top of page
top

CI-SDSI

Designing Cisco Security Infrastructure

Cisco Learning Partner Logo_2021_edited.png

Price
Duration

Please Call

5 Days

CLC's:

CE

44

40 Credits

digital-security.jpg

Who Should Attend

Cisco and Partner’s Systems Engineers
Customer Network & Infrastructure Engineers

Customer Security
NOC Engineers

Prerequisites

Prerequisits

There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:

Cisco CCNP Security or equivalent knowledge

Familiarity with Microsoft Windows Operating Systems
Familiarity with the Cisco Security portfolio

What you will learn

What you will Learn

The Designing Cisco Security Infrastructure (SDSI) training teaches you about security architecture design, including secure infrastructure, applications, risk, events, requirements, artificial intelligence (AI), automation, and DevSecOps.

This training prepares you for the 300-745 SDSI v1.0 exam. If passed, you earn the Cisco Certified Specialist – Designing Cisco Security Infrastructure certification and satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Security certification. This training also earns you 41 Continuing Education (CE) credits toward recertification.

Objectives

Course Objectives

Identify and explain the fundamental concepts of security architecture and how they support the design, building, and maintenance of a secure infrastructure
Identify the layers of security infrastructure, core security technologies, and infrastructure concepts
Explain how security designs principles contribute to secure infrastructure
Identify and discuss security design and management frameworks that can be used for infrastructure security design
Explain the importance of and methods for enforcement of regulatory compliance in security design
Identify tools that enable detection and response to infrastructure security incidents
Explain various strategies that can be implemented to modify traditional security architectures to meet the technical requirements of modern enterprise networks
Implement secure network access methods, such as 802.1X, MAC Authentication Bypass (MAB), and web-based authentication
Describe security technologies that can be applied to enterprise Wide Area Network (WAN) connections
Compare methods to secure network management and control plane traffic
Compare the differences between traditional firewalls and next-gen firewalls (NGFWs) and identify the advanced features that NGFWs provide
Explain how web application firewalls (WAFs) secure web applications from threats

Describe the key features and best practices for deploying intrusion detection system (IDS) and intrusion prevention system (IPS) as part of the enterprise infrastructure security design
Explain how endpoints and services in cloud-native or microservice environments can be protected with host-based or distributed firewalls
Discuss security technologies that address application data and data that is in transit
Identify several security solutions for cloud-native applications, microservices, and containers
Explain how technology advancements allow for improvements in today’s infrastructure security
Identify tools that enable detection and response to infrastructure security incidents
Describe frameworks and controls to access and mitigate security risks for infrastructure
Explain how to make security adjustments following a security incident
Identify DevSecOps integrations that improve security management and response
Discuss how to ensure that automated services are secure
Discuss how AI can aid in threat detection and response

Outlines

Course Outline

PDF.jpg

Definition and Purpose of Security Architecture
Components of Security Infrastructure
Security Design Principles
Security and Design Frameworks
Compliance and Regulatory Requirements
Security Approaches to Protect Against Threats
Modify the Security Architecture to Meet Technical Requirements
Network Access Security
VPN and Tunneling Solutions
Secure Infrastructure Management and Control Planes
Nextgen Firewalls
Web Application Firewall (WAF)

IPS/IDS Deployment
Host-Based Firewalls and Distributed Firewalls
Security Solutions Based on Application and Flow Data
Security for Cloud-Native Applications, Microservices, and Containers
Emerging Technologies in Application Security
SOC Tools for Incident Handling and Response
Modify Design to Mitigate Risk
Incident-Driven Security Adjustments
DevSecOps Integration
Secure Automated Workflows and Pipelines
AI’s Role in Securing Infrastructure

Further information
If you would like to know more about this course please contact us

Schedule
Cisco Learning Partner Logo_2021_edited.png
Cisco Learning Partner Logo_2021_edited.png
Cisco Learning Partner Logo_2021_edited.png
reg1
reg

Thanks for registering. our team will contact you soon !

Registration

ILT/VILT

Thanks for registering. our team will contact you soon !

Registration

ILT/VILT

Thanks for registering. our team will contact you soon !

Registration

ILT/VILT

Thanks for registering. our team will contact you soon !

Registration

ILT/VILT
bottom of page