GPSA -Cisco Secure Access - Secure Service Edge (SSE) Admin
Cisco Secure Access

In this guided, hands-on course, you'll explore how to design, deploy, and validate a modern Zero Trust Access solution using Cisco Secure Access. Throughout the lab, you’ll take on the role of an administrator for a fictional organization, PseudoCo, as you configure secure connectivity between remote users and private applications hosted in a secure data center.

What You’ll Learn:

  • How to onboard private data center routers and create Network Tunnel Groups (NTGs)

  • How to integrate Active Directory and Duo Security with Secure Access for identity-based access control

  • How to implement SAML-based authentication for Zero Trust proxy workflows

  • How to validate route propagation, tunnel health, and user access through CLI and dashboard tools

  • How to integrate ThousandEyes for performance visibility

Lab Format:


  • Step-by-step guided tasks using virtual lab infrastructure

  • CLI verification, dashboard workflows, and real-world attack simulation scenarios

  • Knowledge check questions and reflection activities to reinforce learning

Cisco Secure Access - Secure Service Edge (SSE) Admin
Cisco Secure Access

In this guided, hands-on course, you'll explore how to design, deploy, and validate a modern Zero Trust Access solution using Cisco Secure Access. Throughout the lab, you’ll take on the role of an administrator for a fictional organization, PseudoCo, as you configure secure connectivity between remote users and private applications hosted in a secure data center.

What You’ll Learn:

  • How to onboard private data center routers and create Network Tunnel Groups (NTGs)

  • How to integrate Active Directory and Duo Security with Secure Access for identity-based access control

  • How to implement SAML-based authentication for Zero Trust proxy workflows

  • How to validate route propagation, tunnel health, and user access through CLI and dashboard tools

  • How to integrate ThousandEyes for performance visibility

Lab Format:


  • Step-by-step guided tasks using virtual lab infrastructure

  • CLI verification, dashboard workflows, and real-world attack simulation scenarios

  • Knowledge check questions and reflection activities to reinforce learning