Workshop Short Description Templates
- Details
- By Brandon Newport
- Category: Workshop Short Description Templates
- Hits: 2457

In today’s fast-paced threat landscape, organizations face sophisticated cyberattacks targeting endpoints, networks, and email systems. The ability to rapidly detect, investigate, and respond to incidents across multiple vectors is vital for maintaining a strong security posture.
This hands-on workshop is designed to empower security professionals with the practical knowledge and skills needed to orchestrate a rapid and effective incident response strategy using Cisco’s integrated security solutions, as well as Microsoft Defender for endpoint protection. The session emphasizes the importance of securing email as a primary attack vector, alongside endpoint and network security.
Participants will gain hands-on experience with a powerful ecosystem of tools, including Cisco XDR, Secure Endpoint, Umbrella, Secure Malware Analytics, Cisco Firewalls, Cisco Email Threat Defense, and Threat Intelligence. Additionally, we’ll explore how to seamlessly integrate these tools with Microsoft Defender to create a unified, robust security strategy.
Workshop Highlights:
This workshop will provide practical, hands-on experience with:
- Cisco XDR: Consolidate and analyze telemetry from across your security ecosystem to enable faster detection and response.
- Cisco Secure Endpoint: Detect and mitigate endpoint threats with advanced EDR capabilities powered by real-time analytics.
- Cisco Umbrella: Protect users from malicious domains, phishing, and malware with DNS-layer security and secure web gateway features.
- Cisco Secure Malware Analytics: Conduct in-depth malware analysis to uncover sophisticated threats and generate actionable intelligence.
- Cisco Firewall: Strengthen perimeter defenses with comprehensive threat protection and policy enforcement.
- Cisco Email Threat Defense: Secure email, the most targeted attack vector, by identifying and blocking phishing, business email compromise (BEC), and malicious attachments.
- Threat Intelligence: Leverage actionable threat intelligence to enhance your ability to detect and respond to emerging threats.
- Microsoft Defender for Endpoint: Integrate and utilize Microsoft Defender to ensure seamless endpoint protection across hybrid environments.
Key Takeaways:
- Build a unified, streamlined incident response strategy across email, endpoint, network, and cloud environments.
- Gain practical experience with Cisco XDR and its integration with endpoint, email, and network security tools.
- Learn to operationalize threat intelligence to improve detection and accelerate response times.
- Explore real-world workflows for detecting, analyzing, and neutralizing advanced threats, including ransomware, phishing, and malware.
- Discover best practices for integrating Microsoft Defender with Cisco’s security solutions to create a multi-layered defense strategy.
Who Should Attend:
- Security Operations Center (SOC) analysts
- Incident response teams
- Cybersecurity engineers and architects
- IT professionals responsible for securing enterprise environments
Workshop Format:
- Duration: 4-6 hours (customizable based on audience needs)
- Structure:
- Interactive presentations and demonstrations
- Hands-on labs with guided exercises
- Live threat simulations and response workflows
Prerequisites:
- You will need to bring a laptop for this hands-on workshop
- Basic understanding of cybersecurity concepts and frameworks.
- Familiarity with endpoint, email, and network security tools is helpful but not required.
- Ensure you are able to access https://ciscosecurityworkshop.com/ portal or else ask your IT Admin to allow this URL: https://ciscosecurityworkshop.com/ . If not possible, please bring your personal Laptop.
- The workshop uses a Microsoft tenant (ciscothreathunting.ninja). This tenant should be allowed and tenant restrictions should not be applied.
- A dual monitor / screen would be helpful for the workshop but not essential.
Why Attend?
This workshop provides a unique opportunity to strengthen your incident response capabilities by mastering the integration of Cisco and Microsoft security solutions. Learn how to secure your organization’s email systems, endpoints, and network infrastructure against today’s most sophisticated cyber threats. With actionable insights and guided hands-on labs, you’ll leave with the confidence to rapidly detect, investigate, and respond to threats across multiple attack surfaces.
- Details
- By Brandon Newport
- Category: Workshop Short Description Templates
- Hits: 5245

Cisco Secure Access is a converged cloud Security Service Edge (SSE) solution that is better for users, easier for IT, and safer for everyone. It enforces modern cybersecurity while providing a seamless and frictionless experience as users connect from anything to anywhere, via a common access approach.
Cisco Secure Access simplifies IT and InfoSec operations through a single, cloud-managed console, unified client, centralized policy creation, and aggregated reporting. Cisco Secure Access extensive security capabilities include:
Clientless Zero Trust Network Access (ZTNA)
Client Zero Trust Network Access (ZTNA)
VPN as a Service (VPNaaS)
Digital Experience Monitoring (DEM)
Firewall as a Service (FWaaS)
Intrusion Prevention System (IPS)
Domain Name System (DNS) Security
Secure Web Gateway (SWG)
Multimode Malware Protection
Cloud Access Security Broker (CASB)
Data Loss Prevention (DLP)
Remote Browser Isolation (RBI)
The emphasis on this lab is walking through a number of scenarios to experience what an end user would in an environment with Cisco Secure Access implemented. Note, there is only read-only access in the Secure Access console.
