| 1.
|  | Securing AI Using Zero Trust Principles |
| 2.
|  | Securing Enterprise Networks with Cisco Meraki |
| 3.
|  | Securing Enterprise Networks with Cisco Meraki |
| 4.
|  | Zero Trust Architecture |
| 5.
|  | Zero Trust Architecture |
| 6.
|  | Cisco Firepower Threat Defense (FTD): Configuration and Troubleshooting Best Practices for the Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Advanced Malware Protection (AMP) |
| 7.
|  | Cisco ISE for BYOD and Secure Unified Access, 2nd Edition |
| 8.
|  | Cisco ISE for BYOD and Secure Unified Access, 2nd Edition |
| 9.
|  | IKEv2 IPsec Virtual Private Networks: Understanding and Deploying IKEv2, IPsec VPNs, and FlexVPN in Cisco IOS |