CCIE Security v6 Learning Matrix
CCIE Security v6 Learning Matrix
. The goal of this learning matrix is to help you attain your goal to become certified by providing study resources tail
. It is intended to be used as a reference, and not to provide a complete list of all resources available. The matrix foc
. These widely available preparation resources can be in the form of specific chapters of books, Cisco Validated Desi
webinars, VoDs, SRNDs, white papers, case studies, design guides, Design TechNotes, reference guides, etc.
Disclaimer
. There is no guarantee that you will be able to pass the exam by only referring to material provided within this matr
. There are a lot of other resources (both internal and external) that cover the same exam topics. You are encourage
. This matrix should be considered a living document and taking into account the sheer amount of possible relevant
. We encourage you to participate and engage with us, so if you have any suggestions for further content or any com
1.5. Pass?
Did you pass? Great! Did you not? Do not despair, do a lessons learned review and update your self-evaluation.
providing study resources tailored to your own needs.
urces available. The matrix focusses primarely on Cisco and Cisco Press content.
of books, Cisco Validated Design documents (CVDs), Cisco Live 365 presentations, courses,
eference guides, etc.
erial provided within this matrix. But it will certainly improve your skills, which will serve as the foundation you need to build up
am topics. You are encouraged to use any other resources at your own discretion during your exam preparation.
r amount of possible relevant content, the objective here is to refine and improve this compilation of resources over time, so p
or further content or any comments regards to the current content, please let us know.
everal options might be provided to prepare to each topic, you might not need all of them.
1.9 Policies and rules for traffic control on Cisco ASA and Cisco FTD
1.10 Routing protocols security on Cisco IOS, Cisco ASA and Cisco
FTD
2.5 VPN high availability using (Cisco ASA VPN clustering, Dual-
Hub DMVPN deployments)
3 Infrastructure Security
3.1 Device hardening techniques and control plane protection
methods
4.5 Guest lifecycle management using ISE and Cisco Wireless LAN
controllers
4.6 BYOD on-boarding and network access flows
4.7 ISE integration with external identity sources
Transparentor RoutedFirewallMode
Multiple Context Mode
Configuration Guides
Configuration Examples
Firepower Management Center Configuration Guide, Version 6.2.3
Cisco IOS XE Security Configuration Guide: Secure Connectivity, Release 2
Firepower Management Center Configuration Guide, Version 6.2.3
IPS Device Deployments and Configuration
Configure FTD Interfaces in Inline-Pair Mode
Cisco Next Generation Firewalls
Cisco Next Generation Firewalls
A Cisco Guide to Defending Against Distributed Denial of Service Attacks
Type of Attacks
Firepower Threat Defense High Availability
Clusteringfor the Firepower Threat Defense
Failoverfor High Availability
Deploy a Cluster for ASA on the Firepower 4100/9300 for Scalability and High Availability
Configuring Active/Active Failover
Cisco ASA 5500 Series Configuration Guide using the CLI, 8.2
Cisco ASA Series CLI Configuration Guide, 9.0
Configuring a Service Policy
Clarify Firepower Threat Defense Access Control Policy Rule Actions
Configuring OSPF
ASA 9.x EIGRP Configuration Example
Routing Overview for FirepowerThreat Defense
Cisco ASA Troubleshooting TechNotes
Firepower NGFW Troubleshooting TechNotes
Configuring Correlation Policies and Rules
Cisco AnyConnect Secure Mobility Client Administrator Guide, Release 4.7
Configuring and Managing a Cisco IOS Certificate Server for PKI Deployment
