Categories

There are currently no items in your shopping cart.

User Panel

Forgot your password?.

Cisco CCNP Security: SENSS, SIMOS, SISAS, SITCS



Cisco CCNP Security: SENSS


Cisco Secure Design Principles
    Course Overview
    Network Security Zoning
    Cisco Module Network Security Architecture
    Cisco SecureX Architecture and Cisco TrustSec Solution

Deploying Cisco Network Infrastructure Protection Solutions
    Intro Cisco Network Infrastructure Architecture and Deploying Cisco IOS Control Plane Security Controls, Cisco IOS

Management Plane Security Controls
    Deploying Cisco ASA Management Plane Security Controls
    Configuring Cisco Traffic Telemetry Methods
    Deploying Cisco IOS Layer 2 and Layer 3 Data Plane Security Controls

Deploying NAT on Cisco IOS and Cisco Adaptive Security Appliance (ASA) Firewalls
    Introducing Network Address Translation
    Deploying Cisco ASA Network Address Translation
    Deploying Cisco IOS Software Network Address Translation

Deploying Threat Controls on Cisco ASA Firewalls
    Introducing Cisco Threat Controls
    Deploying Cisco ASA Basic Access Policies
    Deploying Cisco ASA Application Inspection Policies
    Deploying Cisco ASA Botnet Traffic Filtering
    Deploying Cisco ASA Identity Based Firewall

Deploying Threat Controls on Cisco IOS Software
    Deploying Cisco IOS Software with Basic Zone-Based Firewall Policy
    Deploying Cisco IOS Software ZBFW with Application Inspection Policies

 

Cisco CCNP Security: SIMOS

Fundamentals of VPN Technologies and Cryptography
    VPN Definition
    Key Threats to WANs and Remote Access
    Cisco Modular Network Architecture and VPNs
    VPN Types
    VPN Components
    Secure Communication and Cryptographic Services
    Cryptographic Algorithms
    Cryptography and Confidentiality
    Cryptography and Integrity
    Cryptography and Authentication
    Cryptography and Nonrepudiation
    Keys in Cryptography
    Public Key Infrastructure
    Next-Generation Encryption
    Dependencies in Cryptographic Services
    Cryptographic Controls Guidelines

Deploying Secure Site-to-Site Connectivity Solutions
    Site-to-Site VPN Topologies
    Site-to-Site VPN Technologies
    IPsec VPN Overview
    Internet Key Exchange v1 and v2
    Encapsulating Security Payload
    IPsec Virtual Tunnel Interface
    Dynamic Multipoint VPN
    Cisco IOS FlexVPN
    Overview of Point-to-Point IPsec VPNs on the Cisco ASA
    Configuration Tasks for Basic Point-to-Point Tunnels on the Cisco ASA
    Enable IKE on an Interface
    Configure IKE Policy
    Configure PSKs
    Choose Transform Set and VPN Peer
    Choose Traffic for VPN
    Configuring Site-to-Site VPN with Connection Profiles Menu
    Verify and Troubleshoot Basic Point-to-Point Tunnels on the Cisco ASA
    Overview of Cisco IOS VTIs
    Configure Static VTI Point-to-Point Tunnels
    Verify Static VTI Point-to-Point Tunnels
    Configure Dynamic VTI Point-to-Point Tunnels
    Verify Dynamic VTI Point-to-Point Tunnels
    Overview of Cisco IOS DMVPN
    DMVPN Solution Components
    GRE
    NHRP
    DMVPN Operations
    Types of Authentication
    Configure DMVPN on Hub
    Configure DMVPN on Spoke
    Configure Routing in DMVPN
    Verify DMVPN

Deploying Cisco IOS Site-to-Site FlexVPN Solutions
    FlexVPN Overview
    Public Key Infrastructure (PKI)
    Site-to-Site VPN Topologies
    FlexVPN Architecture
    FlexVPN Configuration Overview
    FlexVPN Capabilities
    IKEv2 vs. IKEv1 Overview
    IKEv2 Message Exchange
    IKEv2 DoS Prevention
    IKEv1 and IKEv2 Comparison
    FlexVPN Use Cases
    Point-to-Point FlexVPN
    FlexVPN Configuration Blocks
    IKEv2 Profile
    Smart Defaults
    Manipulating Default Values
    Negotiating IKEv2 Proposals
    Point-to-Point VPN Scenario with IPv4 Static Routes
    Configure and Verify Point-to-Point VPN with IPv4 Static Routes
    Point-to-Point VPN Scenario with OSPFv3
    Configure and Verify Point-to-Point VPN with OSPFv3
    Enroll Devices to ECDSA PKI
    Configure Router for ECDSA
    Configure ASA for ECDSA
    Verify EC Key Pairs and Certificates
    Verify IKEv2 SA
    Verify IPsec SA
    Verify Point-to-Point FlexVPN
    Cisco IOS FlexVPN
    IKEv2 Configuration Payload
    Locally Managed Hub-and-Spoke Scenario
    Configure a Spoke in a Hub-and-Spoke Scenario
    Configure a Hub in a Hub-and-Spoke Scenario
    Configuration Exchange
    Verify and Troubleshoot Hub-and-Spoke FlexVPN
    Spoke-to-Spoke Shortcut Scenario
    NHRP in FlexVPN
    Configure and Verify a Spoke in a Spoke-to-Spoke Shortcut Scenario
    Configure and Verify a Hub in a Spoke-to-Spoke Shortcut Scenario
    RADIUS-Managed FlexVPN Scenario
    Verify Spoke-to-Spoke Shortcut Switching
    Troubleshoot Spoke-to-Spoke Shortcut Switching

