmap to help achieve a unified, scalable, and efficient security architecture
Who Should Attend:
- CISO and Security Leaders
- Network and Identity Administrators & Teams
- SecOps Leaders and Staff
- Cisco SEs and Technical Architects
Format:
- 2-hour session (in-person or virtual)
- Combination of presentation, discussion, and collaborative white-boarding
- Actionable deliverables and next steps tailored to customer environment
Notes:
- Ensure stakeholders from all relevant teams participate for a holistic view.
- Bring network topology diagrams and inventory lists for deeper engagement.
- The session is interactive and tailored to specific customer needs.
| Event Date | 2026-02-18 |
| Event Location Timezone | America/Los_Angeles |
| Event Start Time | 11:00 PM |
| Event End Time | 11:55 PM |
| Capacity | 30 |
| Registered | 12 |
| Available Place | 18 |
| Created By | Andy Peterson |
| Workshop Length in Hours | 1 |
| Geolocation: | apjc |
| Type of event: | cisco-internal |
| Webex URL | https://cisco.webex.com/meet/wmanyati |
| Location | Virtual |
ZTA Design Clinic
Overview:
The Zero Trust Access Design Workshop is a comprehensive 2-hour interactive session designed to help organizations understand and leverage Cisco’s Zero Trust Access capabilities. This workshop combines a targeted presentation, hands-on collaboration, and strategic planning to help customers modernize their zero trust architecture, enhance security visibility, and optimize operational efficiency.
Agenda:
1. Introduction & Presentation (30 - minutes)
- Overview of Cisco’s Zero Trust Access solution
- Key Advantages: unified policy management, improved visibility, operational simplification, and cost savings
- Real-world examples and customer success stories
- Discussion on integrating a zero trust approach with existing infrastructures
2. Interactive Discussion & White-boarding (45 Minutes)
- Open dialogue between customers and Cisco Solutions Engineers (SEs) on current zero trust management practices
- Identification and mapping of all access types, vendors, and resource locations within the customer’s environment
- White-boarding session to illustrate current state, highlight challenges, and reveal potential gaps in visibility or management
- Discussion of integration opportunities and quick wins for zero trust deployment
3. Demonstration and Discussion (15 minutes)
- Summary of key findings from the discussion and whiteboarding
- Collaborative development of a high-level roadmap for adopting a zero trust access solution
- Recommendations on next steps to streamline operations, reduce costs, and improve security posture
- Q&A and assignment of follow-up actions or resources
Key Takeaways:
- Clear understanding of Cisco’s Zero Trust Access solution and its advantages
- A detailed map of the customer’s current zero trust acess landscape
- Identification of immediate opportunities and long-term strategies for transformation
- A customized roadmap to help achieve a unified, scalable, and efficient security architecture
Who Should Attend:
- CISO and Security Leaders
- Network and Identity Administrators & Teams
- SecOps Leaders and Staff
- Cisco SEs and Technical Architects
Format:
- 2-hour session (in-person or virtual)
- Combination of presentation, discussion, and collaborative white-boarding
- Actionable deliverables and next steps tailored to customer environment
Notes:
- Ensure stakeholders from all relevant teams participate for a holistic view.
- Bring network topology diagrams and inventory lists for deeper engagement.
- The session is interactive and tailored to specific customer needs.
| Event Date | 2026-02-19 |
| Event Location Timezone | America/Los_Angeles |
| Event Start Time | 10:00 AM |
| Event End Time | 2:00 PM |
| Capacity | 10 |
| Registered | 0 |
| Available Place | 10 |
| Created By | Andy Peterson |
| Workshop Length in Hours | 4 |
| Geolocation: | apjc |
| Type of event: | sales |
| Location | Virtual |
Self Hosted ZTA DC
Overview:
The Zero Trust Access Design Workshop is a comprehensive 2-hour interactive session designed to help organizations understand and leverage Cisco’s Zero Trust Access capabilities. This workshop combines a targeted presentation, hands-on collaboration, and strategic planning to help customers modernize their zero trust architecture, enhance security visibility, and optimize operational efficiency.