Cisco FlexVPN Configuration Examples and TechNotes
DMVPN Configuration Examples and TechNotes
LAN-to-LAN IPsec Tunnel Between Two Routers Configuration Example
Configuring MACsec Encryption
https://www.ciscolive.com/c/r/ciscolive/global/on-demand-library.html?search=ftd#/
https://www.ciscolive.com/c/r/ciscolive/global/on-demand-library.html?search=ASA#/
https://www.ciscolive.com/c/r/ciscolive/global/on-demand-library.html?search=ftd#/
https://www.ciscolive.com/c/r/ciscolive/global/on-demand-library.html?search=ASA#/
https://www.ciscolive.com/c/r/ciscolive/global/on-demand-library.html?search=IOS%20XE%20Security%20feature
https://www.ciscolive.com/c/r/ciscolive/global/on-demand-library.html?search=Firepower%20management%20ce
https://www.ciscolive.com/c/r/ciscolive/global/on-demand-library.html?search=NGIPS%20deplpyment#/session/1
https://www.ciscolive.com/global/on-demand-library.html?search=NGFW%20features#/session/15321128667370
https://www.ciscolive.com/global/on-demand-library.html?search=NGFW%20features#/session/15326216666180
https://www.ciscolive.com/global/on-demand-library.html?search=detect%20and%20motigate%20attacks#/
https://www.ciscolive.com/c/r/ciscolive/global/on-demand-library.html?search=ASA%20clustering#/
https://www.ciscolive.com/global/on-demand-library.html?search=ASA%20POLICY%20CONFIGURATION#/session/
https://www.ciscolive.com/global/on-demand-library.html?search=FTD%20deployment#/session/1475057171005
https://www.ciscolive.com/global/on-demand-library.html?search=NGFW%20troubleshooting#/session/14797438
https://www.ciscolive.com/global/on-demand-library.html?search=Anyconnect%20ASA#/session/1454486436582
https://www.ciscolive.com/global/on-demand-library.html?search=anyconnect%20FTD#/session/14750571720150
https://www.ciscolive.com/c/r/ciscolive/global/on-demand-library.html?search=CA%20for%20VPN%20authenticati
https://www.ciscolive.com/global/on-demand-library.html?search=FlexVPN#/session/1437585485178001XrS2
https://www.ciscolive.com/c/r/ciscolive/global/on-demand-library.html?search=dmvpn#/session/1484773617788
https://www.ciscolive.com/c/r/ciscolive/global/on-demand-library.html?search=L2L%20Ipsec%20tunnels#/session
https://www.ciscolive.com/c/r/ciscolive/global/on-demand-library.html?search=MACSEC#/session/142432757355
https://www.ciscolive.com/c/r/ciscolive/global/on-demand-library.html?search=MACSEC#/session/148167480813
https://www.ciscolive.com/c/r/ciscolive/global/on-demand-library.html?search=vpn%20clustering#/session/15326
https://www.ciscolive.com/c/r/ciscolive/global/on-demand-library.html?search=vpn%20clustering#/session/14210
https://www.ciscolive.com/c/r/ciscolive/global/on-demand-library.html?search=TrustSec#/session/142556758554
https://www.ciscolive.com/c/r/ciscolive/global/on-demand-library.html?search=TrustSec#/session/144792079460
https://www.ciscolive.com/c/r/ciscolive/global/on-demand-library.html?search=layer%202%20security#/session/1
https://www.ciscolive.com/global/on-demand-library.html?search=wireless%20security#/session/1454529638041
https://www.ciscolive.com/global/on-demand-library.html?search=NETFLOW#/session/1437585475144001Xuh0
https://www.ciscolive.com/global/on-demand-library.html?search=SNMP#/session/1484334268267001WXxh
https://www.ciscolive.com/global/on-demand-library.html?search=Cisco%20SAFE#/session/14915995881330015G
https://www.ciscolive.com/global/on-demand-library.html?search=Cisco%20SAFE#/session/1499705668081001Pz
https://www.ciscolive.com/global/on-demand-library.html?search=Cisco%20SAFE#/session/1479743847754001ky
https://www.ciscolive.com/global/on-demand-library.html?search=API%20python%20scripts#/session/149029879
https://www.ciscolive.com/global/on-demand-library.html?search=DNAC%20API#/session/1507005077923001FW
