| Topic | Details |
| Topic 1 | - Network and Cloud Security:This section of the exam measures skills of Network Security Engineers and covers policy design for secure access to cloud and SaaS applications. It outlines techniques like URL filtering, app control, blocking specific protocols, and using firewalls and reverse proxies. The section also addresses security controls for remote users, including VPN-based and application-based access methods, as well as policy enforcement at the network edge.
|
| Topic 2 | - Threat Response: This section of the exam measures skills of Incident Response Engineers and focuses on responding to threats through automation and data analysis. It covers how to act based on telemetry and audit reports, manage user or application compromises, and implement response steps such as containment, reporting, remediation, and reinstating services securely.
|
| Topic 3 | - Integrated Architecture Use Cases: This section of the exam measures the skills of Cloud Solution Architects and covers key capabilities within an integrated cloud security architecture. It focuses on ensuring common identity across platforms, setting multicloud policies, integrating secure access service edge (SASE), and implementing zero-trust network access models for more resilient cloud environments.
|
| Topic 4 | - Industry Security Frameworks: This section of the exam measures the skills of Cybersecurity Governance Professionals and introduces major industry frameworks such as NIST, CISA, and DISA. These frameworks guide best practices and compliance in designing secure systems and managing cloud environments responsibly.
|
| Topic 5 | - Visibility and Assurance: This section of the exam measures skills of Security Operations Center (SOC) Analysts and focuses on monitoring, diagnostics, and compliance. It explains the Cisco XDR solution, discusses visibility automation, and describes tools for traffic analysis and log management. The section also involves diagnosing application access issues, validating telemetry for behavior analysis, and verifying user access with tools like firewall logs, Duo, and Cisco Secure Workload.
|