0% found this document useful (0 votes)
5 views

CCIE-Security-Course-Content

NETminion

Uploaded by

fovij45881
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

CCIE-Security-Course-Content

NETminion

Uploaded by

fovij45881
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Join the CCIE Security Training and take your security

skills to the next level in today's ever-evolving digital


landscape
The CCIE Security Training is an advanced and comprehensive program designed to
equip networking professionals with the knowledge, skills, and expertise required to
excel in designing, implementing, managing, and troubleshooting complex security
solutions within modern IT infrastructures. This training is tailored for individuals
aiming to achieve the Cisco Certified Internetwork Expert (CCIE) Security
certification, which is globally recognized as a pinnacle achievement in the field of
network security.

Describing Common TCP/IP Attacks


➢ Introduction
➢ Legacy TCP/IP Vulnerabilities
➢ IP Vulnerabilities
➢ ICMP Vulnerabilities
➢ TCP Vulnerabilities
➢ UDP Vulnerabilities

Describing Common Network Application Attacks


➢ Introduction
➢ Password Attacks
➢ DNS-Based Attacks
➢ DNS Tunneling
➢ Web-Based Attacks
➢ HTTP 302 Cushioning
➢ Command Injections

Copyright ©Netminion Solutions


All rights reserved. This work is protected under copyright laws and international treaties. No part
of this document may be reproduced, stored in a retrieval system, or transmitted in any form or
by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior
written permission of the copyright owner.
Introduction
➢ Defense-in-Depth Strategy
➢ Defending Across the Attack Continuum
➢ Network Segmentation and Virtualization Overview
➢ Stateful Firewall Overview
➢ Security Intelligence Overview
➢ Threat Information Standardization
➢ Network-Based Malware Protection Overview
➢ IPS Overview
➢ Next Generation Firewall Overview
➢ Email Content Security Overview
➢ Web Content Security Overview
➢ Threat Analytic Systems Overview
➢ DNS Security Overview
➢ Authentication, Authorization, and Accounting Overview
➢ Identity and Access Management Overview
➢ Virtual Private Network Technology Overview

VPNs
➢ Configuring Virtual Private Networks [VPN]
➢ IPSec Overview
➢ LAN-to-LAN IPSec VPNS [with NAT-T & without NAT-T]
➢ GRE, GRE/IPSEC
➢ Static NHRP
➢ Static NHRP with IPSec
➢ Dynamic NHRP
➢ Static-Virtual Tunnel interface [S-VTI]
➢ DMVPN
➢ VPNs using Certificates

Copyright ©Netminion Solutions


All rights reserved. This work is protected under copyright laws and international treaties. No part
of this document may be reproduced, stored in a retrieval system, or transmitted in any form or
by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior
written permission of the copyright owner.
➢ IKEv2 VPNs
➢ Site to Site
➢ GRE
➢ Tunnel based Site-To-Site VPN
➢ Tunnel based Spoke-to-Spoke using NHRP

Deploying ASA Firewall Introduction


➢ ASA Deployment Types
➢ ASA Interface Security Levels
➢ ASA Objects and Object Groups
➢ Network Address Translation
➢ Configure Network Settings and NAT on ASA
➢ ASA Interface ACLs
➢ ASA Global ACLs
➢ ASA Advanced Access Policies
➢ Configure ASA Access Control Policies
➢ Security Contexts
➢ ASA High Availability Overview
➢ Active-Standby Stateless failover
➢ Active-Standby Stateful failover
➢ Active-Active failover

Clustering
➢ Individual Interface Mode
➢ Spanned Mode

Copyright ©Netminion Solutions


All rights reserved. This work is protected under copyright laws and international treaties. No part
of this document may be reproduced, stored in a retrieval system, or transmitted in any form or
by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior
written permission of the copyright owner.
Deploying Firepower Next-Generation Firewall
➢ Introduction
➢ Firepower NGFW Deployments
➢ Firepower NGFW Packet Processing and Policies
➢ Firepower NGFW Objects
➢ Firepower NGFW NAT
➢ Configure Firepower NGFW NAT
➢ Firepower NGFW Prefilter Policies
➢ Firepower NGFW Access Control Policies
➢ Firepower NGFW Security Intelligence
➢ Configure Firepower NGFW Access Control Policy
➢ Firepower NGFW IPS Policies

Deploying Email Content Security


➢ Introduction
➢ Email Content Security Overview
➢ SMTP Overview
➢ Email Pipeline Overview
➢ Mail Policies Overview
➢ Protection Against Spam and Graymail
➢ Configure Mail Policies

Copyright ©Netminion Solutions


All rights reserved. This work is protected under copyright laws and international treaties. No part
of this document may be reproduced, stored in a retrieval system, or transmitted in any form or
by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior
written permission of the copyright owner.
Deploying Web Content Security
➢ Introduction
➢ WSA Overview
➢ Deployment Options
➢ HTTPS Traffic Decryption
➢ Access Policies and Identification Profiles
➢ Anti-Malware Protection

ISE [Identity Service Engine


➢ Identity Management using ISE
➢ Configuring the Switch & ISE
➢ Identity groups and users
➢ Configuring Dot1x authentication with VLAN assignment and DACL
➢ Configuring MAB
➢ Configuring the WLC & ISE [Theory]
➢ Configuring Dot1x authentication with VLAN assignment
➢ Configuring SXP
➢ Identity Management with Identity Service enginer introduction
➢ Device Authentication
➢ Device Exec & Command authorization
➢ Device Accounting

Copyright ©Netminion Solutions


All rights reserved. This work is protected under copyright laws and international treaties. No part
of this document may be reproduced, stored in a retrieval system, or transmitted in any form or
by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior
written permission of the copyright owner.
Software-Defined Networking Concepts Overview of SDA
➢ Components
➢ DNAC & ISE Integration
➢ Configuring DNAC Design, Pools, SNMP, AAA, NTP, DNS
➢ Device discovery in DNAC
➢ Fabric Setup using LAN Automation [Theory]
➢ Introduction the Fabric (Host Onboarding & L3 Handoff) [Theory]
➢ Introduction to the Fusion Router to support Macro Segmentation [Theory]
➢ Introduction to Micro Segmentation using SGTs using ISE [Theory]

Thankyou
Visit Us -
https://www.netminion.net

Copyright ©Netminion Solutions


All rights reserved. This work is protected under copyright laws and international treaties. No part
of this document may be reproduced, stored in a retrieval system, or transmitted in any form or
by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior
written permission of the copyright owner.

You might also like