• <ul id="i22wy"></ul>
    <strike id="i22wy"></strike>
  • <ul id="i22wy"><sup id="i22wy"></sup></ul>
    <strike id="i22wy"></strike>
    <strike id="i22wy"></strike>
    <fieldset id="i22wy"><menu id="i22wy"></menu></fieldset>
    114培訓網歡迎您來到杭州博學國際教育培訓中心!

    杭州CISCO認證資深安全工程師(CCNP-Security)培訓

    授課機構:杭州博學國際教育培訓中心

    關注度:195

    課程價格: 請咨詢客服

    上課地址:請咨詢客服

    開課時間:滾動開班

    在線報名

    課程詳情在線報名

    更新時間:2025-05-10
    CISCO認證資深安全工程師(CCNP-Security)培訓 培訓班型: 周末班/脫產班 課程長度: 14天/84小時;15天/90小時 培訓日期: 待定 培訓價格: 技術培訓8000元/人 認證考試: 認證考試9200元/人,10000元/人(含票) 培訓地點: 博學國際教育培訓中心 環境要求: 投影儀、白板、電腦 培訓形式: 課堂講授與實踐操作 培訓資料: 思科培訓教材 課程內容 認證描述: CCNP 安全認證專門為擔任思科網絡安全工程師職責角色的專業人員設計,其職責包括負責路由器,交換機,網絡設備及相關電器設備的安全,以及對網絡環境中的防火墻,VPNs,及IDS/IPS解決方案進行選擇,部署,支持及故障排除。 此外,美國*安全局(NSA)及*安全系統委員會(CNSS)均認可思科CCNP安全認證課程符合美國CNSS 4013培訓標準 培訓課程: Implementing Cisco Secure Access Solutions (300-208) Implementing Cisco Threat Control Solutions (300-210) Implementing Cisco Edge Network Security Solutions (300-206) Implementing Cisco Secure Mobility Solutions (300-209) 考試信息: 考試代碼 考試時間 試題數量 題型 300-208 90分鐘 65-75道 選擇題,拖圖題,實驗題 300-210 300-206 300-209 課程內容: Implementing Cisco Secure Access Solutions (300-208) Exam Description: The first paragraph is the exam description that is followed by a second paragraph with standard copy that appears on all exam topics. The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice. 1.0 Identity Management/Secure Access 1.1 Implement Device Administration 1.1.a Compare and select AAA options 1.1.b TACACS+ 1.1.c RADIUS 1.1.d Describe Native AD and LDAP 1.2 Describe Identity Management 1.2.a Describe Features and functionality of Authentication and authorization 1.2.b Describe identity store options (i.e., LDAP, AD, PKI, OTP, Smart Card, local) 1.2.c Implement accounting 1.3 Implement Wired/Wireless 802.1x 1.3.a Describe RADIUS Flows 1.3.b AV Pairs 1.3.c EAP types 1.3.d Describe Supplicant, Authenticator, Server 1.3.e Supplicant options 1.3.f 802.1X phasing (monitor mode, low impact, closed mode) 1.3.g AAA server 1.3.h Network access devices 1.4 Implement MAB 1.5 Implement Network Authorization Enforcement 1.5.a dACL 1.5.b Dynamic VLAN Assignment 1.5.c Describe SGA 1.5.d Named ACL 1.5.e CoA 2.0 Threat Defense 2.1 Implement Firewall 2.1.a Describe SGA ACLs 3.0 Identity Management/Secure Access 3.1 Implement Central Web Auth 3.2 Implement Profiling 3.3 Implement Guest Services 3.4 Implement Posturing 3.5 Implement BYOD 3.5.a Describe elements of a BYOD policy 3.5.b Device registration 3.5.c My devices portal 3.5.d Describe supplicant provisioning 4.0 Troubleshooting, Monitoring and Reporting Tools 4.1 Troubleshoot Identity Management Solutions 5.0 Threat Defense Architectures 5.1 Design Secure wireless solution 6.0 Identity Management Architectures 6.1 Design AAA security solution 6.2 Design Profiling security solution 6.3 Design Posturing security solution 6.4 Design BYOD security solution 6.5 Design Device admin security solution 6.6 Design Guest services security solution Implementing Cisco Threat Control Solutions (300-210) Exam Description: The Implementing Cisco Threat Control Solutions (SITCS) exam (300-210) is part of the CCNP Security certification. It tests a network security engineer on advanced firewall architecture and configuration with the Cisco next-generation firewall, utilizing access and identity policies. This new revision of the SITCS exam replaces 300-207, removes some older technologies, and adds coverage for both Cisco Firepower NGIPS and Cisco AMP (Advanced Malware Protection). This 90-minute exam consists of 65–75 questions and covers integration of Intrusion Prevention System (IPS) and context-aware firewall components, as well as Web (Cloud) and Email