New Skills

New Training: Describe Cisco SD-WAN Edge Capabilities

by Team Nuggets
New Training: Explain BGP Concepts picture: A
Published on March 2, 2021

In this 10-video skill, CBT Nuggets trainer Jeff Kish unpacks the benefits of migrating to an SD-WAN architecture and the capabilities of the framework’s edge platforms. Watch this new networking training.

Watch the full course: Cisco CCNP Implementing Cisco SD-WAN Solutions

This training includes:

  • 10 videos

  • 50 minutes of training

You’ll learn these topics in this skill:

  • Intro

  • Automated Edge Provisioning

  • Zero Trust Model

  • SLA Tracking

  • Edge Redundancy

  • Application Policy

  • Cloud OnRamp for IaaS

  • Cloud OnRamp for SaaS

  • vAnalytics

  • Review and Quiz

What is the Zero Trust Model?

The Zero Trust Model is a security strategy that aims to remove the concept of "Trust" by segmenting an organization's network architecture and ensuring that all users are authenticated and authorized to access these defined segmented aspects of an internal organization. This Zero Trust Model grew out of an identification of the security vulnerabilities in the more traditional access control model for an organization's internal network. Traditionally, once a user had access to the network, they were trusted to access any of the internal applications on that network, independent of that individual's security clearance.

The Zero Trust Model challenges this typical approach by defining a "protect surface." This protect surface defines the organization's most critical applications and services that possess the greatest security risk. Once the protected surface is defined, authentication and authorization segmentation are put into place, so even internal users must successfully identify themselves as authorized users prior to gaining access to this network segment.

This security architecture enhancement has provided incredible value for organizations who intend to make their sensitive data, applications, and services less vulnerable to internal or external malicious attacks.

Recommended Articles