<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="36218" language="en" source="https://portal.flane.ch/swisscom/en/xml-course/cisco-sdsi" lastchanged="2026-03-20T04:17:25+01:00" parent="https://portal.flane.ch/swisscom/en/xml-courses"><title>Designing Cisco Security Infrastructure</title><productcode>SDSI</productcode><vendorcode>CI</vendorcode><vendorname>Cisco</vendorname><fullproductcode>CI-SDSI</fullproductcode><version>1.0</version><objective>&lt;ul&gt;
&lt;li&gt;Identify and explain the fundamental concepts of security architecture and how they support the design, building, and maintenance of a secure infrastructure&lt;/li&gt;&lt;li&gt;Identify the layers of security infrastructure, core security technologies, and infrastructure concepts&lt;/li&gt;&lt;li&gt;Explain how security designs principles contribute to secure infrastructure&lt;/li&gt;&lt;li&gt;Identify and discuss security design and management frameworks that can be used for infrastructure security design&lt;/li&gt;&lt;li&gt;Explain the importance of and methods for enforcement of regulatory compliance in security design&lt;/li&gt;&lt;li&gt;Identify tools that enable detection and response to infrastructure security incidents&lt;/li&gt;&lt;li&gt;Explain various strategies that can be implemented to modify traditional security architectures to meet the technical requirements of modern enterprise networks&lt;/li&gt;&lt;li&gt;Implement secure network access methods, such as 802.1X, MAC Authentication Bypass (MAB), and web-based authentication&lt;/li&gt;&lt;li&gt;Describe security technologies that can be applied to enterprise Wide Area Network (WAN) connections&lt;/li&gt;&lt;li&gt;Compare methods to secure network management and control plane traffic&lt;/li&gt;&lt;li&gt;Compare the differences between traditional firewalls and next-gen firewalls (NGFWs) and identify the advanced features that NGFWs provide&lt;/li&gt;&lt;li&gt;Explain how web application firewalls (WAFs) secure web applications from threats&lt;/li&gt;&lt;li&gt;Describe the key features and best practices for deploying intrusion detection system (IDS) and intrusion prevention system (IPS) as part of the enterprise infrastructure security design&lt;/li&gt;&lt;li&gt;Explain how endpoints and services in cloud-native or microservice environments can be protected with host-based or distributed firewalls&lt;/li&gt;&lt;li&gt;Discuss security technologies that address application data and data that is in transit&lt;/li&gt;&lt;li&gt;Identify several security solutions for cloud-native applications, microservices, and containers&lt;/li&gt;&lt;li&gt;Explain how technology advancements allow for improvements in today&amp;rsquo;s infrastructure security&lt;/li&gt;&lt;li&gt;Identify tools that enable detection and response to infrastructure security incidents&lt;/li&gt;&lt;li&gt;Describe frameworks and controls to access and mitigate security risks for infrastructure&lt;/li&gt;&lt;li&gt;Explain how to make security adjustments following a security incident&lt;/li&gt;&lt;li&gt;Identify DevSecOps integrations that improve security management and response&lt;/li&gt;&lt;li&gt;Discuss how to ensure that automated services are secure&lt;/li&gt;&lt;li&gt;Discuss how AI can aid in threat detection and response&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;p&gt;There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are: &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Cisco CCNP Security or equivalent knowledge&lt;/li&gt;&lt;li&gt;Familiarity with Microsoft Windows Operating Systems&lt;/li&gt;&lt;li&gt;Familiarity with the Cisco Security portfolio&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;These skills can be found in the following Cisco Learning Offerings:     
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/en/course/cisco-scor&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Implementing and Operating Cisco Security Core Technologies &lt;span class=&quot;fl-prod-pcode&quot;&gt;(SCOR)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/en/course/cisco-sfwipf&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention &lt;span class=&quot;fl-prod-pcode&quot;&gt;(SFWIPF)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/en/course/cisco-sise&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Implementing and Configuring Cisco Identity Services Engine &lt;span class=&quot;fl-prod-pcode&quot;&gt;(SISE)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/en/course/cisco-scazt&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Designing