Sale!

Cisco CCNP Security 9-day Certification Bootcamp

$4,995.00

 

Clear

By submitting your payment, you agree to our terms and conditions.

Description

CCNP Security 9-Day Boot Camp

Our 9-Day CCNP Security Certification Boot Camp covers security in routers, switches, networking devices and appliances, as well as choosing, deploying, supporting and troubleshooting Firewalls, VPNS, and IDS/IPS solutions in larger networking environments.

These security topics are merged with our award-winning comprehensive exam preparation for the Cisco CCNP Security certification.

This extended hour lab-based program features exclusive options, such as our  designed Evening Exam Review Sessions, and our Exam Pass Guarantee.

Onsite class with testing and vouchers can be purchased for additional charge

1 Cisco – CCNP Security Boot Camp $6995.00
1 Exam Preparation Study Guide Included
1 Exam Review W/ Cisco CCNP Security Practice Exams Included
0 Cisco Exam Vouchers NOT INCLUDED
1 Certification Guarantee Included
1 Discount $-2000.00
Total $4995.00

 

WHAT’S INCLUDED – CCNP SECURITY BOOT CAMP

CCNP Security Courseware
CCNP Security Exam Preparation Study Guide
CCNP Security Exam Practice Labs
In-Class Lab Challenges
Cisco Evening Exam Review Sessions
CCNP Security Exam Vouchers

CCNP SECURITY EXAMS COVERED

SCOR 350-701 Implementing and Operating Cisco Security Core Technologies
SISE 300-715 Implementing and Configuring Cisco Identity Services Engine

CCNP SECURITY CERTIFICATION COURSE OUTLINE

With Training Camp’s exam prep guide your course content will always be up-to-date with the most current version of the exams. This mix of courseware offers an in-depth review and offers the advantage of Training Camp exam performance boosters.

SECURITY CONCEPTS

-Explain common threats against on-premises and cloud environments
-Compare common security vulnerabilities such as software bugs, weak and/or hardcoded passwords, SQL injection, missing encryption, buffer overflow, path traversal, cross-site scripting/forgery
-Describe functions of the cryptography components such as hashing, encryption, PKI, SSL, IPsec, NAT-T IPv4 for IPsec, pre-shared key and certificate based authorization
-Compare site-to-site VPN and remote access VPN deployment types such as sVTI, IPsec, Cryptomap, DMVPN, FLEXVPN including high availability considerations, and AnyConnect
-Describe security intelligence authoring, sharing, and consumption
-Explain the role of the endpoint in protecting humans from phishing and social engineering attacks
-Explain North Bound and South Bound APIs in the SDN architecture
-Explain DNAC APIs for network provisioning, optimization, monitoring, and troubleshooting
-Interpret basic Python scripts used to call Cisco Security appliances APIs

NETWORK SECURITY

-Compare network security solutions that provide intrusion prevention and firewall capabilities
-Describe deployment models of network security solutions and architectures that provide intrusion prevention and firewall capabilities
-Describe the components, capabilities, and benefits of NetFlow and Flexible NetFlow records
-Configure and verify network infrastructure security methods (router, switch, wireless)
-Implement segmentation, access control policies, AVC, URL filtering, and malware protection
-Implement management options for network security solutions such as intrusion prevention and perimeter security (Single vs. multidevice manager, in-band vs. out-of-band, CDP, DNS, SCP, SFTP, and DHCP security and risks)
-Configure AAA for device and network access (authentication and authorization, TACACS+, RADIUS and RADIUS flows, accounting, and dACL)
-Configure secure network management of perimeter security and infrastructure devices (secure device management, SNMPv3, views, groups, users, authentication, and encryption, secure logging, and NTP with authentication)
-Configure and verify site-to-site VPN and remote access VPN

SECURING THE CLOUD

-Identify security solutions for cloud environments
-Compare the customer vs. provider security responsibility for the different cloud service models
-Describe the concept of DevSecOps (CI/CD pipeline, container orchestration, and security
-Implement application and data security in cloud environments
-Identify security capabilities, deployment models, and policy management to secure the cloud
-Configure cloud logging and monitoring methodologies
-Describe application and workload security concepts

CONTENT SECURITY

-Implement traffic redirection and capture methods
-Describe web proxy identity and authentication including transparent user identification
-Compare the components, capabilities, and benefits of local and cloud-based email and web solutions (ESA, CES, WSA)
-Configure and verify web and email security deployment methods to protect on-premises and remote users (inbound and outbound controls and policy management)
-Configure and verify email security features such as SPAM filtering, antimalware filtering, DLP, blacklisting, and email encryption
-Configure and verify secure internet gateway and web security features such as blacklisting, URL filtering, malware scanning, URL categorization, web application filtering, and TLS decryption
-Describe the components, capabilities, and benefits of Cisco Umbrella
-Configure and verify web security controls on Cisco Umbrella (identities, URL content settings, destination lists, and reporting)

ENDPOINT PROTECTION AND DETECTION

-Compare Endpoint Protection Platforms (EPP) and Endpoint Detection & Response (EDR) solutions
-Explain antimalware, retrospective security, Indication of Compromise (IOC), antivirus, dynamic file analysis, and endpoint-sourced telemetry
-Configure and verify outbreak control and quarantines to limit infection
-Describe justifications for endpoint-based security
-Describe the value of endpoint device management and asset inventory such as MDM
-Describe the uses and importance of a multifactor authentication (MFA) strategy
-Describe endpoint posture assessment solutions to ensure endpoint security
-Explain the importance of an endpoint patching strategy

SECURE NETWORK ACCESS, VISIBILITY, AND ENFORCEMENT

-Describe identity management and secure network access concepts such as guest services, profiling, posture assessment and BYOD
-Configure and verify network access device functionality such as 802.1X, MAB, WebAuth
-Describe network access with CoA
-Describe the benefits of device compliance and application control
-Explain exfiltration techniques (DNS tunneling, HTTPS, email, FTP/SSH/SCP/SFTP, ICMP, Messenger, IRC, NTP)
-Describe the benefits of network telemetry
-Describe the components, capabilities, and benefits of these security products and solutions

ARCHITECTURE AND DEPLOYMENT

-Configure personas
-Describe deployment options

POLICY ENFORCEMENT

-Configure native AD and LDAP
-Describe identity store options
-Configure wired/wireless 802.1X network access
-Configure 802.1X phasing deployment
-Configure network access devices
-Implement MAB
-Configure Cisco TrustSec
-Configure policies including authentication and authorization profiles

WEB AUTH AND GUEST SERVICES

-Configure web authentication
-Configure guest access services
-Configure sponsor and guest portals

PROFILER

-Implement profiler services
-Implement probes
-Implement CoA
-Configure endpoint identity management

BYOD

-Describe Cisco BYOD functionality
-Configure BYOD device on-boarding using internal CA with Cisco switches and Cisco wireless LAN controllers
-Configure certificates for BYOD
-Configure block list/allow list

ENDPOINT COMPLIANCE

-Describe endpoint compliance, posture services, and client provisioning
-Configure posture conditions and policy, and client provisioning
-Configure the compliance module
-Configure Cisco ISE posture agents and operational modes
-Describe supplicant, supplicant options, authenticator, and server

NETWORK ACCESS DEVICE ADMINISTRATION

-Compare AAA protocols
-Configure TACACS+ device administration and command authorization