Deploying Client-less SSL VPN -Deploying AnyConnect VPN for Remote Access
    SSL VPN Components
    SSL/TLS
    Overview of group policies and connection profiles
    Basic Cisco Clientless SSL VPN
    Solution Components
    Configure ASA gateway
    Configure basic authentication
    Configure access control
    Verify basic clientless SSL VPN
    Troubleshoot basic clientless SSL VPN
    Deploying Application Access options (plug-ins, smart tunnels)
    Configure and verify plugins
    Configure and verify smart tunnels
    Troubleshoot plugins and smart tunnel
    Advanced Authentication in Cisco Clientless SSL VPN Solution Components
    Configure and verify Certificate based Authentication
    Configure and Verify External Authentication
    Troubleshoot Advanced Authentication in Clientless SSL VPN

Deploying Endpoint Security and Dynamic Access Policies
    IP Address assignment
    Split Tunneling
    Basic Cisco AnyConnect SSL VPN
    Solution Components
    SSL VPN Server Authentication
    SSL VPN Clients Authentication
    SSL VPN Clients IP Address Assignment
    SSL VPN Split Tunneling
    Configure ASA for Basic AnyConnect SSL VPN
    Configure Basic Cisco Authentication
    Configure Access Control
    Verify and Troubleshoot Basic Cisco AnyConnect SSL VPN
    DTLS Overview
    Parallel DTLS and TLS Tunnels
    Configure DTLS
    Verify DTLS
    Cisco AnyConnect Client Configuration Management
    Cisco AnyConnect Client Operating System Integration Options
    Cisco AnyConnect Start Before Logon
    Cisco AnyConnect Trusted Network Detection
    Configure, Verify, and Troubleshoot Cisco AnyConnect Start Before Logon and Cisco AnyConnect Trusted Network Detection
    AnyConnect Support for IPSec/IKEv2
    Configure a Cisco AnyConnect IPsec/IKEv2 VPNs on a Cisco ASA Adaptive Security Appliance
    Verify and Troubleshoot Cisco AnyConnect IPsec/IKEv2 VPNs on Cisco ASA
    Cisco AnyConnect Advanced Authentication Scenarios
    External Authentication
    Certificate-Based Server Authentication
    Configure and Verify Certificate-Based Client Authentication
    SCEP Proxy Overview
    SCEP Proxy Connection Flow
    SCEP Proxy Configuration Procedure
    Configure SCEP Proxy
    Verify SCEP Proxy
    Local Authorization Overview
    Local Authorization Scenario
    Local Authorization Configuration Procedure
    Configure Local Authorization
    External Authentication and Authorization Scenario
    Configure External Authentication and Authorization
    Troubleshoot Advanced Authentication and Authorization in Cisco AnyConnect VPNs
    Accounting

Endpoint Security and Dynamic Access Policies
    Cisco HostScan Overview
    Cisco HostScan Prelogin Assessment
    Install Cisco HostScan
    Configure Prelogin Criteria and Prelogin Policy
    Configure Host Scan Endpoint Assessment
    Configure Host Scan Advanced Endpoint Assessment
    DAP Overview
    Integrating DAP with Host Scan
    Configuring DAP
    Verifying and Troubleshooting DAP

 

Cisco CCNP Security: SITCS

Cisco ASA (CX) NGFW
    Describing the Cisco (CX) NGFW Services within the Cisco Modular Network Architecture
    Describing the Cisco ASA (CX) NGFW Management Architecture
    Configuring Cisco ASA (CX) NGFW Policy Objects
    Monitoring Cisco ASA (CX) NGFW Operations
    Configuring Cisco ASA (CX) NGFW Access Policies
    Configuring Cisco ASA (CX) NGFW Identity Policies
    Configuring Cisco ASA (CX) NGFW Decryption Policies

Cisco Web Security Appliance
    Describing the Cisco Web Security Appliance Solutions
    Integrating the Cisco Web Security Appliance
    Configuring Cisco Web Security Appliance Identities and User Authentication Controls
    Configuring Cisco Web Security Appliance Acceptable Use Controls
    Configuring Cisco Web Security Appliance Anti-Malware Controls
    Configuring Cisco Web Security Appliance Decryption Configuring Cisco Web Security Appliance Data Security Controls

Cisco Cloud Web Security
    Describing the Cisco Cloud Web Security Solutions
    Configuring Cisco Cloud Web Security Connectors
    Describing the Web Filtering Policy in Cisco ScanCenter

Cisco Email Security Appliance
    Describing the Cisco Email Security Solutions
    Describing the Cisco Email Security Appliance Basic Configuration Concepts
    Configuring Cisco Email Security Appliance Incoming and Outgoing Mail Policies
    Describing IPS Threat Controls

Cisco Intrusion Prevention System
    Integrating Cisco IPS Sensor into a Network
    Configuring Basic Cisco IPS Settings
    Tuning Cisco IPS Signatures
    Configuring Custom Cisco IPS Signatures
    Configuring Cisco IPS Anomaly-Detection
    Configuring Cisco IPS Reputation-Based Features

 

Cisco CCNP Security: SISAS

Threat Mitigation through Identity Services
    Identity Services
    802.1X and EAP
    Configure 802.1X Components

Cisco ISE Fundamentals
    Describe Cisco ISE Features and configure the fundamentals
    Cisco ISE with PKI
    Cisco ISE Authentication
    Cisco ISE with External Authentication

Advance Access Control
    Certificate Based User Authentication
    Authorization
    Cisco TrustSec

Web Authentication and Guest Access
    Web Authentication
    Guest Access Services

Endpoint Access Control
    Posture
    Profiler
    BYOD

Troubleshooting Network Access Control
    Troubleshooting ISE

 

You Have Got Gift 25% OFF

Use this Coupon Code “J3JKN396