fbpx

CCNP Security Course Updated 2023

CCNP Security Course Updated 2023

78%

Alumni Career Transitions

5200+

Hiring Partners

60%

Avg Salary Hike

22

Years of R & D in Syllabus

Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0

After taking this course, you should be able to:

  • Describe information security concepts and strategies within the
    network
  • Describe common TCP/IP, network application, and endpoint attacks
  • Describe how various network security technologies work together to
    guard against attacks
  • Implement access control on Cisco ASA appliance and Cisco
    Firepower Next-Generation Firewall
  • Describe and implement basic email content security features and
    functions provided by Cisco Email Security Appliance
  • Describe and implement web content security features and functions
    provided by Cisco Web Security Appliance
  • Describe Cisco Umbrella® security capabilities, deployment models,
    policy management, and Investigate console
  • Introduce VPNs and describe cryptography solutions and algorithms
  • Describe Cisco secure site-to-site connectivity solutions and explain
    how to deploy Cisco Internetwork Operating System (Cisco IOS®)
    Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs, and
    point-to-point IPsec VPN on the Cisco ASA and Cisco Firepower Next-
    Generation Firewall (NGFW)
  • Describe and deploy Cisco secure remote access connectivity solutions
    and describe how to configure 802.1X and Extensible Authentication
    Protocol (EAP) authentication
  • Provide basic understanding of endpoint security and describe
    Advanced Malware Protection (AMP) for Endpoints architecture and
    basic features
  • Examine various defenses on Cisco devices that protect the control
    and management plane
  • Configure and verify Cisco IOS software Layer 2 and Layer 3 data plane
    controls
  • Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud
    solutions
  • Describe basics of cloud computing and common cloud attacks and
    how to secure cloud environment

To fully benefit from this course, you should have the following knowledge
and skills:

  • Skills and knowledge equivalent to those learned in Implementing
    and Administering Cisco Solutions (CCNA®) v1.0 course
  • Familiarity with Ethernet and TCP/IP networking
  • Working knowledge of the Windows operating system
  • Working knowledge of Cisco IOS networking and concepts
  • Familiarity with basics of networking security concepts These Cisco
    courses are recommended to help you meet these prerequisites:
  • Implementing and Administering Cisco Solutions (CCNA)
  • Describing Information Security Concepts*
    1. Information Security Overview
    2. Assets, Vulnerabilities, and Countermeasures
    3. Managing RisK
  • Describing Common TCP/IP Attacks*
    1. Legacy TCP/IP Vulnerabilities
    2. IP Vulnerabilities
    3. Internet Control Message Protocol (ICMP) Vulnerabilities
  • Describing Common Network Application Attacks*
    1. Password Attacks
    2. Domain Name System (DNS)-Based Attacks
    3. DNS Tunnelling

  • Describing Common Endpoint Attacks*
    1. Buffer Overflow
    2. Malware
    3. Reconnaissance Attack
  • Describing Network Security Technologies
    1. Défense-in-Depth Strategy
    2. Defending Across the Attack Continuum
    3. Network Segmentation and Virtualization Overview
  • Deploying Cisco ASA Firewall
    1. Cisco ASA Deployment Types
    2. Cisco ASA Interface Security Levels
    3. Cisco ASA Objects and Object Groups
  • Deploying Cisco Firepower Next-Generation Firewall
    1. Cisco Firepower NGFW Deployments
    2. Cisco Firepower NGFW Packet Processing and Policies
    3. Cisco Firepower NGFW Objects
  • Deploying Email Content Security
    1. Cisco Email Content Security Overview
    2. Simple Mail Transfer Protocol (SMTP) Overview
    3. Email Pipeline Overview
  • Deploying Web Content Security
    1. Cisco Web Security Appliance (WSA) Overview
    2. Deployment Options
    3. Network Users Authentication
  • Deploying Cisco Umbrella*
    1. Cisco Umbrella Architecture
    2. Deploying Cisco Umbrella
    3. Cisco Umbrella Roaming Client
  • Explaining VPN Technologies and Cryptography
    1. VPN Definition
    2. VPN Types
    3. Secure Communication and Cryptographic Services

