Designing and Implementing Secure Cloud Access for Users and Endpoints [SCAZT]

Tijdsduur
Locatie
Op locatie, Online
Startdatum en plaats

Designing and Implementing Secure Cloud Access for Users and Endpoints [SCAZT]

Global Knowledge Network Netherlands B.V.
Logo van Global Knowledge Network Netherlands B.V.
Opleiderscore: starstarstarstar_halfstar_border 7,5 Global Knowledge Network Netherlands B.V. heeft een gemiddelde beoordeling van 7,5 (uit 185 ervaringen)

Tip: meer info over het programma, prijs, en inschrijven? Download de brochure!

Startdata en plaatsen
placeEindhoven (Evoluon Noord Brabantlaan 1)
13 apr. 2026 tot 17 apr. 2026
Toon rooster
event 13 april 2026, 09:00-17:00, Eindhoven (Evoluon Noord Brabantlaan 1), NL249099.1
event 14 april 2026, 09:00-17:00, Eindhoven (Evoluon Noord Brabantlaan 1), NL249099.2
event 15 april 2026, 09:00-17:00, Eindhoven (Evoluon Noord Brabantlaan 1), NL249099.3
event 16 april 2026, 09:00-17:00, Eindhoven (Evoluon Noord Brabantlaan 1), NL249099.4
event 17 april 2026, 09:00-17:00, Eindhoven (Evoluon Noord Brabantlaan 1), NL249099.5
computer Online: VIRTUAL TRAINING CENTRE
13 apr. 2026 tot 17 apr. 2026
Toon rooster
event 13 april 2026, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL249099V.1
event 14 april 2026, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL249099V.2
event 15 april 2026, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL249099V.3
event 16 april 2026, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL249099V.4
event 17 april 2026, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL249099V.5
computer Online: VIRTUAL TRAINING CENTER
11 mei. 2026 tot 15 mei. 2026
Toon rooster
event 11 mei 2026, 10:00-18:00, VIRTUAL TRAINING CENTER, NL249096.1
event 12 mei 2026, 10:00-18:00, VIRTUAL TRAINING CENTER, NL249096.2
event 13 mei 2026, 10:00-18:00, VIRTUAL TRAINING CENTER, NL249096.3
event 14 mei 2026, 10:00-18:00, VIRTUAL TRAINING CENTER, NL249096.4
event 15 mei 2026, 10:00-18:00, VIRTUAL TRAINING CENTER, NL249096.5
computer Online: VIRTUAL TRAINING CENTER
22 jun. 2026 tot 26 jun. 2026
Toon rooster
event 22 juni 2026, 09:00-17:00, VIRTUAL TRAINING CENTER, NL249103.1
event 23 juni 2026, 09:00-17:00, VIRTUAL TRAINING CENTER, NL249103.2
event 24 juni 2026, 09:00-17:00, VIRTUAL TRAINING CENTER, NL249103.3
event 25 juni 2026, 09:00-17:00, VIRTUAL TRAINING CENTER, NL249103.4
event 26 juni 2026, 09:00-17:00, VIRTUAL TRAINING CENTER, NL249103.5
placeGroningen/Paterswolde (Groningerweg 19)
27 jul. 2026 tot 31 jul. 2026
Toon rooster
event 27 juli 2026, 09:00-17:00, Groningen/Paterswolde (Groningerweg 19), NL249100.1
event 28 juli 2026, 09:00-17:00, Groningen/Paterswolde (Groningerweg 19), NL249100.2
event 29 juli 2026, 09:00-17:00, Groningen/Paterswolde (Groningerweg 19), NL249100.3
event 30 juli 2026, 09:00-17:00, Groningen/Paterswolde (Groningerweg 19), NL249100.4
event 31 juli 2026, 09:00-17:00, Groningen/Paterswolde (Groningerweg 19), NL249100.5
computer Online: VIRTUAL TRAINING CENTRE
27 jul. 2026 tot 31 jul. 2026
Toon rooster
event 27 juli 2026, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL249100V.1
event 28 juli 2026, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL249100V.2
event 29 juli 2026, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL249100V.3
event 30 juli 2026, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL249100V.4
event 31 juli 2026, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL249100V.5
computer Online: VIRTUAL TRAINING CENTER
14 sep. 2026 tot 18 sep. 2026
Toon rooster
event 14 september 2026, 10:00-18:00, VIRTUAL TRAINING CENTER, NL249097.1
event 15 september 2026, 10:00-18:00, VIRTUAL TRAINING CENTER, NL249097.2
event 16 september 2026, 10:00-18:00, VIRTUAL TRAINING CENTER, NL249097.3
event 17 september 2026, 10:00-18:00, VIRTUAL TRAINING CENTER, NL249097.4
event 18 september 2026, 10:00-18:00, VIRTUAL TRAINING CENTER, NL249097.5
computer Online: VIRTUAL TRAINING CENTER
19 okt. 2026 tot 23 okt. 2026
Toon rooster
event 19 oktober 2026, 09:00-17:00, VIRTUAL TRAINING CENTER, NL249104.1
event 20 oktober 2026, 09:00-17:00, VIRTUAL TRAINING CENTER, NL249104.2
event 21 oktober 2026, 09:00-17:00, VIRTUAL TRAINING CENTER, NL249104.3
event 22 oktober 2026, 09:00-17:00, VIRTUAL TRAINING CENTER, NL249104.4
event 23 oktober 2026, 09:00-17:00, VIRTUAL TRAINING CENTER, NL249104.5
computer Online: VIRTUAL TRAINING CENTRE
7 dec. 2026 tot 11 dec. 2026
Toon rooster
event 7 december 2026, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL249105V.1
event 8 december 2026, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL249105V.2
event 9 december 2026, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL249105V.3
event 10 december 2026, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL249105V.4
event 11 december 2026, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL249105V.5
placeZoetermeer (Kinderen v Versteegplein 18)
7 dec. 2026 tot 11 dec. 2026
Toon rooster
event 7 december 2026, 09:00-17:00, Zoetermeer (Kinderen v Versteegplein 18), NL249105.1
event 8 december 2026, 09:00-17:00, Zoetermeer (Kinderen v Versteegplein 18), NL249105.2
event 9 december 2026, 09:00-17:00, Zoetermeer (Kinderen v Versteegplein 18), NL249105.3
event 10 december 2026, 09:00-17:00, Zoetermeer (Kinderen v Versteegplein 18), NL249105.4
event 11 december 2026, 09:00-17:00, Zoetermeer (Kinderen v Versteegplein 18), NL249105.5
Beschrijving