https://www.ciscolive.com/c/r/ciscolive/global/on-demand-library.html?search=ise%20deployment#/session/1535
https://www.ciscolive.com/c/r/ciscolive/global/on-demand-library.html?search=GUEST%20LIFE%20CYCLE%20ISE#
https://www.ciscolive.com/c/r/ciscolive/global/on-demand-library.html?search=ISE%20DEVICE%20ACCESS#/sessio
https://www.ciscolive.com/c/r/ciscolive/global/on-demand-library.html?search=GUEST%20LIFE%20CYCLE%20ISE#
https://www.ciscolive.com/c/r/ciscolive/global/on-demand-library.html?search=BYOD%20ise#/session/142108337
https://www.ciscolive.com/c/r/ciscolive/global/on-demand-library.html?search=ise%20intergration%20with%20ex
https://www.ciscolive.com/c/r/ciscolive/global/on-demand-library.html?search=POSTURE%20ISE#/session/153131
https://www.ciscolive.com/c/r/ciscolive/global/on-demand-library.html?search=ISE%20profiling#/session/1535478
https://www.ciscolive.com/c/r/ciscolive/global/on-demand-library.html?search=ise%20mdm#/session/143758548
https://www.ciscolive.com/c/r/ciscolive/global/on-demand-library.html?search=ISE%20certificate%20authenticati
https://www.ciscolive.com/c/r/ciscolive/global/on-demand-library.html?search=ISE%20PID#/session/1447920793
https://www.ciscolive.com/c/r/ciscolive/global/on-demand-library.html?search=DUO#/session/153999807092300
https://www.ciscolive.com/c/r/ciscolive/global/on-demand-library.html?search=DUO#/session/154077350281900
https://www.ciscolive.com/c/r/ciscolive/global/on-demand-library.html?search=DUO#/session/153252299988400
https://www.ciscolive.com/c/r/ciscolive/global/on-demand-library.html?search=ISE%20DUO#/session/154031006
https://www.ciscolive.com/global/on-demand-library.html?search=amP#/session/1467135309779001hMi5
https://www.ciscolive.com/global/on-demand-library.html?search=amP#/session/1473287218891001vJpR
https://www.ciscolive.com/global/on-demand-library.html?search=amP#/session/14479207919620017fyK
https://www.ciscolive.com/global/on-demand-library.html?search=Detect%2C%20analyze%2C%20and%20mitigate
https://www.ciscolive.com/global/on-demand-library.html?search=Detect%2C%20analyze%2C%20and%20mitigate
https://www.ciscolive.com/global/on-demand-library.html?search=Detect%2C%20analyze%2C%20and%20mitigate
https://www.ciscolive.com/global/on-demand-library.html?search=CISCO%20UMBRELLA#/session/148484717554
https://www.ciscolive.com/global/on-demand-library.html?search=Web%20Filtering%20FTD#/session/142108337
https://www.ciscolive.com/global/on-demand-library.html?search=ESA%20features#/session/1467135309929001
https://www.ciscolive.com/global/on-demand-library.html?search=ESA%20features#/session/1447920790630001
https://www.ciscolive.com/global/on-demand-library.html?search=ESA%20features#/session/1535535540932001
https://www.ciscolive.com/global/on-demand-library.html?search=SSL%20Decryption#/session/149982259148400
https://www.ciscolive.com/global/on-demand-library.html?search=SSL%20Decryption%20WSA#/session/1473287
https://www.ciscolive.com/global/on-demand-library.html?search=ETA#/session/BRKSEC-2809
https://www.ciscolive.com/global/on-demand-library.html?search=stealthwatch#/session/1541782655956001Dbb
https://www.ciscolive.com/global/on-demand-library.html?search=CTA#/session/1475057170906001dBG9
https://www.ciscolive.com/global/on-demand-library.html?search=ThreatGrid#/session/15355355409320012HDU
Books Across All Domains
Integrated Security Technologies and Solutions - Volume I: Cisco Security Solutions for Advanced Threat Protection
Integrated Security Technologies and Solutions - Volume II: Cisco Security Solutions for Network Access Control, Se
Cisco ISE for BYOD and Secure Unified Access, 2nd Edition
Cisco Next-Generation Security Solutions: All-in-one Cisco ASA Firepower Services, NGIPS, and AMP
Network Security Technologies and Solutions (CCIE Professional Development Series)