Vendor: Cisco
Mode: On Demand Digital
Level: Professional
Exam:300-740 SCAZT
Exam at your place: yes, ask for a quote
Duration: Self Paced
Language: English

SKU: SCATZ-DL Categories: , ,

Course Price

CHF 630.00

(excl. VAT)

Discount available for multiple students and dedicated classes.

What you’ll learn

The Designing and Implementing Secure Cloud Access for Users and Endpoints (SCATZ) course provides instruction on crafting and deploying cloud security frameworks, securing users and devices, protecting networks and cloud environments, ensuring the security of cloud applications and data, maintaining visibility and assurance in the cloud, and addressing cloud-related threats.

What to expect in the exam

The 300-740 SCAZT exam, titled “Designing and Implementing Secure Cloud Access for Users and Endpoints,” is a 90-minute assessment linked with the Cisco Certified Specialist – Secure Cloud Access certification. It also fulfills the concentration exam criterion for the CCNP Security certification.

This exam evaluates your proficiency in designing and implementing the following areas:

  • Cloud security architecture
  • Security measures for users and devices
  • Security protocols for networks and cloud environments
  • Strategies for securing applications and data in the cloud
  • Ensuring visibility and assurance within cloud infrastructures
  • Response tactics to counteract cloud-related threats

Prerequisites

Prior to participating in this training, it is assumed that you possess the following knowledge and abilities:

  • Fundamental comprehension of enterprise routing
  • Basic grasp of wide area network (WAN) networking
  • Basic understanding of Cisco SD-WAN
  • Basic familiarity with public cloud services

You can acquire these skills through the following Cisco Learning Offerings:

Who should enroll

  • Network Engineers
  • Network Security Engineers
  • Network Architects
  • Sales/Presales Engineers

Technology areas

Security

Training overview

This training is designed to equip you with the skills needed to create and implement robust cloud security architecture, ensuring the safety of users, devices, networks, applications, and data. Additionally, it provides knowledge on various protocols, solutions, and designs essential for pursuing professional and expert-level roles in cloud design and implementation.

Objectives

The course aims to achieve the following objectives:

  • Analyze and compare the security frameworks provided by the National Institute of Standards and Technology (NIST), Cybersecurity and Infrastructure Security Agency (CISA), and Defense Information Systems Agency (DISA), emphasizing the importance of standardized frameworks in enhancing organizational security.
  • Explain the Cisco Security Reference Architecture, outlining its five primary components.
  • Outline commonly deployed use cases and recommend essential capabilities within an integrated security architecture to effectively address them.
  • Explain the Cisco Secure Architecture for Everyone (SAFE) framework.
  • Examine the benefits, components, and process of certificate-based authentication for users and devices.
  • Implement Duo multi-factor authentication (MFA) to protect applications, configure applications for Duo MFA for user login authentication, and set up Cisco Duo for multifactor authentication on remote access VPN.
  • Configure endpoint compliance and understand Stateful Switchover (SSO) using security assertion markup language (SAML) or OpenID Connect alongside Cisco Duo.
  • Describe Cisco’s software-defined wide-area network (SD-WAN) on-box and integrated threat prevention and content filtering security services.
  • Explore the features and capabilities of Cisco Umbrella Secure Internet Gateway (SIG), including DNS Security, Cloud-Delivered Firewall (CDFW), intrusion prevention systems (IPS), and its interaction with Cisco SD-WAN.
  • Introduce reverse proxy for protecting internet-facing applications.
  • Discuss the use case of Cisco Umbrella SIG for securing cloud application access, along with its limitations, benefits, and features for controlling access to cloud-delivered applications.
  • Explore Cisco ThousandEyes capabilities for monitoring Cisco SD-WAN deployments.
  • Address challenges in accessing SaaS applications in modern business environments through the Cisco SD-WAN Cloud OnRamp for SaaS solution.
  • Introduce Cisco Secure Firewall platforms, their use cases, and security capabilities.
  • Demonstrate a thorough understanding of web application firewalls.
  • Explain Cisco Secure Workload capabilities, deployment options, agents, connectors, application dependency mapping, and policy discovery.
  • Discuss common cloud attack tactics and mitigation strategies.
  • Address multicloud security requirements and policy capabilities.
  • Introduce security issues associated with public cloud adoption and common capabilities of cloud visibility and assurance tools for mitigating these issues.
  • Discuss Cisco Secure Network Analytics, Cisco Security Analytics and Logging, and Cisco Attack Surface Management.
  • Explain how Application Program Interfaces (APIs) and automation aid in troubleshooting cloud policy, especially regarding misconfigurations.
  • Demonstrate comprehensive knowledge of appropriate responses to cloud threats in specific scenarios.
  • Demonstrate comprehensive knowledge required for using automation in cloud threat detection and response.

Course Outline

  1. Industry Security Frameworks
  2. Cisco Security Reference Architecture Fundamentals
  3. Cisco Security Reference Architecture Common Use Cases
  4. Cisco SAFE Architecture
  5. Certificate-Based User and Device Authentication
  6. Cisco Duo Multifactor Authentication for Application Protection
  7. Cisco Duo with AnyConnect VPN for Remote Access
  8. Introducing Cisco ISE Endpoint Compliance Services
  9. SSO using SAML or OpenID Connect
  10. Deploying On-Premises Threat Prevention
  11. Examining Content Filtering
  12. Exploring Cisco Umbrella SIG
  13. Reverse Proxy
  14. Securing Cloud Application with Cisco Umbrella SIG
  15. Exploring Cisco SD-WAN ThousandEyes
  16. Optimizing SaaS Applications
  17. Security Policies for Remote Access VPN
  18. Cisco Secure Access
  19. Cisco Secure Firewall
  20. Web Application Firewall
  21. Cisco Secure Workload Deployments, Agents, and Connectors
  22. Cisco Secure Workload Structure and Policy
  23. Cloud Security Attacks and Mitigations
  24. Multicloud Security Policies
  25. Cloud Visibility and Assurance
  26. Cisco Secure Network Analytics and Cisco Secure Analytics and Logging
  27. Cisco XDR
  28. Cisco Attack Surface Management
  29. Cloud Applications and Data Access Verifications
  30. Automation of Cloud Policy
  31. Response to Cloud Threats
  32. Automation of Cloud Threat Detection and Response

Lab outline

  1. Explore Cisco SecureX
  2. Windows Client BYOD Onboarding Interactive Activity
  3. Use Cisco Duo MFA to Protect the Splunk Application
  4. Integrate the Cisco Duo Authentication Proxy to Implement MFA for Cisco Security Secure Firewall AnyConnect Remote Access VPN
  5. Configure Cisco ISE Compliance Services
  6. Configure Threat Prevention
  7. Implement Web Security
  8. Deploy DIA Security with Unified Security Policy
  9. Configure Cisco Umbrella DNS Policies
  10. Deploy Cisco Umbrella Secure Internet Gateway
  11. Implement CASB Security
  12. Microsoft 365 SaaS Testing by Using Cisco ThousandEyes
  13. Configure Remote Access VPN on the Cisco Secure Firewall Threat Defense
  14. Configure Cisco Secure Firewall Policies
  15. Explore Cisco Secure Workload
  16. Explore the ATT&CK Matrix Cloud-Based Techniques
  17. Explore Cisco Secure Network Analytics
  18. Explore Cisco XDR Incident Response Tasks

Information request
Please enable JavaScript in your browser to complete this form.
Your Name
How did you find us?
This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.