Ontdek de verschillende trainingsmogelijkheden bij Global Knowledge

Online of op locatie er is altijd een vorm die bij je past.

Kies op welke manier jij of je team graag een training wilt volgen. Global Knowledge bied je verschillende trainingsmogelijkheden. Je kunt kiezen uit o.a. klassikaal, Virtueel Klassikaal (online), e-Learning en maatwerk. Met onze Blended oplossing kun je de verschillende trainingsvormen combineren.

OVERVIEW

The Designing and Implementing Secure Cloud Access for Users and Endpoints course will provide you with the skills to design and implement cloud security architectures, user and device security, network and cloud security, application and data security, visibility and assurance, and threat response.

Some of the Cisco solutions covered in this course include Cisco SecureX, Cisco XDR, Cisco Duo, Cisco ISE, Cisco Catalyst SD-WAN, Cisco Umbrella, Cisco Secure Firewall, Cisco Secure Workload, Cisco Secure Analytics, and more.

This course prepares you for the 300-740 SCAZT exam. If passed, you will satisfy the concentration exam requirement for the Cisco Certified Network Professional (CC…

Lees de volledige beschrijving

Veelgestelde vragen

Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.

Nog niet gevonden wat je zocht? Bekijk deze onderwerpen: Microsoft Access, Cloud Computing, Microsoft Word, Computervaardigheden en Microsoft Powerpoint.

Ontdek de verschillende trainingsmogelijkheden bij Global Knowledge

Online of op locatie er is altijd een vorm die bij je past.