Agenda:
1. Introduction & Presentation (30 - minutes)
- Overview of Cisco’s Zero Trust Access solution
- Key Advantages: unified policy management, improved visibility, operational simplification, and cost savings
- Real-world examples and customer success stories
- Discussion on integrating a zero trust approach with existing infrastructures
2. Interactive Discussion & White-boarding (45 Minutes)
- Open dialogue between customers and Cisco Solutions Engineers (SEs) on current zero trust management practices
- Identification and mapping of all access types, vendors, and resource locations within the customer’s environment
- White-boarding session to illustrate current state, highlight challenges, and reveal potential gaps in visibility or management
- Discussion of integration opportunities and quick wins for zero trust deployment
3. Demonstration and Discussion (15 minutes)
- Summary of key findings from the discussion and whiteboarding
- Collaborative development of a high-level roadmap for adopting a zero trust access solution
- Recommendations on next steps to streamline operations, reduce costs, and improve security posture
- Q&A and assignment of follow-up actions or resources
Key Takeaways:
- Clear understanding of Cisco’s Zero Trust Access solution and its advantages
- A detailed map of the customer’s current zero trust acess landscape
- Identification of immediate opportunities and long-term strategies for transformation
- A customized roadmap to help achieve a unified, scalable, and efficient security architecture
Who Should Attend:
- CISO and Security Leaders
- Network and Identity Administrators & Teams
- SecOps Leaders and Staff
- Cisco SEs and Technical Architects
Format:
- 2-hour session (in-person or virtual)
- Combination of presentation, discussion, and collaborative white-boarding
- Actionable deliverables and next steps tailored to customer environment
Notes:
- Ensure stakeholders from all relevant teams participate for a holistic view.
- Bring network topology diagrams and inventory lists for deeper engagement.
- The session is interactive and tailored to specific customer needs.
| Event Date | 2026-02-20 |
| Event Location Timezone | Asia/Singapore |
| Event Start Time | 10:00 AM |
| Event End Time | 3:00 PM |
| Capacity | Unlimited |
| Registered | 1 |
| Created By | Martin Perry |
BGC ZT

Course Title:
Designing and Deploying Zero Trust Access with Cisco Secure Access
Course Description:
Step into the role of a network security administrator in this guided, hands-on workshop. You’ll learn how to design, deploy, and validate a modern Zero Trust Access solution using Cisco Secure Access. Acting as the administrator for the fictional organization PseudoCo, you will configure secure connectivity between remote users and private applications hosted in a secure data center.
You’ll have full administrative access to a dedicated virtual data center environment in Cisco’s dCloud, pre-provisioned for Secure Access integration. Each participant also receives a unique Secure Access organization, enabling you to configure and test infrastructure in any Secure Access region, with recommendations to align settings with your specific dCloud Data Center location.
Workshop Highlights
- Real-World Zero Trust Scenarios: Configure secure connectivity for remote users and private applications.
- Hands-On Labs: Access to a fully provisioned virtual data center and unique Secure Access organization.
- End-to-End Deployment: Learn to set up VPNs, IP pools, and tunnels for seamless, secure access.
- Expert Guidance: Step-by-step lab exercises and access to proctors for support.
Key Takeaways
- Practical experience deploying Zero Trust Access solutions using Cisco Secure Access.
- Skills to configure and validate secure connections between distributed users and applications.
- Understanding of best practices for aligning Secure Access configurations with data center regions.
Who Should Attend
- IT and network administrators responsible for securing enterprise access.
- Security engineers and architects interested in Zero Trust methodologies.
- Anyone preparing to deploy Cisco Secure Access solutions in their organization.
Workshop Format
- Hands-On Labs: Interactive, guided exercises in a live dCloud virtual environment.
- Instructor Support: Direct assistance from proctors and subject matter experts.
- Individual Access: Each attendee receives their own Secure Access organization and isolated lab environment.
