Cisco Next Level


Securing Cloud Deployments with Cisco Technologies

South Africa:
USD 2,950.00

Duration: 4 Days


To fully benefit from this course, you should have completed the following course or obtained the equivalent knowledge and skills:

  • Knowledge of cloud computing and virtualization software basics
  • Ability to perform basic UNIX-like OS commands
  • Cisco CCNP® security knowledge or understanding of the following topic areas:


Topic areas

Available in these courses

  • Cisco Adaptive Security Appliance (ASA) and Adaptive Security Virtual Appliance (ASAv) deployment, and Cisco IOS® Flexible NetFlow operations


Implementing Cisco Edge Network Security Solutions (SENSS)

  • Cisco NGFW (Cisco Firepower Threat Defense [FTD]), Cisco Firepower, and Cisco Firepower Management Center (FMC) deployment
  • Cisco Content Security operations including Cisco Web Security Appliance (WSA)/ Cisco Email Security Appliance (ESA)/Cisco Cloud Web Security (CWS)
  • Cisco AMP for network and endpoints deployment



Implementing Cisco Threat Control Solutions (SITCS)

  • Cisco ISE operations and Cisco TrustSec architecture

Implementing Cisco Secure Access Solutions (SISAS)

  • VPN operation


Implementing Cisco Secure Mobility Solutions (SIMOS)


Who should enroll

This course is open to engineers, administrators, and security-minded users of public, private, and hybrid cloud infrastructures responsible for implementing security in cloud environments:

  • Security architects
  • Cloud architects
  • Security engineers
  • Cloud engineers
  • System engineers
  • Cisco integrators and partners
International dates
Middle East

What you’ll learn in this course

The Securing Cloud Deployments with Cisco Technologies (SECCLD) v1.0 course shows you how to implement Cisco® cloud security solutions to secure access to the cloud, workloads in the cloud, and Software as a Service (SaaS) user accounts, applications, and data. Through expert instruction and hands-on labs, you’ll learn a comprehensive set of skills and technologies including: how to use key Cisco cloud security solutions; detect suspicious traffic flows, policy violations, and compromised devices; implement security controls for cloud environments; and implement cloud security management. This course covers usage of Cisco Cloudlock, Cisco Umbrella™, Cisco Cloud Email Security, Cisco Advanced Malware Protection (AMP) for Endpoints, Cisco Stealthwatch® Cloud and Enterprise, Cisco Firepower® NGFW (next-generation firewall), and more.


After taking this course, you should be able to:

  • Contrast the various cloud service and deployment models

  • Implement the Cisco Security Solution for SaaS using Cisco Cloudlock Micro Services

  • Deploy cloud security solutions using Cisco AMP for Endpoints, Cisco Umbrella, and Cisco Cloud Email Security

  • Define Cisco cloud security solutions for protection and visibility using Cisco virtual appliances and Cisco Stealthwatch Cloud

  • Describe the network as a sensor and enforcer using Cisco Identity Services Engine (ISE), Cisco Stealthwatch Enterprise, and Cisco TrustSec®

  • Implement Cisco Firepower NGFW Virtual (NGFWv) and Cisco Stealthwatch Cloud to provide protection and visibility in AWS environments

  • Explain how to protect the cloud management infrastructure by using specific examples, defined best practices, and AWS reporting capabilities


  • Introducing the Cloud and Cloud Security

    • Describe the Evolution of Cloud Computing

    • Explain the Cloud Service Models

    • Explore the Security Responsibilities Within the Infrastructure as a Service (IaaS) Service Model

    • Explore the Security Responsibilities Within the Platform as a Service (PaaS) Service Model

    • Explore the Security Responsibilities Within the SaaS Service Model

    • Describe Cloud Deployment Models

    • Describe Cloud Security Basics

  • Implementing the Cisco Security Solution for SaaS Access Control

    • Explore Security Challenges for Customers Using SaaS

    • Describe User and Entity Behavior Analytics, Data Loss Prevention (DLP), and Apps Firewall

    • Describe Cloud Access Security Broker (CASB)

    • Describe Cisco CloudLock as the CASB

    • Describe OAuth and OAuth Attacks

  • Deploying Cisco Cloud-Based Security Solutions for Endpoints and Content Security

    • Describe Cisco Cloud Security Solutions for Endpoints

    • Describe AMP for Endpoints Architecture

    • Describe Cisco Umbrella

    • Describe Cisco Cloud Email Security

    • Design Comprehensive Endpoint Security

  • Introducing Cisco Security Solutions for Cloud Protection and Visibility

    • Describe Network Function Virtualization (NFV)

    • Describe Cisco Secure Architectures for Enterprises (Cisco SAFE)

    • Describe Cisco NGFWv/Cisco Firepower Management Center Virtual (FMCv)/Cisco AMP for Networks

    • Describe Cisco ASAv

    • Describe Cisco Services Router 1000V (CSR1Kv)

    • Describe Cisco Stealthwatch Cloud

    • Describe Cisco Tetration Cloud Zero-Trust Model

  • Describing the Network as the Sensor and Enforcer

    • Describe Cisco Stealthwatch Enterprise

    • Describe Cisco ISE Functions and Personas

    • Describe Cisco TrustSec

    • Describe Cisco Stealthwatch and Cisco ISE Integration

    • Describe Cisco Encrypted Traffic Analytics (ETA)

  • Implementing Cisco Security Solutions in AWS

    • Explain AWS Security Offerings

    • Describe AWS Elastic Compute Cloud (EC2) and Virtual Private Cloud (VPC)

    • Discover Cisco Security Solutions in AWS

    • Explain Cisco Stealthwatch Cloud in AWS

  • Describing Cloud Security Management

    • Describe Cloud Management and APIs

    • Explain API Protection

    • Illustrate an API Example: Integrate to ISE Using pxGrid

    • Identify SecDevOps Best Practices

    • Illustrate a Cisco Cloud Security Management Tool Example: Cisco Defense Orchestrator

    • Illustrate a Cisco Cloud Security Management Tool Example: Cisco CloudCenter™

    • Describe Cisco Application Centric Infrastructure (ACI)

    • Describe AWS Reporting Tools

Lab outline

  • Explore the Cisco Cloudlock Dashboard and User Security

  • Explore Cisco Cloudlock Application and Data Security

  • Explore Cisco AMP Endpoints

  • Perform Endpoint Anaylsis Using the AMP Endpoint Console

  • Examine the Umbrella Dashboard

  • Examine Cisco Umbrella Investigate

  • Explore Email Ransomware Protection by Cisco Cloud Email Security

  • DNS Ransomware Protection by Cisco Umbrella

  • Explore File Ransomware Protection by Cisco AMP for Endpoints

  • Explore a Ransomware Execution Example

  • Implement Cisco ASAv in ESXi

  • Configure and Test Basic Cisco ASAv Network Address Translation (NAT)/Access Control List (ACL) Functions

  • Explore Cisco Stealthwatch Cloud

  • Explore Stealthwatch Cloud Alerts Settings, Watchlists, and Sensors

  • Explore the Network as the Sensor and Enforcer

  • Explore Cisco Stealthwatch Enterprise

  • Deploy NGFWv and FMCv in AWS

  • Troubleshoot FTD and FMC in AWS – Scenario 1

  • Troubleshoot FTD and FMC in AWS – Scenario 2

  • Troubleshoot FTD and FMC in AWS – Scenario 3

  • Explore AWS Reporting Capabilities

Further information

If you would like to know more about this course please contact us