Security solutions. Candidates can prepare for this exam by taking the Implementing Cisco Threat Control Solutions (SITCS) course. The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice. 1.0 Content Security (27%) 1.1 Cisco Cloud Web Security (CWS) 1.1.a Describe the features and functionality 1.1.b Implement the IOS and ASA connectors 1.1.c Implement the Cisco AnyConnect web security module 1.1.d Implement web usage control 1.1.e Implement AVC 1.1.f Implement antimalware 1.1.g Implement decryption policies 1.2 Cisco Web Security Appliance (WSA) 1.2.a Describe the features and functionality 1.2.b Implement data security 1.2.c Implement WSA identity and authentication, including transparent user identification 1.2.d Implement web usage control 1.2.e Implement AVC 1.2.f Implement antimalware and AMP 1.2.g Implement decryption policies 1.2.h Implement traffic redirection and capture methods (explicit proxy vs. transparent proxy) 1.3 Cisco Email Security Appliance 1.3.a Describe the features and functionality 1.3.b Implement email encryption 1.3.c Implement antispam policies 1.3.d Implement virus outbreak filter 1.3.e Implement DLP policies 1.3.f Implement antimalware and AMP 1.3.g Implement inbound and outbound mail policies and authentication 1.3.h Implement traffic redirection and capture methods 1.3.i Implement ESA GUI for message tracking 2.0 Network Threat Defense (22%) 2.1 Cisco Next-Generation Firewall (NGFW) Security Services 2.1.a Implement application awareness 2.1.b Implement access control policies (URL-filtering, reputation based, file filtering) 2.1.c Configure and verify traffic redirection 2.1.d Implement Cisco AMP for Networks 2.2 Cisco Advanced Malware Protection (AMP) 2.2.a Describe cloud detection technologies 2.2.b Compare and contrast AMP architectures (public cloud, private cloud) 2.2.c Configure AMP endpoint deployments 2.2.d Describe analysis tools 2.2.e Describe incident response functionality 2.2.f Describe sandbox analysis 2.2.g Describe AMP integration 3.0 Cisco FirePOWER Next-Generation IPS (NGIPS) ( 20%) 3.1 Configurations 3.2 Describe traffic redirection and capture methods 3.2.a Describe preprocessors and detection engines 3.2.b Implement event actions and suppression thresholds 3.2.c Implement correlation policies 3.2.d Describe SNORT rules 3.2.e Implement SSL decryption policies 3.3 Deployments 3.3.a Deploy inline or passive modes 3.3.b Deploy NGIPS as appliance, virtual appliance, or module within an ASA 3.3.c Describe the need for traffic symmetry 3.3.d Compare inline modes: inline interface pair and inline tap mode 4.0 Security Architectures (17%) 4.1 Design a web security solution 4.1.a Compare and contrast Cisco FirePOWER NGFW, WSA, and CWS 4.1.b Compare and contrast physical WSA and virtual WSA 4.1.c Describe the available CWS connectors 4.2 Design an email security solution 4.2.a Compare and contrast physical ESA and virtual ESA 4.2.b Describe hybrid mode 4.3 Design Cisco FirePOWER solutions 4.3.a Configure the virtual routed, switched, and hybrid interfaces 4.3.b Configure the physical routed interfaces 5.0 Troubleshooting, Monitoring, and Reporting Tools (14%) 5.1 Design a web security solution 5.1.a Compare and contrast FirePOWER NGFW, WSA, and CWS 5.1.b Compare and contrast physical WSA and virtual WSA 5.1.c Describe the available CWS connectors 5.2 Cisco Web Security Appliance (WSA) 5.2.a Implement the WSA Policy Trace tool 5.2.b Describe WSA reporting functionality 5.2.c Troubleshoot using CLI tools 5.3 Cisco Email Security Appliance (ESA) 5.3.a Implement the ESA Policy Trace tool 5.3.b Describe ESA reporting functionality 5.3.c Troubleshoot using CLI tools 5.4 Cisco FirePOWER 5.4.a Describe the Cisco FirePOWER