By browsing this site, you agree to the use of cookies, which enhance your experience, analyze how you integrate with our site and customize our content to your personal needs and search. Saiba mais
0
Español
English
Select country:
Antigua & Barbuda
Argentina
Bahamas
Barbados
Belize
Bolivia
Brazil
Chile
Colombia
Costa Rica
Cuba
Dominica
Dominican Republic
Ecuador
El Salvador
Grenada
Guatemala
Guyana
Honduras
Jamaica
Mexico
Nicaragua
Panama
Paraguay
Peru
Puerto Rico
Saint Kitts & Nevis
Saint Lucia
Saint Vincent & Grenadines
Suriname
Trinidad & Tobago
Uruguay
Venezuela
Albania
Austria
Belgium
Bosnia & Herzegovina
Bulgaria
Croatia
Cyprus
Czech Republic
Denmark
Estonia
Finland
France
Germany
Greece
Hungary
Iceland
Ireland
Italy
Latvia
Lithuania
Luxembourg
Malta
Montenegro
Netherlands
North Macedonia
Norway
Poland
Portugal
Romania
Serbia
Slovakia
Slovenia
Spain
Sweden
Switzerland
Turkey
Ukraine
United Kingdom
Canada
United States
Australia
Cambodia
China
Hong Kong
India
Indonesia
Japan
Malaysia
Micronesia
New Zealand
Pakistan
Philippines
Singapore
South Korea
Taiwan
Thailand
Vietnam
Bahrain
Iran
Iraq
Israel
Jordan
Kuwait
Lebanon
Oman
Qatar
Saudi Arabia
Syria
United Arab Emirates
Algeria
Egypt
Kenya
Morocco
Nigeria
Senegal
South Africa
Sudan
Tunisia
Ficaremos felizes em atendê-lo!
Contato
Securing Cloud Deployments with Cisco Technologies (SECCLD) – Outline
Outline detalhado do curso
Introducing the Cloud and Cloud Security
Describe the Evolution of Cloud Computing Explain the Cloud Service Models Explore the Security Responsibilities Within the Infrastructure as a Service (IaaS) Service Model Explore the Security Responsibilities Within the Platform as a Service (PaaS) Service Model Explore the Security Responsibilities Within the SaaS Service Model Describe Cloud Deployment Models Describe Cloud Security Basics Implementing the Cisco Security Solution for SaaS Access Control
Explore Security Challenges for Customers Using SaaS Describe User and Entity Behavior Analytics, Data Loss Prevention (DLP), and Apps Firewall Describe Cloud Access Security Broker (CASB) Describe Cisco CloudLock as the CASB Describe OAuth and OAuth Attacks Deploying Cisco Cloud-Based Security Solutions for Endpoints and Content Security
Describe Cisco Cloud Security Solutions for Endpoints Describe AMP for Endpoints Architecture Describe Cisco Umbrella Describe Cisco Cloud Email Security Design Comprehensive Endpoint Security Introducing Cisco Security Solutions for Cloud Protection and Visibility
Describe Network Function Virtualization (NFV) Describe Cisco Secure Architectures for Enterprises (Cisco SAFE) Describe Cisco NGFWv/Cisco Firepower Management Center Virtual (FMCv)/Cisco AMP for Networks Describe Cisco ASAv Describe Cisco Services Router 1000V (CSR1Kv) Describe Cisco Stealthwatch Cloud Describe Cisco Tetration Cloud Zero-Trust Model Describing the Network as the Sensor and Enforcer
Describe Cisco Stealthwatch Enterprise Describe Cisco ISE Functions and Personas Describe Cisco TrustSec Describe Cisco Stealthwatch and Cisco ISE Integration Describe Cisco Encrypted Traffic Analytics (ETA) Implementing Cisco Security Solutions in AWS
Explain AWS Security Offerings Describe AWS Elastic Compute Cloud (EC2) and Virtual Private Cloud (VPC) Discover Cisco Security Solutions in AWS Explain Cisco Stealthwatch Cloud in AWS Describing Cloud Security Management
Describe Cloud Management and APIs Explain API Protection Illustrate an API Example: Integrate to ISE Using pxGrid Identify SecDevOps Best Practices Illustrate a Cisco Cloud Security Management Tool Example: Cisco Defense Orchestrator Illustrate a Cisco Cloud Security Management Tool Example: Cisco CloudCenter™ Describe Cisco Application Centric Infrastructure (ACI) Describe AWS Reporting Tools Lab outline
Explore the Cisco Cloudlock Dashboard and User Security Explore Cisco Cloudlock Application and Data Security Explore Cisco AMP Endpoints Perform Endpoint Anaylsis Using the AMP Endpoint Console Examine the Umbrella Dashboard Examine Cisco Umbrella Investigate Explore Email Ransomware Protection by Cisco Cloud Email Security DNS Ransomware Protection by Cisco Umbrella Explore File Ransomware Protection by Cisco AMP for Endpoints Explore a Ransomware Execution Example Implement Cisco ASAv in ESXi Configure and Test Basic Cisco ASAv Network Address Translation (NAT)/Access Control List (ACL) Functions Explore Cisco Stealthwatch Cloud Explore Stealthwatch Cloud Alerts Settings, Watchlists, and Sensors Explore the Network as the Sensor and Enforcer Explore Cisco Stealthwatch Enterprise Deploy NGFWv and FMCv in AWS Troubleshoot FTD and FMC in AWS – Scenario 1 Troubleshoot FTD and FMC in AWS – Scenario 2 Troubleshoot FTD and FMC in AWS – Scenario 3 Explore AWS Reporting Capabilities