and Implementing Secure Cloud Access for Users and Endpoints &lt;span class=&quot;fl-prod-pcode&quot;&gt;(SCAZT)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/en/course/cisco-sfwipa&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Advanced Techniques for Cisco Firewall Threat Defense and Intrusion Prevention &lt;span class=&quot;fl-prod-pcode&quot;&gt;(SFWIPA)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/en/course/cisco-svpn&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Implementing Secure Solutions with Virtual Private Networks &lt;span class=&quot;fl-prod-pcode&quot;&gt;(SVPN)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/en/course/cisco-csau&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Introducing Automation for Cisco Solutions &lt;span class=&quot;fl-prod-pcode&quot;&gt;(CSAU)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/en/course/cisco-sesa&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Securing Your Email with Cisco IronPort C-Series &lt;span class=&quot;fl-prod-pcode&quot;&gt;(SESA)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/en/course/cisco-swsa&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Securing the Web with Cisco Web Security Appliance &lt;span class=&quot;fl-prod-pcode&quot;&gt;(SWSA)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;</essentials><audience>&lt;ul&gt;
&lt;li&gt;Cisco and Partner&amp;rsquo;s Systems Engineers&lt;/li&gt;&lt;li&gt;Customer Network &amp;amp; Infrastructure Engineers&lt;/li&gt;&lt;li&gt;Customer Security/NOC Engineers&lt;/li&gt;&lt;/ul&gt;</audience><outline>&lt;ul&gt;
&lt;li&gt;Definition and Purpose of Security Architecture&lt;/li&gt;&lt;li&gt;Components of Security Infrastructure&lt;/li&gt;&lt;li&gt;Security Design Principles&lt;/li&gt;&lt;li&gt;Security and Design Frameworks&lt;/li&gt;&lt;li&gt;Compliance and Regulatory Requirements&lt;/li&gt;&lt;li&gt;Security Approaches to Protect Against Threats&lt;/li&gt;&lt;li&gt;Modify the Security Architecture to Meet Technical Requirements&lt;/li&gt;&lt;li&gt;Network Access Security&lt;/li&gt;&lt;li&gt;VPN and Tunneling Solutions&lt;/li&gt;&lt;li&gt;Secure Infrastructure Management and Control Planes&lt;/li&gt;&lt;li&gt;Nextgen Firewalls&lt;/li&gt;&lt;li&gt;Web Application Firewall (WAF)&lt;/li&gt;&lt;li&gt;IPS/IDS Deployment&lt;/li&gt;&lt;li&gt;Host-Based Firewalls and Distributed Firewalls&lt;/li&gt;&lt;li&gt;Security Solutions Based on Application and Flow Data&lt;/li&gt;&lt;li&gt;Security for Cloud-Native Applications, Microservices, and Containers&lt;/li&gt;&lt;li&gt;Emerging Technologies in Application Security&lt;/li&gt;&lt;li&gt;SOC Tools for Incident Handling and Response&lt;/li&gt;&lt;li&gt;Modify Design to Mitigate Risk&lt;/li&gt;&lt;li&gt;Incident-Driven Security Adjustments&lt;/li&gt;&lt;li&gt;DevSecOps Integration&lt;/li&gt;&lt;li&gt;Secure Automated Workflows and Pipelines&lt;/li&gt;&lt;li&gt;AI&amp;rsquo;s Role in Securing Infrastructure&lt;/li&gt;&lt;/ul&gt;</outline><objective_plain>- Identify and explain the fundamental concepts of security architecture and how they support the design, building, and maintenance of a secure infrastructure
- Identify the layers of security infrastructure, core security technologies, and infrastructure concepts
- Explain how security designs principles contribute to secure infrastructure
- Identify and discuss security design and management frameworks that can be used for infrastructure security design
- Explain the importance of and methods for enforcement of regulatory compliance in security design
- Identify tools that enable detection and response to infrastructure security incidents
- Explain various strategies that can be implemented to modify traditional security architectures to meet the technical requirements of modern enterprise networks
- Implement secure network access methods, such as 802.1X, MAC Authentication Bypass (MAB), and web-based authentication
- Describe security technologies that can be applied to enterprise Wide Area Network (WAN) connections
- Compare methods to secure network management and control plane traffic
- Compare the differences between traditional firewalls and next-gen firewalls (NGFWs) and identify the advanced features that NGFWs provide
- Explain how web application firewalls (WAFs) secure web applications from threats
- Describe the key features and best practices for deploying intrusion detection system (IDS) and intrusion prevention system (IPS) as part of the enterprise infrastructure security design
