Site announcements
Skip available courses
Available courses
Cisco Secure Access is a converged cloud Security Service Edge (SSE) solution that is better for users, easier for IT, and safer for everyone. It enforces modern cybersecurity while providing a seamless and frictionless experience as users connect from anything to anywhere, via a common access approach.
Cisco Secure Access simplifies IT and InfoSec operations through a single, cloud-managed console, unified client, centralized policy creation, and aggregated reporting. Cisco Secure Access extensive security capabilities include:
Clientless Zero Trust Network Access (ZTNA)
Client Zero Trust Network Access (ZTNA)
VPN as a Service (VPNaaS)
Digital Experience Monitoring (DEM)
Firewall as a Service (FWaaS)
Intrusion Prevention System (IPS)
Domain Name System (DNS) Security
Secure Web Gateway (SWG)
Multimode Malware Protection
Cloud Access Security Broker (CASB)
Data Loss Prevention (DLP)
Remote Browser Isolation (RBI)
The future of network security is evolving to a modern, more dynamic IT architecture born in the cloud. IT Teams have more users, devices, applications, and data to secure than ever before, and existing security models are falling short. With the rapid rise in remote and hybrid workers, organizations need a more efficient and secure way to connect users from wherever they are, to the internet, SaaS apps, and private applications. As a result, security teams are transitioning from a traditional decentralized security approach to a more centralized cloud-based security architecture.
Join one of our Cisco Secure Access hands-on workshops to gain insight into new zero trust technology innovations that can vastly improve your security efficacy. You’ll leave with a clear understanding of how Cisco’s zero trust SSE solution can de-risk your environment with more granular controls, deliver a human-centric experience, and simplify IT operations.
The goal of this dCloud hands-on lab environment and set of scenarios is to provide a Field Engineer or Advanced Systems Engineer with the skills and methodology required to successfully install and configure XDR.
By completing the lab scenarios included, you will prepare yourself for any upcoming XDR related customer implementations, Proof-of-Concept/Proof-of-Value (POC/POV) installations, or customer demonstrations.
The lab scenarios will provide you with the required XDR knowledge by walking you through successful integration of multiple data sources, configuration of the XDR console, as well as additional device configuration that may be required within a customer environment.
Once you have completed all lab scenarios, you should be familiar with the deployment of XDR prior to performing these tasks in a customer’s production environment.
Seconds matter.
Stay Ahead of Attackers with Cisco XDR!
Cyber threats move fast—can you respond even faster? Join our Rapid Incident Response Workshop and master the art of detecting and neutralizing threats in minutes, not weeks. Get hands-on with Cisco XDR, tackle live threat scenarios, sharpen your threat triage skills, and connect with cybersecurity experts. Whether you're in IT, security operations, or threat hunting, this workshop will arm you with the tools and insights to stay ahead of cyber adversaries. Don't just react—hunt threats with confidence! 🚀
Hands-on attack and defend experience that teaches WHY you need security solutions.
Technology includes most of the Cisco security portfolio along with integrations with key partners such as Splunk, Rapid7, Radware, and IBM.
All modules use real data and real techniques!
In this course you will learn how to go from zero to SASE! Best of all, you're going to get some hands on practice with:
- Cisco Umbrella
- Cisco Secure Endpoint
- Cisco AnyConnect Secure Mobility Client
- Cisco SD-WAN powered by Viptela
- Cisco SD-WAN powered by Meraki
- Cisco ThousandEyes
In this course you will learn how to go from zero to SASE! Best of all, you're going to get some hands on practice with:
This lab will focus on Umbrella's SASE capabilities. You will be deploying Umbrella from DNS to SWG. We'll utilize Cisco's dCloud environment to provide you with all the components you need to deploy Umbrella using a SASE architecture.
Cisco Secure Workload (formerly Tetration) seamlessly delivers zero-trust microsegmentation across any workload, environment, or location from a single console.
In the lab, Cisco Secure Workload is used to
protect invoice application- SIWAPP, using Zero Trust micro segmentation.
Agents are pre-installed on the workloads making up the application. Secure
Workload automatically discover and suggest segmentation policies based on
traffic flows. Utilizing an agent, Secure Workload provides visibility into the
application workload runtime, enabling the detection of vulnerable packages and
vulnerable container images
Stay Ahead of Attackers
Cyber threats move fast—can you respond even faster? Join our Rapid Incident Response Workshop and master the art of detecting and neutralizing threats in minutes, not weeks. Get hands-on with Cisco XDR, tackle live threat scenarios, sharpen your threat triage skills, and connect with cybersecurity experts. Whether you're in IT, security operations, or threat hunting, this workshop will arm you with the tools and insights to stay ahead of cyber adversaries. Don't just react—hunt threats with confidence!
Take this first. If you ask a question that is in the FAQ, Kate will beat you.
Take this course to learn how to run your own Umbrella Studio Course. This course consists of watching a recorded Webex as associated content enabling you with the necessary logistics information necessary to run your own Umbrella Studio! Upon completion, you will have "Proctor" access to run your own session! Good luck!