Kies op welke manier jij of je team graag een training wilt volgen. Global Knowledge bied je verschillende trainingsmogelijkheden. Je kunt kiezen uit o.a. klassikaal, Virtueel Klassikaal (online), e-Learning en maatwerk. Met onze Blended oplossing kun je de verschillende trainingsvormen combineren.

OVERVIEW

The Designing and Implementing Secure Cloud Access for Users and Endpoints course will provide you with the skills to design and implement cloud security architectures, user and device security, network and cloud security, application and data security, visibility and assurance, and threat response.

Some of the Cisco solutions covered in this course include Cisco SecureX, Cisco XDR, Cisco Duo, Cisco ISE, Cisco Catalyst SD-WAN, Cisco Umbrella, Cisco Secure Firewall, Cisco Secure Workload, Cisco Secure Analytics, and more.

This course prepares you for the 300-740 SCAZT exam. If passed, you will satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Security certification as well the Secure Cloud Access Specialist Certification.

This course is worth 40 Continuing Education (CE) Credits

OBJECTIVES

After completing this course you should be able to:

  • Compare and contrast the National Institute of Standards and Technology (NIST), Cybersecurity and Infrastructure Security Agency (CISA), and Defense Information Systems Agency (DISA) security frameworks, and understand the importance of adopting standardized frameworks for cybersecurity in enhancing an organization's security posture 
  • Describe the Cisco Security Reference Architecture and its five main components 
  • Describe commonly deployed use cases and recommend the necessary capabilities within an integrated security architecture to address them effectively 
  • Describe the Cisco Secure Architecture for Everyone (SAFE) architecture 
  • Review the benefits, components, and process of certificate-based authentication for both users and devices 
  • Enable Duo multi-factor authentication (MFA) to protect an application from the Duo Administration Portal, and then configure the application to use Duo MFA for user login authentication 
  • Install Cisco Duo and implement its multifactor authentication on remote access virtual private network (VPN) 
  • Configure endpoint compliance 
  • Review and demonstrate the ability to understand Stateful Switchover (SSO) using security assertion markup language (SAML) or OpenID Connect together with Cisco Duo 
  • Describe Cisco software-defined wide-area network (SD-WAN) on-box and integrated threat prevention security services 
  • Describe SD-WAN on-box and integrated content filtering security services 
  • Describe the features and capabilities of Cisco Umbrella Secure Internet Gateway (SIG), such as DNS Security, Cloud-Delivered Firewall (CDFW), intrusion prevention systems (IPS), and interaction with Cisco SD-WAN 
  • Introduce the reverse proxy for internet-facing applications protections 
  • Explore the Cisco Umbrella SIG use case to secure cloud application access, the limitations and benefits of the solution, and the features available to discover and control access to cloud delivered applications 
  • Explore the Cisco ThousandEyes capabilities for monitoring the Cisco SD-WAN deployment 
  • Describe the challenges of accessing SaaS applications in modern business environments and explore the Cisco SD-WAN Cloud OnRamp for SaaS solution with direct or centralized internet access 
  • Introduce the Cisco Secure Firewall platforms, use cases, and security capabilities 
  • Demonstrate a comprehesive understanding of web application firewalls 
  • Demonstrate a comprehensive understanding of Cisco Secure Workload capabilities, deployment options, agents, and connectors 
  • Demonstrate a comprehensive understanding of Cisco Secure Workload application dependency mapping and policy discovery 
  • Demonstrate a comprehensive understanding of common cloud attack tactics and mitigation strategies 
  • Demonstrate a comprehensive understanding of multicloud security requirements and policy capabilities 
  • Introduce the security issues with the adoption of public clouds and common capabilities of cloud visibility and assurance tools to mitigate these issues 
  • Introduce Cisco Secure Network Analytics and Cisco Security Analytics and Logging 
  • Describe Cisco Attack Surface Management 
  • Describe how Application Program Interfaces (APIs) and automation can help in troubleshooting cloud policy, especially in the context of misconfigurations 
  • Demonstrate a comprehensive knowledge of the appropriate responses to cloud threats in specific scenarios 
  • Demonstrate the comprehensive knowledge required to use automation for cloud threat detection and response 

AUDIENCE

Anyone involved in the Design and Implementation of a Cisco Secure Cloud Access Solution.