- Explain how endpoints and services in cloud-native or microservice environments can be protected with host-based or distributed firewalls
- Discuss security technologies that address application data and data that is in transit
- Identify several security solutions for cloud-native applications, microservices, and containers
- Explain how technology advancements allow for improvements in today’s infrastructure security
- Identify tools that enable detection and response to infrastructure security incidents
- Describe frameworks and controls to access and mitigate security risks for infrastructure
- Explain how to make security adjustments following a security incident
- Identify DevSecOps integrations that improve security management and response
- Discuss how to ensure that automated services are secure
- Discuss how AI can aid in threat detection and response</objective_plain><essentials_plain>There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are: 


- Cisco CCNP Security or equivalent knowledge
- Familiarity with Microsoft Windows Operating Systems
- Familiarity with the Cisco Security portfolio
These skills can be found in the following Cisco Learning Offerings:     



- Implementing and Operating Cisco Security Core Technologies (SCOR)
- Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention (SFWIPF)
- Implementing and Configuring Cisco Identity Services Engine (SISE)
- Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT)
- Advanced Techniques for Cisco Firewall Threat Defense and Intrusion Prevention (SFWIPA)
- Implementing Secure Solutions with Virtual Private Networks (SVPN)
- Introducing Automation for Cisco Solutions (CSAU)
- Securing Your Email with Cisco IronPort C-Series (SESA)
- Securing the Web with Cisco Web Security Appliance (SWSA)</essentials_plain><audience_plain>- Cisco and Partner’s Systems Engineers
- Customer Network &amp; Infrastructure Engineers
- Customer Security/NOC Engineers</audience_plain><outline_plain>- Definition and Purpose of Security Architecture
- Components of Security Infrastructure
- Security Design Principles
- Security and Design Frameworks
- Compliance and Regulatory Requirements
- Security Approaches to Protect Against Threats
- Modify the Security Architecture to Meet Technical Requirements
- Network Access Security
- VPN and Tunneling Solutions
- Secure Infrastructure Management and Control Planes
- Nextgen Firewalls
- Web Application Firewall (WAF)
- IPS/IDS Deployment
- Host-Based Firewalls and Distributed Firewalls
- Security Solutions Based on Application and Flow Data
- Security for Cloud-Native Applications, Microservices, and Containers
- Emerging Technologies in Application Security
- SOC Tools for Incident Handling and Response
- Modify Design to Mitigate Risk
- Incident-Driven Security Adjustments
- DevSecOps Integration
- Secure Automated Workflows and Pipelines
- AI’s Role in Securing Infrastructure</outline_plain><duration unit="d" days="5">5 days</duration><pricelist><price country="GB" currency="GBP">3305.00</price><price country="US" currency="USD">4400.00</price><price country="CA" currency="CAD">6070.00</price><price country="IT" currency="EUR">2990.00</price><price country="NL" currency="EUR">3495.00</price><price country="FR" currency="EUR">4400.00</price></pricelist><miles><milesvalue country="GB" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">44.00</milesvalue><milesvalue country="US" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">44.00</milesvalue><milesvalue country="CA" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">44.00</milesvalue><milesvalue country="FR" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">44.00</milesvalue><milesvalue country="SI" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">44.00</milesvalue><milesvalue country="SE" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">44.00</milesvalue><milesvalue country="IL" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">44.00</milesvalue><milesvalue country="EG" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">44.00</milesvalue><milesvalue country="AT" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">44.00</milesvalue><milesvalue country="UA" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">44.00</milesvalue><milesvalue country="CH" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">44.00</milesvalue><milesvalue country="DE" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">44.00</milesvalue></miles></course>