Designing and Implementing Secure Cloud Access for Users and Endpoints v1.0

CCNP Security - Concentration: SCAZT 300-740

The 300-740 SCAZT exam, also known as Securing Networks with Cisco Web Security Appliance (WSA), is part of the CCNP Security certification.

Designing and Implementing Secure Cloud Access for Users and Endpoints (300-740 SCAZT)

The 300-740 SCAZT exam, also known as Securing Networks with Cisco Web Security Appliance (WSA), is part of the CCNP Security certification. It focuses on the concepts, configuration, and troubleshooting of web security solutions using Cisco Web Security Appliance. 

What you’ll learn 

  • Cloud Security Architecture
  • User and Device Security
  • Network and Cloud Security
  • Application and Data Security
  • Visibility and Assurance
  • Threat Response

Syllabus Summary

Cloud Security Architecture

Describe the components of the Cisco Security Reference Architecture

  • Threat intelligence
  • Security operations toolset
  • User/device security
  • Network security: cloud edge and on-premises
  • Workload, application, and data security

Describe use cases and the recommended capabilities within an integrated architecture

  • Common identity
  • Converged multicloud policy
  • SASE integrations
  • Zero-trust network access

Describe industry security frameworks such as NIST, CISA, and DISA

Describe the SAFE architectural framework

Describe the SAFE Key structure

  • Places in the Network
  • Secure Domains
User and Device Security
  • Implement user and device authentication via identity certificates
  • Implement multifactor authentication for users and devices
  • Implement endpoint posture policies for user access to resources
  • Configure SAML/SSO and OIDC using an identity provider connection
  • Configure user and device trust using SAML authentication for a mobile or web application
Network and Cloud Security

Determine security policies for endpoints to permit access to cloud applications

  • URL filtering (web layer and DNS layer)
  • Advanced app control
  • Network protocol blocking such as FTP and bit torrent
  • Direct-internet-access for trusted business applications
  • Web application firewall
  • Reverse proxy

Determine security policies for endpoints to permit access to SaaS applications such as Office 365, Workday, and Salesforce

Determine security policies for remote users using VPN or application-based

Determine security policies for network security edge to enforce application policy

  • Security services edge
  • Cisco Secure Firewall (FTD and ASA)
Application and Data Security
  • Describe the MITRE ATT&CK framework and attacker defense mitigation techniques
  • Describe cloud security attack tactics and mitigation strategies
  • Describe how web application firewall protect against DDoS attacks
  • Determine security policies for application enforcement using Cisco Secure Workload and enforcement agents

o Lateral movement prevention

o Microsegmentation

  • Determine cloud (hybrid and multicloud) platform security policies based on application connectivity requirements (3rd party providers such as AWS, Azure, and Google Cloud)
Visibility and Assurance
  • Describe the Cisco XDR solution
  • Describe use cases for visibility and assurance automation
  • Describe benefits and capabilities of visibility and logging tools such as SIEM, Open Telemetry, and Cisco Secure Network Analytics
  • Validate traffic flow and telemetry reports for baseline and compliance behavior analysis
  • Diagnose issues with user application and workload access

o Cisco Secure Network Analytics

o Cisco Secure Cloud Analytics

o Cisco Secure Cloud Insights

o Cisco Secure Analytics and Logging

  • Verify user access to applications and data using tools (firewall logs, Duo, Umbrella, and Cisco Secure Workload)
  • Analyze application dependencies using tools such as firewall logs and Cisco Secure Workload
Threat Response
  • Describe use cases for response automation
  • Determine actions based on telemetry reports
  • Determine policies based on security audit reports
  • Determine action based on user or application compromise

o Contain

o Report

o Remediate

o Reinstantiate

Required Exam

  • Exam Code: SCAZT 300-740
  • Duration: 90 minutes
  • Exam Cost: 300 USD

Related Courses

experts-banner-background

EMIGO Expert Training Team

new-batch-mage

New Batches Commence On

Testimonials

enquiry-section1-bg
enquiry-form-model1

Learn like a Leader
Not a follower

Scan or Click on the QR Code to submit your enquiry

Enquiry
enquiry-section1-qrcode
footer-enquiry footer-enquiry