Take this first. If you ask a question that is in the FAQ, Kate will beat you.
Welcome Cisco partners to ISE 301 FE training. Please be aware there are prerequisites
to this course. You must have completed the ISE Fire Jumper Stage 2 Quiz. You can find this quiz on SalesConnect as part of the Visibility & Segmentation Stage 2 learning map.
ISE 301 is recommended for beginner to intermediate post-sales or deployment engineers. This course will take a Field Engineer through deploying their first ISE deployment in a controlled dCloud lab environment. Topics covered include ISE Planning &
Design, Implementation, and Basic Operations.
Lecture & Labs covered include Enrolling Users, Authentication & MFA, Single Sign On (SSO), Establishing Device Trust and Protecting Every Application.
While Stages 1 and 2 cover introductory concepts and individual product
trainings, this Stage 3 workshop teaches how to convert that learning
into conversations about customers' existing environments, processes,
and security gaps. The goal is to enable you to logically map the Cisco
Security portfolio offers into a customized workflow. The workshop is
two (2) consecutive days and lasts approximately six (6) hours per day,
including breaks. The Stage 3 validation assessment is done during the
workshop, so please bring your laptop and charger on both days. To
register for a Geo-specific workshop, visit
https://salesconnect.cisco.com/#/program/PAGE-14916.
Welcome Cisco partners to ISE 302 FE training. Please be aware there are prerequisites to this course. You must have completed a prior ISE 301 FE course. If you have not completed ISE 301 FE, but have completed 5 or more distributed deployment ISE installations, that will also suffice for the ISE 302 prerequisite.
ISE 302 is recommended for intermediate to advanced post-sales or deployment engineers. This course will take a Field Engineer through advanced ISE Design, Configuration, Integrations, and Troubleshooting in a controlled dCloud lab environment. Topics covered include Advanced ISE Planning & Design, Implementation, and Operations.
This course will take the Advanced SE/FE through their first Umbrella deployment in a controlled dCloud lab environment.
This course is designed to help course creators build their courses by understanding the tools available to them. It will also show them how to create a Train the Trainer course. This additional course is essential as it allows for Cisco and Partner SEs to put on their own workshops that allows Cisco to scale far beyond one team of individuals.
Cisco Secure Cloud Analytics and Secure Network Analytics SaaS (Stealthwatch Cloud) Test Drive lab. This lab uses the "Instant Demo" of Stealthwatch Cloud that is hosted in dCloud.
Cisco Secure Cloud Analytics is a NDR (Network Detection and Response) service, it has capabilities for Premises Networks and Public Cloud Networks. The test drive is split into two parts. Part 1 highlights visibility and detections using network telemetry that is applicable to both premises and public cloud networks. Part 2 is focused on cloud specific detections and capabilities.
Cisco Secure Network Analytics Customer Test Drive 7.4.1 dCloud (Demo Cloud) Test Drive Labs.
This lab will show in real-time traffic how Cisco Secure Network
Analytics (formerly named Stealthwatch) is the leader in the Network Detection
and Response (NDR) Gartner quadrant and can transform the network into a sensor
to detect insider threats and identify anomalous behavior such as malware,
distributed botnets, data exfiltration, and more.. You get hands-on access to a
fully configured environment with traffic that you generate to test first-hand live use cases.
Cisco Secure Connect is our unified SASE offer built for speed and simplicity. It delivers a delightful experience with minimal effort by securely connecting users, things, and applications seamlessly from anywhere. It combines networking, security, and unified visibility with client and branch connectivity in a single, turnkey SASE solution that is quick to deploy and easy to manage - reducing costs and complexity, enabling digital business, and increasing staff effectiveness. Companies enjoy a simple, secure, and agile hybrid work experience that improves worker efficiency and productivity, while keeping security threats off the corporate network.
Learn how Cisco Secure Access consolidates your security tooling and creates a better user experience, simplifies IT operations, and reduces risk in an ever-changing security landscape.
In each hands-on workshop we’ll show you how to:
Connect all users on any device from anywhere with zero trust granular controls with:
• Secure Private Access
• Zero trust browser-based Connectivity
• Zero trust Client-based Connectivity
• VPNaaS
Secure your users with or without a client and achieve unique end-to-end visibility for your network, cloud, and applications, through:
• Secure Web Gateway (SWG)
• Cloud Access Security Broker (CASB)
• Firewall as-a-Service (FwaaS)
• DEM visibility end-to-end
• DNS Security
Welcome to the Splunk Incident Response. Many of you are already familiar with the "Rapid Incident Response with Cisco XDR". Now, we’ve designed a workshop using Splunk ES, SOAR with a similar scenarios to RIR. We hope this workshop will help you to go through how Splunk integrates with Cisco Security and what outcomes are, at the same time it will help you to explore the distinctions between Splunk ES, SOAR and Cisco XDR in incident detection, investigation, and response.
You've finally decided to upgrade to Cisco Secure Endpoint (CSE) to protect your environment.
- How do you know what settings to use?
- How do you deploy it?
- How do you resolve incidents?
Let Mike teach you all the best practices of Secure Endpoint in this three-hour course.