CCIE Security

CISCO Courses

Course Features

 
Duration
30 Days
 
Faculty
CCIE certified, also available after course completion on request with prior appointment
 
Equipment
Two Dedicated fully loaded CISCO Racks
 
Author
Keith Barker
Scott Morris
 
Courseware
From Cisco Press
 
Practice Time
Unlimited & Even at night (subject to availability of Lab & Racks)

CCIE Security Lab Exam Topics v4.0

The following topics are general guidelines for the content likely to be included on the lab exam. However, other related topics may also appear on any specific delivery of the exam. In order to reflect better the contents of the exam and for clarity purposes, the exam topics may change at any time without notice.

Candidates may be required to perform implementation, optimization and troubleshooting actions in each of the exam topics sections and should also be comfortable with both IPv4 and IPv6 concepts and application.

CCIE Security Lab Exam Topics v4.0

  • System Hardening and Availability
  • Routing plane security features (e.g. protocol authentication, route filtering)
  • Control Plane Policing
  • Control Plane Protection and Management Plane Protection
  • Broadcast control and switchport security
  • Additional CPU protection mechanisms (e.g. options drop, logging interval)
  • Disable unnecessary services
  • Control device access (e.g. Telnet, HTTP, SSH, Privilege levels)
  • Device services (e.g. SNMP, Syslog, NTP)
  • Transit Traffic Control and Congestion Management
  • Threat Identification and Mitigation
  • Identify and protect against fragmentation attacks
  • Identify and protect against malicious IP option usage
  • Identify and protect against network reconnaissance attacks
  • Identify and protect against IP spoofing attacks
  • Identify and protect against MAC spoofing attacks
  • Identify and protect against ARP spoofing attacks
  • Identify and protect against Denial of Service (DoS) attacks
  • Identify and protect against Distributed Denial of Service (DDoS) attacks
  • Identify and protect against Man-in-the-Middle (MiM) attacks
  • Identify and protect against port redirection attacks
  • Identify and protect against DHCP attacks
  • Identify and protect against DNS attacks
  • Identify and protect against MAC Flooding attacks
  • Identify and protect against VLAN hopping attacks
  • Identify and protect against various Layer2 and Layer3 attacks
  • NBAR
  • NetFlow
  • Capture and utilize packet captures

Intrusion Prevention and Content Security

IPS 4200 Series Sensor Appliance

  • Initialize the Sensor Appliance
  • Sensor Appliance management
  • Virtual Sensors on the Sensor Appliance
  • Implementing security policies
  • Promiscuous and inline monitoring on the Sensor Appliance
  • Tune signatures on the Sensor Appliance
  • Custom signatures on the Sensor Appliance
  • Actions on the Sensor Appliance
  • Signature engines on the Sensor Appliance
  • Use IDM/IME to the Sensor Appliance
  • Event action overrides/filters on the Sensor Appliance
  • Event monitoring on the Sensor Appliance

VACL/SPAN & RSPAN on Cisco switches

WSA

  • Implementing WCCP
  • Active Dir Integration
  • Custom Categories
  • HTTPS Config
  • Services Configuration (Web Reputation)
  • Configuring Proxy By-pass Lists
  • Web proxy modes
  • App visibility and control

Identity Management

Identity Based Authentication/Authorization/Accounting

  • Cisco Router/Appliance AAA
  • RADIUS
  • TACACS+

Device Admin (Cisco IOS Routers, ASA, ACS5.x)

Network Access (TrustSec Model)

  • Authorization Results for Network Access (ISE)
  • 802.1X (ISE)
  • VSAs (ASA / Cisco IOS / ISE)
  • Proxy-Authentication (ISE/ASA/Cisco IOS)

Cisco Identity Services Engine (ISE)

  • Profiling Configuration (Probes)
  • Guest Services
  • Posture Assessment
  • Client Provisioning (CPP)
  • Configuring AD Integration/Identity Sources

Perimeter Security and Services

Cisco ASA Firewall

  • Basic firewall Initialization
  • Device management
  • Address translation (nat, global, static)
  • Access Control Lists
  • IP routing/Route Tracking
  • Object groups
  • VLANs
  • Configuring Etherchannel
  • High Availability and Redundancy
  • Layer 2 Transparent Firewall
  • Security contexts (virtual firewall)
  • Modular Policy Framework
  • Identity Firewall Services
  • Configuring ASA with ASDM
  • Context-aware services
  • IPS capabilities
  • QoS capabilities

Cisco IOS Zone Based Firewall

  • Network, Secure Group and User Based Policy
  • Performance Tuning
  • Network, Protocol and Application Inspection

Perimeter Security Services

  • Cisco IOS QoS and Packet marking techniques
  • Traffic Filtering using Access-Lists
  • Cisco IOS NAT
  • uRPF
  • PAM – Port to Application Mapping
  • Policy Routing and Route Maps

Confidentiality and Secure Access

  • IKE (V1/V2)
  • IPsec LAN-to-LAN (Cisco IOS/ASA)
  • Dynamic Multipoint VPN (DMVPN)
  • FlexVPN
  • Group Encrypted Transport (GET) VPN
  • Remote Access VPN
  • Easy VPN Server (Cisco IOS/ASA)
  • VPN Client 5.X
  • Clientless WebVPN
  • AnyConnect VPN
  • EasyVPN Remote
  • SSL VPN Gateway
  • VPN High Availability
  • QoS for VPN
  • VRF-aware VPN
  • MacSec
  • Digital Certificates (Enrollment and Policy Matching)
  • Wireless Access
  • EAP methods
  • WPA/WPA-2
  • WIPS

For questions regarding Course registration and schedules, please call Customer Service at +91 9664443555 / 2555

CSS3 Social Sliding Left Menu with Fullscreen