Management Center dashboards and reports 5.4.b Implement health policy 5.4.c Configure email, SNMP, and syslog alerts 5.4.d Troubleshoot NGIPS using CLI tools Implementing Cisco Edge Network Security Solutions (300-206) Exam Description: The first paragraph is the exam description that is followed by a second paragraph with standard copy that appears on all exam topics. The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice. 1.0 Threat Defense 1.1 Implement Firewall 1.1.a Implement ACLs 1.1.b Implement static/dynamic NAT/PAT 1.1.c Implement object groups 1.1.d Describe threat detection features 1.1.3 Implement Botnet traffic filtering 1.2 Implement Layer 2 Security 1.2.a Configure DHCP snooping 1.2.b Describe dynamic ARP inspection 1.2.c Describe storm control 1.2.d Configure port security 1.2.e Describe common layer 2 threats and attacks and mitigation 1.2.f Describe MACSec 1.3 Configure device hardening per best practices 1.3.a Routers 1.3.b Switches 1.3.c Firewalls 1.4 Implement Firewall 1.4.a Configure application filtering and protocol inspection 1.4.b Describe virtualized firewalls 2.0 Cisco Security Devices GUIs and Secured CLI Management 2.1 Implement SSHv2, SSL, SNMPv3 access on the network devices 2.2 Implement RBAC on the ASA/IOS CLI and on ASDM 2.3 Describe prime infra 2.4 Describe CSM 2.5 Implement Device mgrs 3.0 Management Services on Cisco Devices 3.1 Implement NetFlow exporter 3.2 Implement SNMPv3 3.3 Implement Logging 3.4 Implement NTP with authentication 3.5 Describe CDP, DNS, SCP, SFTP, and DHCP 4.0 Troubleshooting, Monitoring and Reporting Tools 4.1 Monitor Firewall using analysis of packet tracer, packet capture and syslog 5.0 Threat Defense Architectures 5.1 Design a Firewall solution 5.2 Design Layer 2 security solution 6.0 Security Components and Considerations 6.1 Describe Security ops mgmt architecture 6.2 Describe Data Center Security components and considerations 6.3 Describe Collaboration Security components and considerations 6.4 Describe common IPv6 security considerations Implementing Cisco Secure Mobility Solutions (300-209) Exam Description: The first paragraph is the exam description that is followed by a second paragraph with standard copy that appears on all exam topics. The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice. 1.0 Secure Communications 1.1 Implement Site to Site VPNs on Routers and Firewalls 1.1.a Describe GETVPN 1.1.b Implement IPsec (with IKEv1 and IKEv2) 1.1.c Implement DMVPN (Hub-Spoke and spoke-spoke) 1.2 Implement remote access VPNs on Routers and Firewalls 1.2.a Implement AnyConnect IKEv2 VPNs 1.2.b Implement SSLVPN: client and clientless 1.3 Implement Site to Site VPNs on Routers and Firewall 1.3.a Implement FlexVPN 1.4 Implement remote access VPNs on Routers and Firewalls 1.4.a Implement SSLVPN: client and clientless 1.4.b Implement FLEX VPN 2.0 Troubleshooting, Monitoring and Reporting Tools 2.1 Analyze syslog and VPN debug logs via ASDM 3.0 Secure Communications Architectures 3.1 Design Site-to-site VPN solution 3.2 Design Remote access VPN solution 3.3 Describe Encryption, hashing, incl NGE
    姓名不能為空
    手機號格式錯誤
    主站蜘蛛池模板: 91精品视频在线| 最新国产精品拍自在线观看| 亚洲国产成人久久精品99| 精品人妻少妇一区二区三区在线| 亚洲国产精品成人一区| 国产精品成人久久久久久久| 国产精品久久精品| 久久久久人妻一区精品色 | 十八18禁国产精品www| 久久精品无码一区二区三区日韩 | 色偷偷88888欧美精品久久久| 精品视频一区二区三区四区五区| 中文成人无码精品久久久不卡 | 人人妻人人澡人人爽人人精品| 乱人伦人妻精品一区二区| 隔壁老王国产在线精品| 丝袜美腿国产精品视频一区| 3D动漫精品啪啪一区二区下载| 人人妻人人澡人人爽人人精品97| 亚洲国产美女精品久久久久∴| 亚洲国产精品国产自在在线| 日韩精品成人a在线观看| 久久国产综合精品五月天| 国产农村妇女毛片精品久久| 伊人久久精品线影院| 久久国产乱子精品免费女| 国产精品黄网站| 国产精品嫩草影院一二三区入口| 国产精品女同一区二区| 精品无码人妻一区二区免费蜜桃| 亚洲国产精品无码久久一区二区| 亚洲精品国产精品乱码不卡 | 欧美日韩国产中文精品字幕自在自线 | www.日韩精品| 国产精品视频色视频| 国产一区麻豆剧传媒果冻精品| 国产精品久久久99| 国产精品主播一区二区| 久久精品国产精品亚洲人人| 九九精品免视看国产成人| 亚洲国产精品一区二区三区久久|