CERTIFICATION

Recommended as preparation for the following exam:

  • 300-740 - SCAZT - Designing and Implementing Secure Cloud Access for Users and Endpoints

This exam is one of the Cisco CCNP Security concentration exams as well as one of the Cisco Multicloud Specialist Certifications. Passing this exam will give you the Secure Cloud Access Specialist Certification.

CONTENT

Certificate-Based User and Device Authentication

  • PKI Overview
  • PKI Operations
  • User versus Machine or Device-Based Certificates
  • 802.1X and EAP Methods
  • Cisco ISE Certificate Services
  • Cisco ISE BYOD Client Certificate Configuration 

Cisco Duo Multifactor Authentication for Application Protection

  • Zero Trust Security Using MFA
  • About Duo MFA and Splunk 

Cisco Duo with AnyConnect VPN for Remote Access

  • Use Cisco Duo Authentication
  • About Cisco Duo MFA and Remote Access VPN

Introducing Cisco ISE Endpoint Compliance Services

  • Endpoint Compliance Services Overview 

SSO using SAML or OpenID Connect

  • SSO using Security Assertion Markup Language
  • Using SAML or OpenID Connect
  • Single Sign-On with Cisco Duo

Reverse Proxy

  • Reverse Proxy
  • Reverse Proxy Implementation to Protect Applications

Cisco SD-WAN Security Content Filtering

  • Cisco SD-WAN Content Filtering
  • Secure Direct Internet Access
  • Impelmenting Unified Security Polices 

Cisco SD-WAN to Cisco Umbrella SIG Integration

  • SIG Overview
  • Integrating SIG and Cisco SD-WAN
  • Cisco Umbrella DNS Deep Dive
  • Cisco Umbrella CDFW and IPS
  • Cisco Umbrella Secure Web Gateway

Cisco Umbrella Cloud Access Security Broker

  • Cloud Application Security Overview
  • Implementing Cisco Umbrella CASB

Security Policies for Remote Access VPN 

  • Cisco Secure Firewall Remote Access VPN Security
  • Cisco IOS XE SD-WAN Remote Access VPN Security

Cisco Secure Access

  • Cisco Secure Access: SSE Reimagined
  • Cisco Secure Client New Capabilities
  • QUIC and MASQUE Protocol Benefits
  • Cisco Secure Access Use Cases

Cisco Secure Firewall 

  • Cisco Secure Firewall Platforms
  • Cisco Secure Firewall Use Cases
  • Cisco Secure Firewall Policies Configuration

Web Application Firewall 

  • Introduction to WAFs
  • Cisco Secure WAF Best Practices

Cisco Secure Workload Deployments, Agents, and Connectors

  • Cisco Secure Workload Capabilities and Deployments
  • Cisco Secure Workload Deployments, Agents and Connectors

Cisco Secure Workload Structure and Policy

  • Cisco Secure Workload Inventory and Scopes
  • Cisco Secure Workload Workspaces
  • Cisco Secure Workload Policy Discovery

Multicloud Security Policies

  • Multicloud Security Policies Benefits and Requirements
  • Multicloud Security Architecture
  • Cisco Multicloud Defense

Cloud Security Attacks and Mitigations

  • Cloud Security Models
  • MITRE ATT&CK®  Framework
  • MITRE ATT&CK®  Matrix for Enterprise Cloud-Based Techniques
  • Practical Application of MITRE ATT&CK®
  • MITRE ATT&CK® Navigator

Cloud Visibility and Assurance

  • Cloud Visibility and Assurance Requirements
  • Cloud Visibility and Assurance Tools
  • Cloud Visibility and Assurance Automation

Cisco Secure Network Analytics and Cisco Secure Analytics and Logging

  • Cisco Secure Network Analytics
  • Cisco Secure Network Analytics Components
  • Secure Network Analytics Use Cases
  • Cisco Security Analytics and Logging (SAL)

Cisco XDR

  • Cisco XDR Overview
  • Cisco XDR Components
  • Cisco Secure Cloud Analytics

Cisco Attack Surface Management

  • Cisco Attack Surface Management Introduction
  • Cisco XDR Integration
  • Cisco Attack Suface Management Use Cases

