IT易学网-IT在线教育交易平台

IT易学网 > 面授 > CCIE-Sec

  • 课程简介
  • 讲师介绍
  • 累积评价(0)
  • 该老师还开设以下课程
  • 安全(Security)
    适合群体:从零基础开始,一直到通过安全CCIE.希望将来从事网络安全相关工作。
    学习过程:CCNA+CCNP+CCSP+CCIE。

    学习周期:6~8个月左右。

    CCIE Security Lab Exam version 4.0

    Exam Description: The Cisco CCIE? Security Lab Exam version 4.0 is an 8-hour practical hands-on exam that tests the skills and competencies of security professionals in terms of configuring and

    troubleshooting Cisco security products and solutions.

    Candidates may be required to perform implementation, optimization and troubleshooting actions in each of the exam topic sections. Content may include both IPv4 and IPv6 concepts and applications.

    The following topics are general guidelines for the content likely to be included on the exam. However,other related topics may also appear on any specific delivery of the exam. In order to better reflect the

    contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

    1.0 System Hardening and Availability

    1.1 Routing plane security features (for example, protocol authentication and route filtering)

    1.2 Control Plane Policing

    1.3 Control plane protection and management plane protection

    1.4 Broadcast control and switch port security

    1.5 Additional CPU protection mechanisms (for example, options drop and logging interval)

    1.6 Disable unnecessary services

    1.7 Control device access (for example, Telnet, HTTP, SSH, and privilege levels)

    1.8 Device services (for example, SNMP, syslog, and NTP)

    1.9 Transit traffic control and congestion management

    2.0 Threat Identification and Mitigation

    2.1 Identify and protect against fragmentation attacks

    2.2 Identify and protect against malicious IP option usage

    2.3 Identify and protect against network reconnaissance attacks

    2.4 Identify and protect against IP spoofing attacks

    2.5 Identify and protect against MAC spoofing attacks

    2.6 Identify and protect against ARP spoofing attacks

    2.7 Identify and protect against DoS attacks

    2.8 Identify and protect against DDoS attacks

    2.9 Identify and protect against man-in-the-middle attacks

    2.10 Identify and protect against port redirection attacks

    2.11 Identify and protect against DHCP attacks

    2.12 Identify and protect against DNS attacks

    2.13 Identify and protect against MAC flooding attacks

    2.14 Identify and protect against VLAN hopping attacks

    2.15 Identify and protect against various Layer 2 and Layer 3 attacks

    2.16 NBAR2013 Cisco Systems, Inc. This document is Cisco Public. Page 2

    2.17 NetFlow

    2.18 Capture and utilize packet captures

    3.0 Intrusion Prevention and Content Security

    3.1 Cisco IPS 4200 Series Sensor appliance and Cisco ASA appliance IPS module

    3.1.a Initialize the sensor appliance

    3.1.b Sensor appliance management

    3.1.c Virtual sensors on the sensor appliance

    3.1.d Implement security policies

    3.1.e Promiscuous and inline monitoring on the sensor appliance

    3.1.f Tune signatures on the sensor appliance

    3.1.g Custom signatures on the sensor appliance

    3.1.h Actions on the sensor appliance

    3.1.i Signature engines on the sensor appliance

    3.1.j Use Cisco IDM and Cisco IME to manage the sensor appliance

    3.1.k Event action overrides and filters on the sensor appliance

    3.1.l Event monitoring on the sensor appliance

    3.2 VACL, SPAN and RSPAN on Cisco switches

    3.3 Cisco WSA

    3.3.a Implement WCCP

    3.3.b Active Directory integration

    3.3.c Custom categories

    3.3.d HTTPS configuration

    3.3.e Services configuration (web reputation)

    3.3.f Configure proxy bypass lists

    3.3.g Web proxy modes

    3.3.h Application visibility and control

    4.0 Identity Management

    4.1 Identity-based AAA

    4.1.a Cisco router and appliance AAA

    4.1.b RADIUS

    4.1.c TACACS+

    4.2 Device administration (Cisco IOS routers, Cisco ASA, and Cisco ACS5.x)

    4.3 Network access (TrustSec model)

    4.3.a Authorization results for network access (ISE)

    4.3.b IEEE 802.1X (Cisco ISE)