Key Takeaways
- Gain firsthand experience with Cisco Secure Access features and capabilities, such as Zero Trust Network Access (ZTNA), Secure Web Gateway (SWG), and Firewall as a Service (FWaaS).
- Understand how Cisco Secure Access delivers a seamless and secure user experience while simplifying IT and InfoSec operations.
- Learn how to navigate a unified, cloud-managed console for centralized policy creation, aggregated reporting, and a unified client experience.
- See how advanced security features like Data Loss Prevention (DLP), Cloud Access Security Broker (CASB), and Remote Browser Isolation (RBI) can protect your organization’s critical assets.
- Discover how to assess digital experience performance with integrated Digital Experience Monitoring (DEM).
What to Expect
- A hands-on walkthrough of real-world scenarios to experience how Cisco Secure Access operates from an end-user perspective.
- An introduction to the Secure Access console (read-only access) to explore its functionalities and understand its role in simplifying IT operations.
- Insights into how Cisco Secure Access integrates with your existing IT infrastructure to enforce modern cybersecurity practices.
- Practical demonstrations of the platform’s capabilities, including Zero Trust principles, advanced malware protection, and secure access management.
Who Should Attend
- IT Security Professionals: Looking to enhance their organization’s security posture with a unified Security Service Edge (SSE) solution.
- IT Administrators: Interested in simplifying operations through centralized policy management and a cloud-managed console.
- CISOs and Security Leaders: Evaluating modern security solutions to meet the demands of hybrid work environments.
- Network Engineers: Seeking to understand how Cisco Secure Access integrates with existing network architectures.
- Compliance Officers: Focused on data loss prevention, policy enforcement, and regulatory compliance.
Workshop Format
- Duration: 2-3 hours (flexible based on the audience needs).
- Interactive Scenarios: Participants will walk through guided scenarios to experience Cisco Secure Access in action.
- Hands-On Exploration: Engage with the Secure Access console (read-only) to understand the platform’s interface and key functionalities.
- Q&A Session: Time allocated for participants to ask technical questions and receive expert guidance.
- Virtual or In-Person: The lab can be conducted in a virtual or on-site format, depending on your organization’s preference.
Why Attend
- Future-Proof Your Security Strategy: Learn how Cisco Secure Access addresses modern security challenges, including securing hybrid work environments and protecting against sophisticated threats.
- Simplify IT Operations: See how a unified console and centralized policy creation can reduce complexity and improve efficiency for your IT team.
- Enhance User Experience: Discover how Cisco Secure Access provides a seamless and frictionless experience for end users, enabling productivity without compromising security.
- Real-World Scenarios: Gain practical insights into how Secure Access operates in real-world scenarios, giving you the confidence to implement and manage the solution.
- Expert Insights: Get guidance from Cisco experts who will walk you through the platform’s features and answer your specific questions.
This workshop is an excellent opportunity to experience the power and simplicity of Cisco Secure Access firsthand and understand how it can help your organization enforce modern cybersecurity while enhancing productivity and efficiency. Sign up now to secure your spot!
- Details
- By Brandon Newport
- Category: Workshop Short Description Templates
- Hits: 290

Overview:
The future of network security is evolving to a modern, more dynamic IT architecture born in the cloud. IT Teams have more users, devices, applications, and data to secure than ever before, and existing security models are falling short. With the rapid rise in remote and hybrid workers, organizations need a more efficient and secure way to connect users from wherever they are, to the internet, SaaS apps, and private applications. As a result, security teams are transitioning from a traditional decentralized security approach to a more centralized cloud-based security architecture.
Join one of our in-depth Cisco Secure Access hands-on workshops to gain insight into configuration and testing of new zero trust technology innovations that can vastly improve your security efficacy. You’ll leave with a clear understanding of how Cisco’s zero trust SSE solution can de-risk your environment with more granular controls, deliver a human-centric experience, and simplify IT operations.
Key Takeaways
- Discover how Cisco Secure Access enables a centralized, cloud-based security architecture to meet the demands of today’s dynamic IT environments.
- Explore the latest innovations in zero trust technology and learn how they can improve your organization’s security posture.
- Understand how granular access controls and simplified IT operations can reduce risk, enhance compliance, and protect your environment.
- Learn about the human-centric design of Cisco’s Secure Access solution and how it delivers a seamless user experience without compromising security.
- Gain practical insights into transitioning from traditional security models to a modern Security Service Edge (SSE) architecture.
What to Expect
- Introduction to Zero Trust SSE: Get an overview of Cisco’s zero trust approach and how it addresses modern security challenges.
- Hands-On Scenarios: Participate in guided, hands-on lab exercises to experience Cisco Secure Access functionalities in action, using Secure Access console (with read-write access) to configure and test its functionalities and understand its role in simplifying IT operations.
- Live Demo: Explore the Cisco Secure Access platform, including its centralized management console and key features (e.g., Zero Trust Network Access, Secure Web Gateway, and Data Loss Prevention).
- Interactive Q&A: Engage with Cisco experts to get answers to your specific questions and learn how the solution can apply to your environment.
