Documentos de Académico
Documentos de Profesional
Documentos de Cultura
Exam Description: The Security Architecture for Systems Engineer (SASE) exam (500-651) is a 90-
minute assessment with 55–65 questions. This exam tests the Systems Engineer for the required
knowledge of the basic Cisco Security portfolio for a registered partner organization to acquire the
Express Security specialization in the required SE role.
The following topics are general guidelines for the content likely to be included on the exam. However,
other related topics may also appear on any specific delivery of the exam. In order to better reflect the
contents of the exam and for clarity purposes, the guidelines below may change at any time without
notice.
1.5 Identify how Cisco solutions provide customers “visibility and control”
1.7 Identify the five main areas of the Cisco Security solutions portfolio
1.8 Identify the key takeaways of the Cisco Security and Threat Landscape module
2.7 Identify the key takeaways of the Web and Email Security module
4.10 Identify the main use cases for NGFW and NGIPS
4.10.a Identify the value NGFW and NGIPS security provides: Campus NGFW
4.10.b Identify the value NGFW and NGIPS security provides: Internet Edge
4.10.c Identify the value NGFW and NGIPS security provides: Cloud Data Center Edge
4.10.d Identify the value NGFW and NGIPS security provides: Local Data Center Edge
4.10.e Identify the value NGFW and NGIPS security provides: Acceptable Use
4.10.f Identify the value NGFW and NGIPS security provides: Comprehensive Security
4.10.g Identify the value NGFW and NGIPS security provides: Complex Remote Access
4.10.h Identify the value NGFW and NGIPS security provides: Advanced threat
protection
4.11 Identify the key takeaways of the NGFW and NGIPS security module
5.8 Identify the key takeaways of the Policy and Access security module
6.8 Identify the key takeaways of the Advanced Threat security module
7.5 Identify the key solutions and features of the web threat-centric solution
7.5.a Identify the key products and benefits of the web threat-centric solution
7.6 Identify the key solutions and features of the cloud apps threat-centric solution
7.6.a Identify the key products and benefits of the cloud apps threat-centric
solution
7.7 Identify the key solutions and features of the endpoints threat-centric solution
7.7.a Identify the key products and benefits of the endpoints threat-centric
solution
7.8 Identify the key solutions and features of the mobile threat-centric solution
7.8.a Identify the key products and benefits of the mobile threat-centric solution
7.9 Identify the key solutions and features of the campus and branch threat-centric
solution
7.9.a Identify the key products and benefits of the campus and branch threat-
centric solution
7.10 Identify the key solutions and features of the data center threat-centric solution
7.11 Identify the three key takeaways of the Threat-Centric Solutions module