    4.3.c VSAs (Cisco ASA, Cisco IOS, and Cisco ISE)

    4.3.d Proxy authentication (Cisco ISE, Cisco ASA, and Cisco IOS)

    4.4 Cisco ISE

    4.4.a Profiling configuration (probes)

    4.4.b Guest services

    4.4.c Posture assessment2013 Cisco Systems, Inc. This document is Cisco Public. Page 3

    4.4.d Client provisioning (CPP)

    4.4.e Configure Microsoft Active Directory integration and identity sources

    5.0 Perimeter Security and Services

    5.1 Cisco ASA firewalls

    5.1.a Basic firewall Initialization

    5.1.b Device management

    5.1.c Address translation

    5.1.d ACLs

    5.1.e IP routing and route tracking

    5.1.f Object groups

    5.1.g VLANs

    5.1.h Configure EtherChannel

    5.1.i High availability and redundancy

    5.1.j Layer 2 transparent firewall

    5.1.k Security contexts (virtual firewall)

    5.1.l Cisco Modular Policy Framework

    5.1.j Identity firewall services

    5.1.k Configure Cisco ASA with ASDM

    5.1.l Context-aware services

    5.1.m IPS capabilities

    5.1.n QoS capabilities

    5.2 Cisco IOS zone-based firewall

    5.2.a Network, secure group, and user-based policy

    5.2.b Performance tuning

    5.2.c Network, protocol, and application inspection

    5.3 Perimeter security services

    5.3.a Cisco IOS QoS and packet-marking techniques

    5.3.b Traffic filtering using access lists

    5.3.c Cisco IOS NAT

    5.3.d uRPF

    5.3.e Port to Application Mapping (PAM)

    5.3.f Policy routing and route maps

    6.0 Confidentiality and Secure Access

    6.1 IKE (v1/v2)

    6.2 IPsec LAN-to-LAN (Cisco IOS and Cisco ASA)

    6.3 DMVPN

    6.4 FlexVPN

    6.5 GET VPN

    6.6 Remote-access VPN 2013 Cisco Systems, Inc. This document is Cisco Public. Page 4

    6.6.a Cisco EasyVPN Server (Cisco IOS and Cisco ASA)

    6.6.b VPN Client 5.X

    6.6.c Clientless WebVPN

    6.6.d Cisco AnyConnect VPN

    6.6.e Cisco EasyVPN Remote

    6.6.f SSL VPN gateway

    6.7 VPN high availability

    6.8 QoS for VPN

    6.9 VRF-aware VPN

    6.10 MACsec

    6.11 Digital certificates (enrollment and policy matching)

    6.12 Wireless access

    6.12.a EAP methods

    6.12.b WPA and WPA2

    6.12.c wIPS

  • 罗老师

    能够熟练操作Cisco、CCIE-RS、CCIE-SP、CCIE-Sec、CCIE-Coll、CCIE-DC、CCIE-Wireless

    等等设计办公软件。熟悉印刷各个工艺流程。  

    本人态度良好,为人和睦,热情积极向上、在工作上积极进取,努力探讨!同时在业余时间参加社会时间丰富自己的业余知识,提高自我的综合素质和身体素质。

    本人为人随和,真诚友善。

  • 累积评价:0条

    与描述相符 0.0
    0.0
  • < > 共0页
    • 广州CCNA-SEC 周末班 思科 0人在线 查看详情
    • 广州CCNP-SEC 周末班 思科 0人在线 查看详情
    • 广州CCIE-Sec认证培训课程 定制班 CCIE-Sec 90人在线 查看详情
    • 广州CCIE-SP认证培训课程 CCIE-SP 101人在线 查看详情
    • 广州CCIE-SP认证直通车培训课程 脱产班 CCIE-SP 120人在线 查看详情
    • 广州CCIE-SP认证培训课程 周末班 CCIE-SP 160人在线 查看详情

———— 相关面授课程 ————

广州CCIE-Sec认证培训课程 定制班¥28000.00

杭州CCIE-sec认证培训课程 脱产班¥9800.00

杭州CCIE安全培训课程 周末班¥9800.00

昆明CCIE-Sec认证培训课程 周末班¥28000.00

昆明CCIE-Sec认证培训课程 脱产班¥28000.00

更多>>
立即注册 认证讲师 在线咨询 ×