- Real-World Insights: Walk through use cases and scenarios showcasing how organizations are leveraging Cisco Secure Access to protect hybrid and remote workforces.
Who Should Attend
- IT Security Professionals: Interested in adopting zero trust principles and modernizing their security architecture.
- IT Operations Teams: Focused on simplifying management and operations through centralized cloud-based solutions.
- CISOs and Security Leaders: Looking to enhance their organization’s security efficacy, reduce risk, and improve compliance.
- Network Engineers: Seeking to understand how SSE solutions integrate with existing IT environments to enable secure and efficient connectivity.
- Compliance Officers: Exploring tools that provide granular access controls, data protection, and regulatory compliance enforcement.
Workshop Format
- Duration: Approximately 2-3 hours.
- Delivery Method: Flexible options, including virtual or in-person sessions, depending on your organization’s preferences.
- Interactive Labs: Hands-on exercises with guided walkthroughs to explore Cisco Secure Access capabilities.
- Read-Write Access: Participants will be able to explore the Secure Access console in a read-write, configuration mode to understand its functionality.
- Expert-Led Discussions: Cisco security experts will lead the workshop, providing insights into real-world applications and best practices.
Why Attend
- Stay Ahead of Evolving Threats: Learn how Cisco Secure Access helps you address modern security challenges posed by hybrid work, remote access, and cloud adoption.
- Simplify Operations: See how a centralized, cloud-managed security approach can reduce complexity and improve operational efficiency.
- Enhance User Experience: Discover how Cisco Secure Access delivers a seamless and secure experience for end users, fostering productivity without friction.
- Gain Practical Knowledge: Participate in hands-on labs and real-world scenarios that give you the confidence to implement and manage Cisco Secure Access in your environment.
- Expert Guidance: Benefit from access to Cisco’s security experts, who will provide detailed insights into zero trust technology and answer your specific questions.
This workshop is your opportunity to explore Cisco Secure Access in-depth, experience its configuration and capabilities firsthand, and see how it can revolutionize your organization’s approach to security. Don’t miss this chance to future-proof your security strategy—reserve your spot today!
- Details
- By Brandon Newport
- Category: Workshop Short Description Templates
- Hits: 256
In today’s rapidly evolving cybersecurity landscape, safeguarding your network from sophisticated threats requires more than just traditional firewalls. Cisco Next-Generation Firewalls (NGFW) provide advanced threat protection, deep visibility, and unparalleled control across your organization’s infrastructure. This comprehensive hands-on workshop is designed to equip IT professionals, network administrators, and security architects with the skills and knowledge they need to deploy, configure, and manage Cisco NGFWs effectively.
Join us for an interactive, instructor-led experience where theory meets practice. Learn how to secure your enterprise while exploring real-world scenarios through live lab exercises. Whether you're new to NGFWs or looking to deepen your expertise, this workshop will provide actionable insights into leveraging Cisco's cutting-edge security technologies.
What You'll Learn:
-
Introduction to Cisco NGFW:
- Overview of NGFW capabilities, architecture, and key features.
- Understanding how Cisco NGFW integrates with your existing security ecosystem.
-
Deployment and Configuration:
- Hands-on setup of Cisco NGFW in various network environments.
- Configuring access control policies, application visibility, and URL filtering.
-
Advanced Threat Protection:
- Exploring Cisco’s Talos Threat Intelligence for proactive threat management.
- Implementing intrusion prevention systems (IPS) and advanced malware protection (AMP).
-
Deep Packet Inspection and Traffic Analysis:
- Using Cisco NGFW to identify and control encrypted traffic with SSL/TLS inspection.
- Monitoring network traffic and analyzing logs for suspicious activity.
-
Securing Remote Workforces:
- Configuring VPNs and Zero Trust capabilities for secure remote access.
- Protecting endpoints with Cisco Secure Endpoint integration.
Who Should Attend:
- Network security engineers and administrators.
- IT professionals involved in cybersecurity implementation and management.
- Organizations looking to enhance their network security posture with Cisco technologies.
Workshop Highlights:
- Hands-On Lab Exercises: Gain practical experience with Cisco NGFW in a simulated enterprise environment.
- Expert-Led Instruction: Learn from certified Cisco professionals with real-world experience.
- Real-World Use Cases: Explore scenarios such as ransomware mitigation, insider threat detection, and secure hybrid cloud integration.
- Q&A and Support: Get your questions answered by experts and take home actionable insights.
Prerequisites:
- You will need to bring a laptop as this is a hands-on workshop
- Basic understanding of networking concepts (e.g., TCP/IP, routing, and switching).
- Familiarity with cybersecurity principles is recommended but not required.
Takeaways:
- Comprehensive workshop material (slides, configurations, and guides).
- Certificate of Completion to validate your knowledge.
- Practical skills to deploy and manage Cisco NGFWs in your own network environment.
Why Attend?
By the end of this workshop, you’ll have the confidence and expertise to leverage Cisco Next-Generation Firewalls to safeguard your organization’s digital assets, ensure compliance, and mitigate modern cyber threats effectively. Don’t miss this opportunity to stay ahead in the ever-changing field of cybersecurity.
Page 3 of 4