Prerequisites
- Familiarity with basic networking and security concepts.
- Prior experience with remote access technologies or Cisco solutions is helpful but not required.
- Access to a Cisco dCloud account (provided as part of the course).
Why Attend?
This workshop offers a unique, practical opportunity to master Zero Trust Access with Cisco Secure Access in a risk-free, fully supported lab environment. You’ll leave with the confidence and know-how to implement secure, modern access solutions tailored to your organization’s needs.
| Event Date | 2026-02-22 |
| Event Location Timezone | Asia/Singapore |
| Event Start Time | 9:00 AM |
| Event End Time | 2:00 PM |
| Capacity | 5 |
| Registered | 1 |
| Available Place | 4 |
| Created By | Sandeep Yadav |
| Workshop Length in Hours | 4 |
| Geolocation: | apjc |
| Type of event: | sales |
| Location | Cisco |
| Event Date | 2026-02-26 |
| Event Location Timezone | Asia/Jakarta |
| Event Start Time | 9:00 AM |
| Event End Time | 4:00 PM |
| Capacity | 5 |
| Registered | 0 |
| Available Place | 5 |
| Created By | Rein Putra |
| Geolocation: | apjc |
| Type of event: | cisco-internal |
| Location | Indonesia |
| Event Date | 2026-03-02 |
| Event Location Timezone | UTC |
| Event Start Time | 10:00 AM |
| Event End Time | 2:00 PM |
| Capacity | Unlimited |
| Registered | 0 |
| Created By | Joe Montes |
| Location | Cisco Office Sydney |
Cisco Secure Access: Zero Trust Access Workshop

Course Title:
Designing and Deploying Zero Trust Access with Cisco Secure Access
Course Description:
Step into the role of a network security administrator in this guided, hands-on workshop. You’ll learn how to design, deploy, and validate a modern Zero Trust Access solution using Cisco Secure Access. Acting as the administrator for the fictional organization PseudoCo, you will configure secure connectivity between remote users and private applications hosted in a secure data center.
You’ll have full administrative access to a dedicated virtual data center environment in Cisco’s dCloud, pre-provisioned for Secure Access integration. Each participant also receives a unique Secure Access organization, enabling you to configure and test infrastructure in any Secure Access region, with recommendations to align settings with your specific dCloud Data Center location.
Workshop Highlights
- Real-World Zero Trust Scenarios: Configure secure connectivity for remote users and private applications.
- Hands-On Labs: Access to a fully provisioned virtual data center and unique Secure Access organization.
- End-to-End Deployment: Learn to set up VPNs, IP pools, and tunnels for seamless, secure access.
- Expert Guidance: Step-by-step lab exercises and access to proctors for support.
Key Takeaways
- Practical experience deploying Zero Trust Access solutions using Cisco Secure Access.
- Skills to configure and validate secure connections between distributed users and applications.
- Understanding of best practices for aligning Secure Access configurations with data center regions.
Who Should Attend
- IT and network administrators responsible for securing enterprise access.
- Security engineers and architects interested in Zero Trust methodologies.
- Anyone preparing to deploy Cisco Secure Access solutions in their organization.
Workshop Format
- Hands-On Labs: Interactive, guided exercises in a live dCloud virtual environment.
- Instructor Support: Direct assistance from proctors and subject matter experts.
- Individual Access: Each attendee receives their own Secure Access organization and isolated lab environment.
Prerequisites
- Familiarity with basic networking and security concepts.
- Prior experience with remote access technologies or Cisco solutions is helpful but not required.
- Access to a Cisco dCloud account (provided as part of the course).
Why Attend?