  • Introducing Cisco Secure Site-to-Site VPN Solutions
    1. Site-to-Site VPN Topologies
    2. IPsec VPN Overview
    3. IPsec Static Crypto Maps
  • Deploying Cisco IOS VTI-Based Point-to-Point IPsec VPNs
    1. Cisco IOS VTIs
    2. Static VTI Point-to-Point IPsec Internet Key Exchange (IKE) v2
      VPN Configuration
  • Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco
    Firepower NGFW
    1. Point-to-Point VPNs on the Cisco ASA and Cisco Firepower
      NGFW
    2. Cisco ASA Point-to-Point VPN Configuration
    3. Cisco Firepower NGFW Point-to-Point VPN Configuration
  • Introducing Cisco Secure Remote Access VPN Solutions
    1. Remote Access VPN Components
    2. Remote Access VPN Technologies
    3. Secure Sockets Layer (SSL) Overview
  • Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco
    Firepower NGFW
    1. Remote Access Configuration Concepts
    2. Connection Profiles
    3. Group Policies
  • Explaining Cisco Secure Network Access Solutions
    1. Cisco Secure Network Access
    2. Cisco Secure Network Access Components
    3. AAA Role in Cisco Secure Network Access Solution
  • Describing 802.1X Authentication
    1. 1X and Extensible Authentication Protocol (EAP)
    2. EAP Methods
    3. Role of Remote Authentication Dial-in User Service (RADIUS) in
      1X Communications
  • Configuring 802.1X Authentication
    1. Cisco Catalyst® Switch 802.1X Configuration
    2. Cisco Wireless LAN Controller (WLC) 802.1X Configuration
    3. Cisco Identity Services Engine (ISE) 802.1X Configuration
  • Describing Endpoint Security Technologies*
    1. Host-Based Personal Firewall
    2. Host-Based Anti-Virus
    3. Host-Based Intrusion Prevention System
  • Deploying Cisco Advanced Malware Protection (AMP) for Endpoints*
    1. Cisco AMP for Endpoints Architecture
    2. Cisco AMP for Endpoints Engines
    3. Retrospective Security with Cisco AMP
  • Introducing Network Infrastructure Protection*
    1. Identifying Network Device Planes
    2. Control Plane Security Controls
    3. Management Plane Security Controls
  • Deploying Control Plane Security Controls*
    1. Infrastructure ACLs
    2. Control Plane Policing
    3. Control Plane Protection
  • Deploying Layer 2 Data Plane Security Controls*
    1. Overview of Layer 2 Data Plane Security Controls
    2. Virtual LAN (VLAN)-Based Attacks Mitigation
    3. Spanning Tree Protocol (STP) Attacks Mitigation
  • Deploying Layer 3 Data Plane Security Controls*
    1. Infrastructure Antispoofing ACLs
    2. Unicast Reverse Path Forwarding
    3. IP Source Guard
  • Deploying Management Plane Security Controls*
    1. Cisco Secure Management Access
    2. Simple Network Management Protocol Version 3
    3. Secure Access to Cisco Devices
  • Deploying Traffic Telemetry Methods*
    1. Network Time Protocol
    2. Device and Network Events Logging and Export
    3. Network Traffic Monitoring Using NetFlow
  • Deploying Cisco Stealthwatch Enterprise*
    1. Cisco Stealthwatch Offerings Overview
    2. Cisco Stealthwatch Enterprise Required Components
    3. Flow Stitching and Deduplication
  • Describing Cloud and Common Cloud Attacks*
    1. Evolution of Cloud Computing
    2. Cloud Service Models
    3. Security Responsibilities in Cloud
  • Securing the Cloud*
    1. Cisco Threat-Centric Approach to Network Security
    2. Cloud Physical Environment Security
    3. Application and Workload Security
  • Deploying Cisco Stealth watch Cloud*
    1. Cisco Stealth watch Cloud for Public Cloud Monitoring
    2. Cisco Stealth watch Cloud for Private Network Monitoring
    3. Cisco Stealth watch Cloud Operations
  • Describing Software-Defined Networking (SDN*)
    1. Software-Defined Networking Concepts
    2. Network Programmability and Automation
    3. Cisco Platforms and APIs
    4. This section is self-study material that can be done at yourown pace if you are taking the instructor-led version of this
  • Configure Network Settings and NAT on Cisco ASA
  • Configure Cisco ASA Access Control Policies
  • Configure Cisco Firepower NGFW NAT
  • Configure Cisco Firepower NGFW Access Control Policy
  • Configure Cisco Firepower NGFW Discovery and IPS Policy
  • Configure Cisco NGFW Malware and File Policy
  • Configure Listener, Host Access Table (HAT), and Recipient Access
    Table (RAT) on Cisco Email Security Appliance (ESA)
  • Configure Mail Policies
  • Configure Proxy Services, Authentication, and HTTPS Decryption
  • Enforce Acceptable Use Control and Malware Protection
  • Examine the Umbrella Dashboard
  • Examine Cisco Umbrella Investigate
  • Explore DNS Ransomware Protection by Cisco Umbrella
  • Configure Static VTI Point-to-Point IPsec IKEv2 Tunnel
  • Configure Point-to-Point VPN between the Cisco ASA and Cisco
  • Firepower NGFW
  • Configure Remote Access VPN on the Cisco Firepower NGFW
  • Explore Cisco AMP for Endpoints
  • Perform Endpoint Analysis Using AMP for Endpoints Console
  • Explore File Ransomware Protection by Cisco AMP for Endpoints Console
  • Explore Cisco Stealth watch Enterprise v6.9.3
  • Explore Cognitive Threat Analytics (CTA) in Stealth watch Enterprise v7.0
  • Explore the Cisco Cloud lock Dashboard and User Security
  • Explore Cisco Cloud lock Application and Data Security
  • Explore Cisco Stealth watch Cloud
  • Explore Stealth watch Cloud Alert Settings, Watch lists, and Sensors

