Cisco Security Workshops
  • Home
    • Available Workshops
    • Current Registrations
  • Workshop Events
    • List All Workshops by Category
Cisco Security Workshops
  • Home
    • Available Workshops
    • Current Registrations
  • Workshop Events
    • List All Workshops by Category
  • Forgot your username? or password?
  • Create an account
Fields marked with an asterisk (*) are required.
Name *
Username *
Password *
Verify password *
Email *
Verify email *

Workshop Short Description Templates

Hybrid Mesh Firewall: Project Meteor Workshop

Details
By Jamie Cresdee
Jamie Cresdee
Category: Workshop Short Description Templates
17 March 2026
Hits: 46

The Hybrid Mesh Firewall: Project Meteor workshop is designed to equip participants with the knowledge and hands-on experience needed to modernize firewall strategies using Cisco’s Hybrid Mesh Firewall technology. This innovative solution unifies security across data centers, cloud, campus, and IoT environments, providing a highly distributed security fabric.

During this session, you will step into the shoes of a fictional engineer at PseudoCo and work through real-world scenarios that highlight the power and flexibility of Cisco’s security solutions.

The workshop will make extensive use of Cisco Security Cloud Control and cover topics such as deployment, SD-WAN configuration, shared objects management, and application segmentation. This is a great opportunity to build hands-on experience and deepen your understanding of modern network security practices through a self-paced workshop.


Key Takeaways

  • Clear understanding of Cisco’s Hybrid Mesh Firewall solution and its advantages
  • Gain hands-on experience with Cisco Security Cloud Control for centralized and extensive security management
  • Understand how to configure SD-WAN for optimized and secure network connectivity
  • Explore enhanced cloud visibility to monitor and protect distributed applications and data
  • Deepen your knowledge of Shared Objects and their role in efficient policy management
  • Master application segmentation techniques using both endpoint agents and the firewall for comprehensive security.

Who Should Attend

  • Anyone involved in firewall management, policy enforcement, or security modernization initiatives

Workshop Format

  • Duration: 2 hours
  • Structure: A multi-phase, self-contained hands-on workshop
  • Phases Include:
    • Onboarding firewalls and simplifying branch connectivity
    • Integrating cloud policies and multi-cloud defense
    • Configuring segmentation for workloads and applications
    • Testing threat detection capabilities including encrypted traffic inspection
  • Tools Used: Cisco Security Cloud Control, Secure Firewall, Multi-cloud Defense and Secure Workload


Prerequisites

  • Cisco account registration (CCOID) – Click here for more information
  • Cisco Security Workshop account registration – Click here to register
  • Basic understanding of firewall concepts and network security

Why Attend This Workshop

In today’s complex and rapidly evolving threat landscape, traditional firewall approaches are no longer sufficient. The Hybrid Mesh Firewall: Project Meteor workshop empowers you to modernize your security posture by adopting a distributed firewall fabric that scales with your enterprise needs. Attendees will gain practical skills to reduce attack surfaces, prevent lateral movement, and protect critical applications across hybrid environments. This workshop offers a unique opportunity to experience Cisco’s cutting-edge firewall technology firsthand, enabling you to lead your organization’s security transformation with confidence and agility.

Unlocking the Power of Cisco Secure Firewall 10.0

Details
By Brandon Newport
Brandon Newport
Category: Workshop Short Description Templates
10 March 2026
Hits: 77

Experience the latest innovations in Cisco Secure Firewall 10.0 in this lab. Discover how the Encrypted Visibility Engine (EVE) enables threat detection in encrypted traffic, while AI-driven SnortML provides protection against signature-less attacks. Take advantage of expanded SD-WAN features and improved OT security with advanced access control and containment. Seamless Splunk integration delivers robust security analytics for effective incident response. This lab will help you build the knowledge and skills needed to highlight the strengths of Cisco Secure Firewall 10.0.

Zero Trust Access Design Clinic

Details
By Andy Peterson
Andy Peterson
Category: Workshop Short Description Templates
03 February 2026
Hits: 270

Overview:
The Zero Trust Access Design Workshop is a comprehensive 2-hour interactive session designed to help organizations understand and leverage Cisco’s Zero Trust Access capabilities. This workshop combines a targeted presentation, hands-on collaboration, and strategic planning to help customers modernize their zero trust architecture, enhance security visibility, and optimize operational efficiency.


Agenda:

1. Introduction & Presentation (30 - minutes)

  • Overview of Cisco’s Zero Trust Access solution
  • Key Advantages: unified policy management, improved visibility, operational simplification, and cost savings
  • Real-world examples and customer success stories
  • Discussion on integrating a zero trust approach with existing infrastructures

2. Interactive Discussion & White-boarding (45 Minutes)

  • Open dialogue between customers and Cisco Solutions Engineers (SEs) on current zero trust management practices
  • Identification and mapping of all access types, vendors, and resource locations within the customer’s environment
  • White-boarding session to illustrate current state, highlight challenges, and reveal potential gaps in visibility or management
  • Discussion of integration opportunities and quick wins for zero trust deployment

3. Demonstration and Discussion (15 minutes)

  • Summary of key findings from the discussion and whiteboarding
  • Collaborative development of a high-level roadmap for adopting a zero trust access solution
  • Recommendations on next steps to streamline operations, reduce costs, and improve security posture
  • Q&A and assignment of follow-up actions or resources

Key Takeaways:

  • Clear understanding of Cisco’s Zero Trust Access solution and its advantages
  • A detailed map of the customer’s current zero trust acess landscape
  • Identification of immediate opportunities and long-term strategies for transformation
  • A customized roadmap to help achieve a unified, scalable, and efficient security architecture

Who Should Attend:

  • CISO and Security Leaders
  • Network and Identity Administrators & Teams
  • SecOps Leaders and Staff
  • Cisco SEs and Technical Architects

Format:

  • 2-hour session (in-person or virtual)
  • Combination of presentation, discussion, and collaborative white-boarding
  • Actionable deliverables and next steps tailored to customer environment

 

Notes:

  • Ensure stakeholders from all relevant teams participate for a holistic view.
  • Bring network topology diagrams and inventory lists for deeper engagement.
  • The session is interactive and tailored to specific customer needs.

Secure Workload Test Drive: 3 Hour hands on

Details
By Jamie Cresdee
Jamie Cresdee
Category: Workshop Short Description Templates
07 January 2026
Hits: 415

Secure Workload Test Drive: 3 Hour hands on experience with Secure Workload. Space is limited to 20 customers per session !!

Cisco Secure Workload Test Drive

Today’s applications and the security threats that confront them are dynamic and continually changing. 

Organizations are looking for flexibility, performance, and security, whether they deploy an application on-premises or in the cloud. Enter bare-metal, virtualization, microservices, and containerization across private and public clouds, and it becomes an architectural and operational challenge to enforce a consistent security policy. Cisco Secure Workload can enhance security with segmentation and reduce risk by decreasing your workload’s attack surface quickly and consistently without adding complexity. 

Join this interactive, 3 hour, hands-on experience with Cisco Secure Workload (formerly Tetration) to learn how to: 

Gain visibility into what’s running and critical by identifying workloads and enforcing policies 

Contain breaches and minimize lateral movement with application micro-segmentation 

Alert or block communications by continuously monitoring and responding to indicators of compromise 

Prior to the session, please go to https://id.cisco.com/signin/register for a CCO account. This will be needed and is mandatory to access the hands-on lab.

  • 1
  • 2
  • 3
  • 4

Page 1 of 4

Hybrid Mesh Firewalls Design Workshops

Hybrid Mesh Firewalls Design Workshops are coming soon click here for more information.

Read More