{"id":21001,"date":"2026-03-09T12:56:22","date_gmt":"2026-03-09T10:56:22","guid":{"rendered":"https:\/\/muk.training\/?p=21001"},"modified":"2026-03-09T13:10:22","modified_gmt":"2026-03-09T11:10:22","slug":"anons-vebinaru-cisco-secure-access-nova-era-bezpechnogo-dostupu-12-03-2026","status":"publish","type":"post","link":"https:\/\/muk.training\/ru\/anons-vebinaru-cisco-secure-access-nova-era-bezpechnogo-dostupu-12-03-2026\/","title":{"rendered":"\u0410\u043d\u043e\u043d\u0441 \u0432\u0435\u0431\u0456\u043d\u0430\u0440\u0443: Cisco Secure Access. \u041d\u043e\u0432\u0430 \u0435\u0440\u0430 \u0431\u0435\u0437\u043f\u0435\u0447\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0443 | 12.03.2026"},"content":{"rendered":"<p>\u0413\u0440\u0443\u043f\u0430 \u043a\u043e\u043c\u043f\u0430\u043d\u0456\u0439 MUK \u0442\u0430 Cisco \u0437\u0430\u043f\u0440\u043e\u0448\u0443\u044e\u0442\u044c \u0432\u0430\u0441 \u043d\u0430 \u0432\u0435\u0431\u0456\u043d\u0430\u0440:<\/p>\n<p><strong>Cisco Secure Access<\/strong><\/p>\n<p>\u041d\u043e\u0432\u0430 \u0435\u0440\u0430 \u0431\u0435\u0437\u043f\u0435\u0447\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0443<\/p>\n<ul>\n<li>\u0434\u0430\u0442\u0430 &#8212; <strong>12.03.2026<\/strong> (\u0447\u0435\u0442\u0432\u0435\u0440)<\/li>\n<li>\u043f\u043e\u0447\u0430\u0442\u043e\u043a &#8212; 10:00<\/li>\n<li>\u043c\u0456\u0441\u0446\u0435 &#8212; Cisco Webex<\/li>\n<li>\u043c\u043e\u0432\u0430 &#8212; \u0443\u043a\u0440\u0430\u0457\u043d\u0441\u044c\u043a\u0430<\/li>\n<\/ul>\n<p>\u0420\u0435\u0454\u0441\u0442\u0440\u0430\u0446\u0456\u044f \u0437\u0430 \u043f\u043e\u0441\u0438\u043b\u0430\u043d\u043d\u044f\u043c: <a href=\"https:\/\/bit.ly\/4aVpQjz\">https:\/\/bit.ly\/4aVpQjz<\/a><\/p>\n<p>\u041d\u0430 \u0432\u0435\u0431\u0456\u043d\u0430\u0440\u0456 \u0432\u0438 \u0434\u0456\u0437\u043d\u0430\u0454\u0442\u0435\u0441\u044c:<\/p>\n<ul>\n<li>\u044f\u043a \u0437\u0430\u043c\u0456\u043d\u0438\u0442\u0438 \u0441\u043a\u043b\u0430\u0434\u043d\u0456 <strong>VPN<\/strong> \u043e\u0434\u043d\u0438\u043c \u043a\u043b\u0456\u043a\u043e\u043c \u0434\u043b\u044f \u043a\u043e\u0440\u0438\u0441\u0442\u0443\u0432\u0430\u0447\u0430<\/li>\n<li>\u044f\u043a \u0440\u0435\u0430\u043b\u0456\u0437\u0443\u0432\u0430\u0442\u0438 <strong>Zero Trust<\/strong>, \u0449\u043e\u0431 \u0437\u043b\u043e\u0432\u043c\u0438\u0441\u043d\u0438\u043a\u0438 \u043d\u0435 \u043c\u0430\u043b\u0438 \u0448\u0430\u043d\u0441\u0456\u0432 \u0443 \u0432\u0430\u0448\u0456\u0439 \u043c\u0435\u0440\u0435\u0436\u0456<\/li>\n<li>\u044f\u043a \u043a\u0435\u0440\u0443\u0432\u0430\u0442\u0438 \u0431\u0435\u0437\u043f\u0435\u043a\u043e\u044e \u0445\u043c\u0430\u0440\u043d\u0438\u0445 \u0441\u0435\u0440\u0432\u0456\u0441\u0456\u0432 \u0442\u0430 \u0456\u043d\u0442\u0435\u0440\u043d\u0435\u0442 <strong>\u0437 \u043e\u0434\u043d\u0456\u0454\u0457 \u043a\u043e\u043d\u0441\u043e\u043b\u0456<\/strong><\/li>\n<li>\u044f\u043a \u0437\u0440\u043e\u0431\u0438\u0442\u0438 <strong>\u043e\u0440\u043a\u0435\u0441\u0442\u0440\u0430\u0446\u0456\u044e \u043f\u043e\u043b\u0456\u0442\u0438\u043a<\/strong> \u0447\u0435\u0440\u0435\u0437 \u0454\u0434\u0438\u043d\u0443 \u0445\u043c\u0430\u0440\u043d\u0443 \u043a\u043e\u043d\u0441\u043e\u043b\u044c<\/li>\n<li>\u0447\u043e\u043c\u0443 \u0432\u0430\u0440\u0442\u043e \u043f\u0435\u0440\u0435\u0445\u043e\u0434\u0438\u0442\u0438 \u043d\u0430 \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u0430\u043d\u043d\u044f <strong>Cisco Secure Access<\/strong><\/li>\n<\/ul>\n<p>\u0423\u0447\u0430\u0441\u0442\u044c \u0431\u0435\u0437\u043a\u043e\u0448\u0442\u043e\u0432\u043d\u0430, \u043d\u0435\u043e\u0431\u0445\u0456\u0434\u043d\u0430 \u043f\u043e\u043f\u0435\u0440\u0435\u0434\u043d\u044f \u0440\u0435\u0454\u0441\u0442\u0440\u0430\u0446\u0456\u044f.<\/p>\n<p>\u0417 \u0443\u0441\u0456\u0445 \u043f\u0438\u0442\u0430\u043d\u044c \u0412\u0438 \u043c\u043e\u0436\u0435\u0442\u0435 \u0437\u0432\u0435\u0440\u0442\u0430\u0442\u0438\u0441\u044f \u0434\u043e \u0441\u043f\u0456\u0432\u0440\u043e\u0431\u0456\u0442\u043d\u0438\u043a\u0456\u0432 \u041d\u0430\u0432\u0447\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0446\u0435\u043d\u0442\u0440\u0443 \u041c\u0423\u041a:<\/p>\n<p>\u0423\u043a\u0440\u0430\u0457\u043d\u0430: +380 (44) 492 29 29<\/p>\n<p><a href=\"mailto:info@muk.training\">info@muk.training<\/a><br \/>\n\u0420\u0435\u0454\u0441\u0442\u0440\u0443\u0439\u0442\u0435\u0441\u044c \u043f\u0440\u044f\u043c\u043e \u0437\u0430\u0440\u0430\u0437!<\/p>\n<p>\u0411\u0443\u0434\u044c\u0442\u0435 \u0432 \u043a\u0443\u0440\u0441\u0456 \u043e\u0441\u0442\u0430\u043d\u043d\u0456\u0445 \u043f\u043e\u0434\u0456\u0439 \u0456 \u0434\u043e \u0437\u0443\u0441\u0442\u0440\u0456\u0447\u0456 \u043e\u043d\u043b\u0430\u0439\u043d!<\/p>\n<p>\u0411\u0430\u0436\u0430\u0454\u0442\u0435 \u043e\u0442\u0440\u0438\u043c\u0430\u0442\u0438 \u043a\u043e\u043d\u0441\u0443\u043b\u044c\u0442\u0430\u0446\u0456\u044e, \u0437\u0432\u0435\u0440\u0442\u0430\u0439\u0442\u0435\u0441\u044c \u0434\u043e \u0432\u0456\u0434\u0434\u0456\u043b\u0443 Cisco at MUK Group <a href=\"mailto:info@muk.group\">info@muk.group<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>\u0413\u0440\u0443\u043f\u0430 \u043a\u043e\u043c\u043f\u0430\u043d\u0456\u0439 MUK \u0442\u0430 Cisco \u0437\u0430\u043f\u0440\u043e\u0448\u0443\u044e\u0442\u044c \u0432\u0430\u0441 \u043d\u0430 \u0432\u0435\u0431\u0456\u043d\u0430\u0440: Cisco Secure Access \u041d\u043e\u0432\u0430 \u0435\u0440\u0430 \u0431\u0435\u0437\u043f\u0435\u0447\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0443 \u0434\u0430\u0442\u0430 &#8212; 12.03.2026 (\u0447\u0435\u0442\u0432\u0435\u0440) \u043f\u043e\u0447\u0430\u0442\u043e\u043a &#8212; 10:00 \u043c\u0456\u0441\u0446\u0435 &#8212; Cisco Webex \u043c\u043e\u0432\u0430 &#8212; \u0443\u043a\u0440\u0430\u0457\u043d\u0441\u044c\u043a\u0430 \u0420\u0435\u0454\u0441\u0442\u0440\u0430\u0446\u0456\u044f \u0437\u0430 \u043f\u043e\u0441\u0438\u043b\u0430\u043d\u043d\u044f\u043c: https:\/\/bit.ly\/4aVpQjz \u041d\u0430 \u0432\u0435\u0431\u0456\u043d\u0430\u0440\u0456 \u0432\u0438 \u0434\u0456\u0437\u043d\u0430\u0454\u0442\u0435\u0441\u044c: \u044f\u043a \u0437\u0430\u043c\u0456\u043d\u0438\u0442\u0438 \u0441\u043a\u043b\u0430\u0434\u043d\u0456 VPN \u043e\u0434\u043d\u0438\u043c \u043a\u043b\u0456\u043a\u043e\u043c \u0434\u043b\u044f \u043a\u043e\u0440\u0438\u0441\u0442\u0443\u0432\u0430\u0447\u0430 \u044f\u043a \u0440\u0435\u0430\u043b\u0456\u0437\u0443\u0432\u0430\u0442\u0438 Zero Trust, \u0449\u043e\u0431 \u0437\u043b\u043e\u0432\u043c\u0438\u0441\u043d\u0438\u043a\u0438 \u043d\u0435 \u043c\u0430\u043b\u0438 \u0448\u0430\u043d\u0441\u0456\u0432 [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,323],"tags":[136,139,539,560],"toolset-meta":{"kursy-daty-provedeniya":[]},"_links":{"self":[{"href":"https:\/\/muk.training\/ru\/wp-json\/wp\/v2\/posts\/21001"}],"collection":[{"href":"https:\/\/muk.training\/ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/muk.training\/ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/muk.training\/ru\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/muk.training\/ru\/wp-json\/wp\/v2\/comments?post=21001"}],"version-history":[{"count":2,"href":"https:\/\/muk.training\/ru\/wp-json\/wp\/v2\/posts\/21001\/revisions"}],"predecessor-version":[{"id":21004,"href":"https:\/\/muk.training\/ru\/wp-json\/wp\/v2\/posts\/21001\/revisions\/21004"}],"wp:attachment":[{"href":"https:\/\/muk.training\/ru\/wp-json\/wp\/v2\/media?parent=21001"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/muk.training\/ru\/wp-json\/wp\/v2\/categories?post=21001"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/muk.training\/ru\/wp-json\/wp\/v2\/tags?post=21001"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}