CCIE Security v6 Training

Gain The skills with complex security solutions and earn CCIE Security v6 Certification

Course code: CCIE-Security 

Exam Code: CCIE Security V6

Duration: Variable

This course covers core security technologies, and prepare you for hands-on lab exam that covers security technologies and solutions through the entire network lifecycle, from designing and deploying to operating and optimizing.

Objective
  • This course will help you:

    • Plan, design, deploy, operate, and optimize network security solutions to protect your network.
    • Gain hands-on experience implementing core security technologies and learn best practices using Cisco security solutions
    • Prepare for the CCIE Security v6 LAb Exam and  Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) exam
    • Qualify for professional and expert-level security job roles
Target Audience
  • Security engineer
  • Network engineer
  • Network designer
  • Network administrator
  • Systems engineer
  • Consulting systems engineer
  • Technical solutions architect
  • Network manager
  • Cisco integrators and partners
Outline

1.1 Deployment modes on Cisco ASA and Cisco FTD

1.2 Firewall features on Cisco ASA and Cisco FTD

1.3 Security features on Cisco IOS/IOS-XE

1.4 Cisco Firepower Management Center (FMC) features

1.5 NGIPS deployment modes

1.6 Next Generation Firewall (NGFW) features

1.7 Detect, and mitigate common types of attacks

1.8 Clustering/HA features on Cisco ASA and Cisco FTD

1.9 Policies and rules for traffic control on Cisco ASA and Cisco FTD

1.10 Routing protocols security on Cisco IOS, Cisco ASA and Cisco FTD

1.11 Network connectivity through Cisco ASA and Cisco FTD

1.12 Correlation and remediation rules on Cisco FMC

2.1 AnyConnect client-based remote access VPN technologies on Cisco ASA,

2.2 Cisco IOS CA for VPN authentication

2.3 FlexVPN, DMVPN, and IPsec L2L Tunnels

2.4 Uplink and downlink MACsec (802.1AE)

2.5 VPN high availability using

2.6 Infrastructure segmentation methods

2.7 Micro-segmentation with Cisco TrustSec using SGT and SXP

3.1 Device hardening techniques and control plane protection methods

3.2 Management plane protection techniques

3.3 Data plane protection techniques

3.4 Layer 2 security techniques

3.5 Wireless security technologies

3.6 Monitoring protocols

3.7 Security features to comply with organizational security policies, procedures,

3.8 Cisco SAFE model to validate network security design and to identify threats to different Places in the Network (PINs)

3.9 Interaction with network devices through APIs using basic Python scripts

3.10 Cisco DNAC Northbound APIs use cases

4.1 ISE scalability using multiple nodes and personas.

4.2 Cisco switches and Cisco Wireless LAN Controllers for network access AAA

4.3 Cisco devices for administrative access with ISE

4.4 AAA for network access with 802.1X and MAB using ISE.

4.5 Guest lifecycle management using ISE and Cisco Wireless LAN controllers

4.6 BYOD on-boarding and network access flows

4.7 ISE integration with external identity sources

4.8 Provisioning of AnyConnect with ISE and ASA

4.9 Posture assessment with ISE

4.10 Endpoint profiling using ISE and Cisco network infrastructure including device sensor

4.11 Integration of MDM with ISE

4.12 Certificate-based authentication using ISE

4.13 Authentication methods

4.14 Identity mapping on ASA, ISE, WSA, and FTD

4.15 pxGrid integration between security devices WSA, ISE, and Cisco FMC

4.16 Integration of ISE with multi-factor authentication

4.17 Access control and single sign-on using Cisco DUO security technology

5.1 AMP for networks, AMP for endpoints, and AMP for content security (ESA, and WSA)

5.2 Detect, analyze, and mitigate malware incidents

5.3 Perform packet capture and analysis using Wireshark, tcpdump, SPAN, ERSPAN, and RSPAN

5.4 DNS layer security, intelligent proxy, and user identification using Cisco Umbrella

5.5 Web filtering, user identification, and Application Visibility and Control (AVC) on Cisco FTD and WSA.

5.6 WCCP redirection on Cisco devices

5.7 Email security features

5.8 HTTPS decryption and inspection on Cisco FTD, WSA and Umbrella

5.9 SMA for centralized content security management

5.10 Cisco advanced threat solutions and their integration: Stealthwatch, FMC, AMP,

Cognitive Threat Analytics (CTA), Threat Grid, Encrypted Traffic Analytics (ETA),

WSA, SMA, CTR, and Umbrella

Prerequisites
  • A basic understanding of networking fundamentals.
  • An awareness and understanding of security best practices.
  • An understanding of basic AD DS concepts.
  • Basic knowledge of server hardware.
  • Experience supporting and configuring Windows client operating systems such as Windows 8 or Windows 10.

Additionally, students would benefit from having some previous Windows Server operating system experience, such as experience as a Windows Server systems administrator.

Have questions or need more information?

Please complete the form and let us know what you’re looking for.

* denotes required field

By entering your email address, you agree to receive information by email from Sanisoft Training including newsletters and information about offers and specials. You may unsubscribe at any time.

Alternatively, you may contact us through quicker ways.