This workshop offers a unique, practical opportunity to master Zero Trust Access with Cisco Secure Access in a risk-free, fully supported lab environment. You’ll leave with the confidence and know-how to implement secure, modern access solutions tailored to your organization’s needs.
| Event Date | 2026-03-03 |
| Event Location Timezone | America/Mexico_City |
| Event Start Time | 9:00 AM |
| Event End Time | 11:00 PM |
| Capacity | 25 |
| Registered | 9 |
| Available Place | 16 |
| Created By | Gerardo Carrion |
| Workshop Length in Hours | 4 |
| Geolocation: | amer |
| Type of event: | partner |
| Location | Virtual |
Be Secure - DUO
El objetivo de este laboratorio práctico es continuar desarrollando la experiencia del Ingeniero de Sistemas (SE) Avanzado para garantizar una comprensión integral de las habilidades y la metodología necesarias para instalar y configurar correctamente Cisco Duo.
Al completar los escenarios de laboratorio de este curso, habrá implementado Duo en un entorno de cliente simulado para la empresa ficticia "Stark Industries".
Estos escenarios le guiarán a través del proceso de configuración de Duo en un entorno dCloud controlado mediante el uso de máquinas virtuales dentro del hardware basado en Cisco dCloud. Esto le permitirá familiarizarse con los casos de uso de implementación de Duo para posicionarlo, venderlo e implementarlo con confianza en un entorno de producción para sus clientes.
| Event Date | 2026-03-12 |
| Event Location Timezone | America/Mexico_City |
| Event Start Time | 10:00 AM |
| Event End Time | 2:00 PM |
| Capacity | 30 |
| Registered | 0 |
| Available Place | 30 |
| Created By | Marco Martínez |
| Geolocation: | amer |
| Type of event: | partner |
| Location | Mexico City |
Guatemala ZTA Clinic
Overview:
The Zero Trust Access Design Workshop is a comprehensive 2-hour interactive session designed to help organizations understand and leverage Cisco’s Zero Trust Access capabilities. This workshop combines a targeted presentation, hands-on collaboration, and strategic planning to help customers modernize their zero trust architecture, enhance security visibility, and optimize operational efficiency.
Agenda:
1. Introduction & Presentation (25 - minutes)
- Overview of Cisco’s Zero Trust Access solution
- Key Advantages: unified policy management, improved visibility, operational simplification, and cost savings
- Real-world examples and customer success stories
- Discussion on integrating a zero trust approach with existing infrastructures
2. Interactive Discussion & White-boarding (35 Minutes)
- Open dialogue between customers and Cisco Solutions Engineers (SEs) on current zero trust management practices
- Identification and mapping of all access types, vendors, and resource locations within the customer’s environment
- White-boarding session to illustrate current state, highlight challenges, and reveal potential gaps in visibility or management
- Discussion of integration opportunities and quick wins for zero trust deployment
3. Demonstration and Discussion (15 minutes)
- Summary of key findings from the discussion and whiteboarding
- Collaborative development of a high-level roadmap for adopting a zero trust access solution
- Recommendations on next steps to streamline operations, reduce costs, and improve security posture
- Q&A and assignment of follow-up actions or resources
Key Takeaways:
- Clear understanding of Cisco’s Zero Trust Access solution and its advantages
- A detailed map of the customer’s current zero trust acess landscape
- Identification of immediate opportunities and long-term strategies for transformation
- A customized roadmap to help achieve a unified, scalable, and efficient security architecture
Who Should Attend:
- CISO and Security Leaders
- Network and Identity Administrators & Teams
- SecOps Leaders and Staff
- Cisco SEs and Technical Architects
Format:
- 2-hour session (in-person or virtual)
- Combination of presentation, discussion, and collaborative white-boarding
- Actionable deliverables and next steps tailored to customer environment
Notes:
- Ensure stakeholders from all relevant teams participate for a holistic view.
- Bring network topology diagrams and inventory lists for deeper engagement.
- The session is interactive and tailored to specific customer needs.
| Event Date | 2026-03-18 |
| Event Location Timezone | America/Costa_Rica |
| Event Start Time | 10:00 AM |
| Event End Time | 1:00 PM |
| Capacity | 10 |
| Registered | 0 |
| Available Place | 10 |
| Created By | Esteban |
| Workshop Length in Hours | 3 |
| Geolocation: | amer |
| Type of event: | sales |
| Location | Guatemala City |