Cloud Applications and Data Access Verifications

  • User Cloud Access Verification
  • User Cloud Access Verification Using Cisco Duo
  • User Cloud Access Verification Using Cisco Cloud Analytics
  • User Cloud Access Verification Usng Cisco Secure Workload
  • User Cloud Access Verification Usng Cisco Umbrella
  • User Cloud Access Verification Usng Cisco Secure Firewall

Industry Security Frameworks

  • Introduction to Security Frameworks
  • National Institute of Standards and Technologies Cybersecurity Framework
  • Cybersecurity and Infrastructure Security Agency Framework
  • Defense Information System Agency Framework
  • Comparison of Security Frameworks

Cisco Security Reference Architecture Fundamentals

  • Talos Threat Intelligence
  • XDR Security Operations Toolset
  • User/Device Security
  • Network Security: Cloud Edge and On-Premises
  • Workload, Application and Data Security

Cisco Security Reference Architecture Common Use Cases

  • Common Identity
  • Converged Multicloud Policy
  • SASE Integration
  • ZeroTrust Network Access
  • XDR Telemetry and Orchestration

Cisco SAFE Architecture

  • Cisco SAFE Framework
  • Key Components of Cisco SAFE
  • Cisco SAFE Phases

Exploring Cisco SD-WAN ThousandEyes

  • Cisco ThousandEyes Overview
  • Deploying Cisco ThousandEyes with Cisco SD-WAN

Automation of Cloud Policy

  • Automation of Cloud Policy
  • Tools for Automation of Cloud Policy and Troubleshooting

Response to Cloud Threats

  • Threat Response Fundamentals
  • Response to Data Breaches and User or Application Compromises
  • Regulartory Changes and Security Audit Responses

Automation of Cloud Threat Detection and Response

  • Cloud Threat Detection and Respnse Automation
  • Automation of Cloud Threat Detection and Response Tools
  • Cisco XDR Response Tasks and MITRE ATT&CK® Mappings 

Labs:

  • Discovery Lab 1:  Windows Client BYOD Onboarding Interactive Activity 
  • Discovery Lab 2:  Use Cisco Duo MFA to Protect the Splunk Application 
  • Discovery Lab 3:  Integrate the Cisco Duo Authentication Proxy to Implement MFA for Cisco Security Secure Firewall AnyConnect Remote Access VPN 
  • Discovery Lab 4:  Test and Monitor Compliance - Based Access 
  • Discovery Lab 5 : Implement Web Security 
  • Discovery Lab 6:  Deploy DIA Security with Unified Security Policy 
  • Discovery Lab 7:  Configure Cisco Umbrella DNS Policies 
  • Discovery Lab 8 : Deploy Cisco Umbrella Secure Internet Gateway 
  • Discovery Lab 9:  Implement CASB Security
  • Discovery Lab 10:: Configure Remote Access VPN on the Cisco Secure Firewall Threat Defense
  • Discovery Lab 11:  Configure Cisco Secure Firewall Policies
  • Discovery Lab 12:  Explore Cisco Secure Workload 
  • Discovery Lab 13:  Explore the ATT&CK Matrix Cloud-Based Techniques 
  • Discovery Lab 14:  Explore Cisco Secure Network Analytics
  • Discovery Lab 15: Explore Cisco XDR Control Center and Investigate 
  • Discovery Lab 16: Explore Cisco XDR Incident Response Tasks 

 

 

 

 

 

 

 

device security
Blijf op de hoogte van nieuwe ervaringen
Er zijn nog geen ervaringen.
Deel je ervaring
Heb je ervaring met deze cursus? Deel je ervaring en help anderen kiezen. Als dank voor de moeite doneert Springest € 1,- aan Stichting Edukans.

Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.

Download gratis en vrijblijvend de informatiebrochure

(optioneel)
(optioneel)
(optioneel)
infoEr is een telefoonnummer vereist om deze informatieaanvraag in behandeling te nemen. (optioneel)
(optioneel)
(optioneel)
(optioneel)

Heb je nog vragen?

(optioneel)