Specialized Pentesting Courses | Home | About | Contact | Blog | Glossary         

 QUICK CONTACT

NAME :
EMAIL :
PHONE :
COUNTRY :
STATE :
SUBJECT :
COURSE :
MESSAGE :
  
   







Download in PDF:    This Course   

Cisco Certified Network Professional - Security (CCNP Security)(earlier CCSP)

CCNP Security certification program is aligned specifically to the job role of the Cisco Network Security Engineer responsible for Security in Routers, Switches, Networking devices and appliances, as well as choosing, deploying, supporting and troubleshooting Firewalls, VPNS, and IDS/IPS solutions for their networking environments.

Students preparing for CCNP Security [earlier know as CCSP] certification exam can opt for the exam papers mentioned in the table below.

CCNP Security [earlier CCSP] Certification Track

CCNP Security Prerequisites
  • Valid CCNA Security certification, or
  • Valid CCSP certification, or
  • Valid CCNA certification plus SND exam pass


  • Exams Exam Code Recommended Training Exam Fee
     Exam_1   642-637 SECURE v1.0   Secure v1.0 Securing Networks with Cisco Routers and Switches (SECURE)   $200
     Exam_2   642-627 IPS v7.0   Implementing Cisco Intrusion Prevention System (IPS v7.0)   $200
     Exam_3   642-618 FIREWALL v2.0   Deploying Cisco ASA Firewall Solutions (FIREWALL v2.0)   $200
     Exam_4   642-648 VPN v2.0   Deploying Cisco ASA VPN Solutions (VPN v2.0)   $200


    Training we offer:

    Course Name  CCNP Security [earlier CCSP] 
    Course Duration  2 weeks 
    Course Mode Training Academy or On-site Training for Corporates & Colleges
    Prerequisite  CCNA 



    CCNP Security [Earlier CCSP] Syllabus

    Introduction to the Cisco ASA
  • Technology and Features
  • Appliance Family
  • Cisco ASA and Cisco ASDM and the CLI
  • Configure basic ASA settings and interfaces
  • Configure Static Routing
  • Configuring Basic Device Management Features
  • Remote administration by both SSH and HTTPS/ASDM
  • Prepare a persistent self-signed digital certificate for use for ASDM
  • Configure authenticated NTP support and Syslog support
  • Use different features to test the behavior of the ASA

  • Firewall Modes
  • Transparent Firewall and Routed Firewall
  • Security Contexts

  • Network Address Translation
  • Deploying NAT
  • Experiment with nat 0 and no nat-control
  • Implement a temporary PAT configuration
  • Configure dynamic NAT, NAT exemption, and static NAT
  • Configure and monitor address translation
  • ASA's translation and connection tables

  • Deploying Access Control Features
  • Configuring Basic Access Control
  • Using Cisco ASA Modular Policy Framework
  • Object groups, the packet tracer & ICMP inspection
  • Tuning Basic Stateful Inspection Features
  • Debug commands

  • Protocol Inspection
  • Application layer inspection
  • Inspect Layer 3 and Layer 4 packet headers
  • Control traffic based on information received

  •  
  • Content Filtering (URL Filtering, Scripts Filtering)
  • Syslog and Reporting
  • Deploying IPsec VPN Solutions
  • IPsec Overview
  • Site-to-Site IPsec VPNs
  • IPsec remote access VPN (Cisco Easy VPN Solutions)
  • VPN AAA
  • Modify the NAT configuration to tunnel requirements
  • Monitor tunnel status from the CLI, ASDM, and syslog
  • Cisco VPN Client and remote access connections
  • Access via split tunneling or hairpinning
  • Allowing hub and spoke access from VPN clients to site-to-site VPN peers

  • AAA for Remote Access VPN with RADIUS
  • Configure RADIUS between the ASA and ACS
  • Configure ACS to use Active Directory
  • Configure policy options on ASA via ACS and RADIUS
  • User Based Policies

  • SSL VPN (AnyConnect and Clientless)
  • Configure ASA and client for AnyConnect connectivity
  • Enroll with Services to obtain an SSL certificate
  • Clientless SSL VPN: Advanced Access
  • Advanced Application Access
  • Advanced Authentication and SSO
  • Customizing the Clientless SSL VPN Portal
  • Three thin client options: port forwarding, smart tunnels & SSL VPN plug-ins

  • Failover
  • Active/Active
  • Active/Standby
  • Configure two ASAs for Active/Standby failover
  • Failover System Rollback



  • Back to top














































































































    ARIZONA Infotech © Copyright 2017 . All Rights Reserved