Introduction
1
Describing information Security Concepts
2
Describing Common TCP/IP Attacks
3
Describing Common Network Application Attacks
4
Describing Common Endpoint Attacks
5
Describing Network Security Technologies
Cisco ASA Firewall
1
Deploying Cisco ASA Firewall
2
Cisco ASA interface Security levels
3
Cisco ASA Objects and object groups
4
Network Address translation
5
Configure network settings and NAT on Cisco ASA includes labs
7
Cisco ASA Advanced Access Policies
Cisco Firepower
1
Deploying Cisco Firepower NEXT-Generation Firewall
2
Cisco Firepower NGFW Deployments
3
Cisco Firepower NGFW Packet Processing and Policies
4
Cisco Firepower NGFW Objects
Cisco Email Content Security Overview
1
Deploying Email Content Security
2
Cisco Email Content Security Overview
5
Public and Private Listeners
6
Host Access Table Overview
7
Recipient Access Table Overview
Deploying Web Content Security
1
Deploying Web Content Security
4
Network Users Authentication
Cisco Umbrella
2
Cisco Umbrella Architecture
4
Cisco Umbrella Roaming Client
6
Cisco Umbrella Investigate Overview
Explaining VPN Technologies and Cryptography Concepts
1
Explaining VPN Technologies and Cryptography Concepts
4
Secure Communication and Cryptographic Services
6
Public Key Infrastructure
Introducing Cisco Secure Site to Site VPN
1
Introducing Cisco Secure Site-to-Site VPN Solutions
2
Site-to-Site VPN Technologies
5
IPsec Static Virtual Tunnel Interface
Deploying Cisco IOS VTI Based Point to Point IPsec VPNs
1
Deploying Cisco IOS VTI-Based Point-to-Point IPsec VPNs
3
Static VTI Point-to-Point IPsec IKEv2 Tunnel
Deploying Point to Point IPsec VPNs on the Cisco ASA and Cisco Fire
1
Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower
2
Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW
3
Cisco ASA Point-to-Point VPN Configuration
4
Cisco Firepower NGFW Point-to-Point VPN Configuration
Introducing Cisco Secure Remote Access VPN Solutions
1
Introducing Cisco Secure Remote Access VPN Solutions
2
Remote Access VPN Components
3
Remote Access VPN Technologies
Deploying Remote Acess SSL VPNs On the Cisco ASA and Cisco Firepower
1
Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower
2
Remote Access Configuration Concepts
5
Cisco ASA Remote Access VPN Configuration
6
Cisco Firepower NGFW Remote Access VPN Configuration
Explaining Cisco Service Network Access Solutions
1
Explaining Cisco Service Network Access Solutions
2
Cisco Secure Network Access
3
Cisco Secure Network Access Components
4
AAA Role in Cisco Secure Network Access solution
5
Cisco Identity Services Engine
Describing 802.1x Authentication
1
Describing 802.1 X Authentication
4
Role of RADIUS in 802.1X Communications
5
RADIUS Change of Authorization
Describing Endpoint Security Technologies
Deploying Cisco AMP For Engpoints
2
Cisco AMP for Endpoints Architecture
3
Cisco AMP for Endpoints Engines
4
Retrospective security with Cisco AMP
5
Cisco AMP Device and File Trajectory
6
Managing Cisco AMP for Endpoints
Introducing Network Infrastructure Protection
2
Identifying Network Device Planes
3
Control Plane Security Controls
4
Management Plane Security Controls
6
Layer 2 & 3 Data Plane Security Controls
Deploying Control Plane Security Controls
5
Routing Protocol Security
Deploying Layer 2 Data Planing Security Controls
1
Overview of Layer 2 Data Plane Security Controls
2
VLAN-Based Attacks Mitigation
4
Port Security & Private VLANs
5
DHCP Snooping & ARP Inspection
Deploying Layer 3 Data Planing Security Controls
2
Infrastructure Antispoofing ACLs
3
Unicast Reverse Path Forwading
Deploying Management Planing Security Controls
2
Cisco Secure Management Access
3
Secure Access to Cisco Devices
4
AAA for Management Access
Deploying Traffic Telemetry Methods
3
Device and Network Events Logging and Export
4
Network Traffic Monitoring Using NetFlow
Deploying Cisco Stealth watch Enterprise
2
Cisco Stealthwatch Offerings Overview
3
Flow Stitching and Deduplication
4
Stealthwatch Enterprise and ISE Integration
5
Cisco Encrypted Traffic Analytics
7
Security Events and Alarms
8
Host, Role, and Default Policies
Describing Cloud and Common Cloud Attacks
2
Evolution of Cloud Computing
3
Security Responsibility in Cloud
4
Common Security Threats in Cloud
5
Security Assessment in the Cloud
Securing the Cloud
2
Cisco Threat-Centric Approach to Network Security
3
Application and Workload Security
4
Network Function Virtualization (NFV) and Virtual Network Functions (VNF)
5
Reporting and Threat Visibility in Cloud
6
Cloud Access Security Broker
Deploying Cisco Stealthwatch Cloud
2
Cisco Stealthwatch Cloud for Public Cloud Monitoring
3
Cisco Stealthwatch Cloud Operations
Discribing SDN
2
Software-Defined Networking Concepts
3
Network Programmability and Automation