** Syllabus Updated on April 2023 -2024

Job Opportunities

  • Network Engineer
  • Service Delivery Engineers
  • IT Support Engineer
  • Service Desk Analyst
  • IT Engineer / Linux Administrator
  • Network Security Engineer

Minimum Eligibility

  • B.Tech, B.E, Diploma, ITI, M.Tech, M.E
  • No previous experience required

Who Is This Program For?

  • Professionals interested in exploring Networking
  • Hobbyists and students who want to start their career in Networking world
  • If you think about ‘Networking’ then think about taking this course. you will not be disappointed

Top Skills You Will Learn

  • Network Fundamentals
  • Network Access
  • IP Connectivity
  • IP Services
  • Security Fundamentals
  • Automation and Programmability

What you'll learn :

  • Routing Protocols
  • Advanced Routing Concepts
  • IPV6 Routing
  • Advanced Switching
  • Layer 2
  • Troubleshooting
  • Layer 3
  • Trouble Shoot

CCNP Security Course Networking Cisco Training and Certification 2023 Online Offline classes Virtual Lab Facility Updated syllabus Computer Hardware

** The above is the lite syllabus and doesn’t cover the full syllabus. To get full syllabus  Book a Free Demo Now

WhatsApp
Facebook
Telegram
Email
Interships - CCNP Security Course Updated 2023
Register Now

Shareable Certificate

International & National Level Certification.

Practical only subscription

Subscription for remote lab connectivity. 24x7

Flexible Schedule

Set and maintain flexible deadlines.

Certifications & Accreditations

NSDC 2 - CCNP Security Course Updated 2023
iisc 1 - CCNP Security Course Updated 2023
IASC 1 - CCNP Security Course Updated 2023
TUV 1 - CCNP Security Course Updated 2023
ESSI - CCNP Security Course Updated 2023
CGSC - CCNP Security Course Updated 2023

Benefits of learning from us

Program Fees

Live Instructor Led Training Fee

 50,000.00
  • The above fees are applicable to candidates in India only.

Mode of Training

OnDemand

Live Instructor Led

Virtual Lab

Classroom

Comprehensive Curriculum

45 Days +

Learning Content + Practicals

Regular Batch

Date

09-Oct-2023

Time

10:30 AM IST

Fast Track Batch

Date

11-Oct-2023

Time

10:30 AM IST

Extra 5% off on Courses

Coupon Code: UPGRADE

Download Now