CCIE Security

CCIE Security --

Cisco Certified Network Professional Security (CCNP Security) certification program is aligned specifically to the job role of the Cisco Network Security Engineer responsible for Security in Routers, Switches, Networking devices and appliances, as well as choosing, deploying, supporting and troubleshooting Firewalls, VPNS, and IDS/IPS solutions for their networking environments.


• Network fundamentals and how to build simple LANs
• Manage network device security
• IPv6 basics
• Troubleshoot VLAN issues
• Spanning Tree Protocol (STP)
• Configure EtherChannel
• Layer 3 Redundancy

• Troubleshoot IP connectivity
• Characteristics, functions, and components of a WAN
• Configure and troubleshoot EIGRP in an IPv4 environment
• Configure EIGRP for IPv6
• Configure, verify, and troubleshoot multiarea OSPF
• SNMP, syslog, and NetFlow
• Manage Cisco device configurations, IOS images, and licenses


• Individuals seeking CCNA Routing and Switching certification
• Pre and post-sales network engineers involved in installing and supporting enterprise branch office networks
• Entry-level network engineers, network administrators, network support technicians, and help desk technicians


• A solid understanding of IPv4 and IPv6 based networks
• A basic knowledge of network subnetting and IP routing
• Complete the 10 hours of pre-class activity
• TCP/IP Networking



Infrastructure, Connectivity, Communications, and Network Security

1.1 Network addressing basics
1.2 OSI layers
1.3 TCP/UDP/IP protocols
1.4 LAN switching (for example, VTP, VLANs, spanning tree, and trunking)
1.5 Routing protocols (for example, RIP, EIGRP, OSPF, and BGP)
1.6 Tunneling protocols
1.7 IP multicast
1.8 Wireless
1.9 Authentication and authorization technologies
1.10 VPNs
1.11 Mobile IP networks

Security Protocols

2.1 RSA
2.2 RC4
2.3 MD5
2.4 SHA
2.5 DES
2.6 3DES
2.7 AES
2.8 IPsec
2.10 IKE and IKEv2
2.11 GDOI
2.12 AH
2.13 ESP
2.14 CEP
2.15 TLS and DTLS
2.16 SSL
2.17 SSH
2.19 TACACS+
2.20 LDAP
2.21 EAP methods (for example, EAP-MD5, EAP-TLS, EAP-TTLS, EAP-FAST, PEAP, and LEAP)
2.22 PKI, PKIX, and PKCS
2.23 IEEE 802.1X
2.24 WEP, WPA, and WPA2
2.25 WCCP
2.26 SXP
2.27 MACsec

Application and Infrastructure Security

3.1 HTTP


3.3 SMTP

3.4 DHCP

3.5 DNS

3.6 FTP and SFTP

3.7 TFTP

3.8 NTP

3.9 SNMP

3.10 syslog

3.11 Netlogon, NetBIOS, and SMB

3.12 RPCs

3.13 RDP and VNC

3.14 PCoIP

3.15 OWASP

3.16 Manage unnecessary services

Threats, Vulnerability Analysis, and Mitigation

4.1 Recognize and mitigate common attacks
4.2 Software and OS exploits
4.3 Security and attack tools
4.4 Generic network intrusion prevention concepts
4.5 Packet filtering
4.6 Content filtering and packet inspection
4.7 Endpoint and posture assessment
4.8 QoS marking attacks

Cisco Security Products, Features, and Management

5.1 Cisco Adaptive Security Appliance (ASA)
5.2 Cisco IOS firewalls and NAT
5.3 Cisco Intrusion Prevention Systems (IPS)
5.4 Cisco IOS IPS
5.5 Cisco AAA protocols and application
5.6 Cisco Identity Services Engine (ISE)
5.7 Cisco Secure ACS Solution Engine
5.8 Cisco Network Admission Control (NAC) Appliance Server
5.9 Endpoint and client
5.10 Secure access gateways (Cisco IOS router or ASA)
5.11 Virtual security gateway
5.12 Cisco Catalyst 6500 Series ASA Services Modules
5.13 ScanSafe functionality and components
5.14 Cisco Web Security Appliance and Cisco Email Security Appliance
5.15 Security management

Cisco Security Technologies and Solutions

6.1 Router hardening features (for example, CoPP, MPP, uRPF, and PBR)
6.2 Switch security features (for example, anti-spoofing, port, STP, MACSEC, NDAC, and NEAT)
6.3 NetFlow
6.4 Wireless security
6.5 Network segregation
6.6 VPN solutions
6.7 Content and packet filtering
6.8 QoS application for security
6.9 Load balancing and failover

Security Policies and Procedures, Best Practices, and Standards

7.1 Security policy elements
7.2 Information security standards (for example, ISO/IEC 27001 and ISO/IEC 27002)
7.3 Standards bodies (for example, ISO, IEC, ITU, ISOC, IETF, IAB, IANA, and ICANN)
7.4 Industry best practices (for example, SOX and PCI DSS)
7.5 Common RFC and BCP (for example, RFC2827/BCP38, RFC3704/BCP84, and RFC5735)
7.6 Security audit and validation
7.7 Risk assessment
7.8 Change management process
7.9 Incident response framework
7.10 Computer security forensics
7.11 Desktop security risk assessment and desktop security risk management


System Hardening and Availability

1.1 Routing plane security features (for example, protocol authentication and route filtering)
1.2 Control Plane Policing
1.3 Control plane protection and management plane protection
1.4 Broadcast control and switch port security
1.5 Additional CPU protection mechanisms (for example, options drop and logging interval)
1.6 Disable unnecessary services
1.7 Control device access (for example, Telnet, HTTP, SSH, and privilege levels)
1.8 Device services (for example, SNMP, syslog, and NTP)
1.9 Transit traffic control and congestion management

Threat Identification and Mitigation

2.1 Identify and protect against fragmentation attacks
2.2 Identify and protect against malicious IP option usage
2.3 Identify and protect against network reconnaissance attacks
2.4 Identify and protect against IP spoofing attacks
2.5 Identify and protect against MAC spoofing attacks
2.6 Identify and protect against ARP spoofing attacks
2.7 Identify and protect against DoS attacks
2.8 Identify and protect against DDoS attacks
2.9 Identify and protect against man-in-the-middle attacks
2.10 Identify and protect against port redirection attacks
2.11 Identify and protect against DHCP attacks
2.12 Identify and protect against DNS attacks
2.13 Identify and protect against MAC flooding attacks
2.14 Identify and protect against VLAN hopping attacks
2.15 Identify and protect against various Layer 2 and Layer 3 attacks
2.16 NBAR
2.17 NetFlow
2.18 Capture and utilize packet captures

Intrusion Prevention and Content Security

3.1 Cisco IPS 4200 Series Sensor appliance and Cisco ASA appliance IPS module
3.2 VACL, SPAN and RSPAN on Cisco switches
3.3 Cisco WSA

Identity Management

I am text block. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

4.1 Identity-based AAA
4.2 Device administration (Cisco IOS routers, Cisco ASA, and Cisco ACS5.x)
4.3 Network access (TrustSec model)
4.4 Cisco ISE

Perimeter Security and Services

5.1 Cisco ASA firewalls
5.2 Cisco IOS zone-based firewall

Confidentiality and Secure Access

6.1 IKE (v1/v2)
6.2 IPsec LAN-to-LAN (Cisco IOS and Cisco ASA)
6.4 FlexVPN
6.6 Remote-access VPN
6.7 VPN high availability
6.8 QoS for VPN
6.9 VRF-aware VPN
6.10 MACsec
6.11 Digital certificates (enrollment and policy matching)
6.12 Wireless access