Cisco Secure Access - Secure Service Edge (SSE) Experience
Active Workshops

Cisco Secure Access is a converged cloud Security Service Edge (SSE) solution that is better for users, easier for IT, and safer for everyone. It enforces modern cybersecurity while providing a seamless and frictionless experience as users connect from anything to anywhere, via a common access approach.

Cisco Secure Access simplifies IT and InfoSec operations through a single, cloud-managed console, unified client, centralized policy creation, and aggregated reporting. Cisco Secure Access extensive security capabilities include:


Clientless Zero Trust Network Access (ZTNA)
Client Zero Trust Network Access (ZTNA)
VPN as a Service (VPNaaS)
Digital Experience Monitoring (DEM)
Firewall as a Service (FWaaS)
Intrusion Prevention System (IPS)
Domain Name System (DNS) Security
Secure Web Gateway (SWG)
Multimode Malware Protection
Cloud Access Security Broker (CASB)
Data Loss Prevention (DLP)
Remote Browser Isolation (RBI)

The emphasis on this lab is walking through a number of scenarios to experience what an end user would in an environment with Cisco Secure Access implemented. Note, there is only read-only access in the Secure Access console.

Cisco Secure Access Advanced Lab
Active Workshops

The future of network security is evolving to a modern, more dynamic IT architecture born in the cloud.  IT Teams have more users, devices, applications, and data to secure than ever before, and existing security models are falling short. With the rapid rise in remote and hybrid workers, organizations need a more efficient and secure way to connect users from wherever they are, to the internet, SaaS apps, and private applications. As a result, security teams are transitioning from a traditional decentralized security approach to a more centralized cloud-based security architecture. 

Join one of our Cisco Secure Access hands-on workshops to gain insight into new zero trust technology innovations that can vastly improve your security efficacy.  You’ll leave with a clear understanding of how Cisco’s zero trust SSE solution can de-risk your environment with more granular controls, deliver a human-centric experience, and simplify IT operations. 


XDR Ignite / Breach Base Tour
Active Workshops
After completing course: XDR Ignite TTT

The goal of this dCloud hands-on lab environment and set of scenarios is to provide a Field Engineer or Advanced Systems Engineer with the skills and methodology required to successfully install and configure XDR. 

By completing the lab scenarios included, you will prepare yourself for any upcoming XDR related customer implementations, Proof-of-Concept/Proof-of-Value (POC/POV) installations, or customer demonstrations. 

The lab scenarios will provide you with the required XDR knowledge by walking you through successful integration of multiple data sources, configuration of the XDR console, as well as additional device configuration that may be required within a customer environment. 

Once you have completed all lab scenarios, you should be familiar with the deployment of XDR prior to performing these tasks in a customer’s production environment.

Umbrella Studio 3.0
Active Workshops
After completing course: Cisco Security Studio Train the Trainer

This lab will focus on Umbrella's SASE capabilities. You will be deploying Umbrella from DNS to SWG. We'll utilize Cisco's dCloud environment to provide you with all the components you need to deploy Umbrella using a SASE architecture.

Cisco Secure Workload 3.9
Active Workshops

Cisco Secure Workload (formerly Tetration) seamlessly delivers zero-trust microsegmentation across any workload, environment, or location from a single console.

In the lab, Cisco Secure Workload is used to protect invoice application- SIWAPP, using Zero Trust micro segmentation. Agents are pre-installed on the workloads making up the application. Secure Workload automatically discover and suggest segmentation policies based on traffic flows. Utilizing an agent, Secure Workload provides visibility into the application workload runtime, enabling the detection of vulnerable packages and vulnerable container images

Rapid Incident Response v7
Active Workshops
After completing course: Rapid Incident Response v7 - Train the Trainer

Stay Ahead of Attackers 

Cyber threats move fast—can you respond even faster? Join our Rapid Incident Response Workshop and master the art of detecting and neutralizing threats in minutes, not weeks. Get hands-on with Cisco XDR, tackle live threat scenarios, sharpen your threat triage skills, and connect with cybersecurity experts. Whether you're in IT, security operations, or threat hunting, this workshop will arm you with the tools and insights to stay ahead of cyber adversaries. Don't just react—hunt threats with confidence!