Describing Information Security Concepts* |
•Information Security Overview |
•Managing Risk |
•Vulnerability Assessment |
•Understanding CVSS |
|
Describing Common TCP/IP Attacks* |
•Legacy TCP/IP Vulnerabilities |
•IP Vulnerabilities |
•ICMP Vulnerabilities |
•TCP Vulnerabilities |
•UDP Vulnerabilities |
•Attack Surface and Attack Vectors |
•Reconnaissance Attacks |
•Access Attacks |
•Man-In-The-Middle Attacks |
•Denial of Service and Distributed Denial of Service Attacks |
•Reflection and Amplification Attacks |
•Spoofing Attacks |
•DHCP Attacks |
|
Describing Common Network Application Attacks* |
•Password Attacks |
•DNS-Based Attacks |
•DNS Tunneling |
•Web-Based Attacks |
•HTTP 302 Cushioning |
•Command Injections |
•SQL Injections |
•Cross-Site Scripting and Request Forgery |
•Email-Based Attacks |
|
Describing Common Endpoint Attacks* |
•Buffer Overflow |
•Malware |
•Reconnaissance Attack |
•Gaining Access and Control |
•Gaining Access via Social Engineering |
•Gaining Access via Web-Based Attacks |
•Exploit Kits and Rootkits |
•Privilege Escalation |
•Post-Exploitation Phase |
•Angler Exploit Kit |
|
Describing Network Security Technologies |
•Defense-in-Depth Strategy |
•Defending Across the Attack Continuum |
•Network Segmentation and Virtualization Overview |
•Stateful Firewall Overview |
•Security Intelligence Overview |
•Threat Information Standardization |
•Network-Based Malware Protection Overview |
•IPS Overview |
•Next Generation Firewall Overview |
•Email Content Security Overview |
•Web Content Security Overview |
•Threat Analytic Systems Overview |
•DNS Security Overview |
•Authentication, Authorization, and Accounting Overview |
•Identity and Access Management Overview |
•Virtual Private Network Technology Overview |
•Network Security Device Form Factors Overview |
|
Deploying Cisco ASA Firewall |
•Cisco ASA Deployment Types |
•Cisco ASA Interface Security Levels |
•Cisco ASA Objects and Object Groups |
•Network Address Translation |
•Cisco ASA Interface ACLs |
•Cisco ASA Global ACLs |
•Cisco ASA Advanced Access Policies |
•Cisco ASA High Availability Overview |
|
Deploying Cisco Firepower Next-Generation Firewall |
•Cisco Firepower NGFW Deployments |
•Cisco Firepower NGFW Packet Processing and Policies |
•Cisco Firepower NGFW Objects |
•Cisco Firepower NGFW NAT |
•Cisco Firepower NGFW Prefilter Policies |
•Cisco Firepower NGFW Access Control Policies |
•Cisco Firepower NGFW Security Intelligence |
•Cisco Firepower NGFW Discovery Policies |
•Cisco Firepower NGFW IPS Policies |
•Cisco Firepower NGFW Malware and File Policies |
|
Deploying Email Content Security |
•Cisco Email Content Security Overview |
•SMTP Overview |
•Email Pipeline Overview |
•Public and Private Listeners |
•Host Access Table Overview |
•Recipient Access Table Overview |
•Mail Policies Overview |
•Protection Against Spam and Graymail |
•Anti-virus and Anti-malware Protection |
•Outbreak Filters |
•Content Filters |
•Data Loss Prevention |
•Email Encryption |
|
Deploying Web Content Security |
•Cisco WSA Overview |
•Deployment Options |
•Network Users Authentication |
•HTTPS Traffic Decryption |
•Access Policies and Identification Profiles |
•Acceptable Use Controls Settings |
•Anti-Malware Protection |
|
Deploying Cisco Umbrella* |
•Cisco Umbrella Architecture |
•Deploying Cisco Umbrella |
•Cisco Umbrella Roaming Client |
•Managing Cisco Umbrella |
•Cisco Umbrella Investigate Overview |
|
Explaining VPN Technologies and Cryptography |
•VPN Definition |
•VPN Types |
•Secure Communication and Cryptographic Services |
•Keys in Cryptography |
•Public Key Infrastructure |
|
Introducing Cisco Secure Site-to-Site VPN Solutions |
•Site-to-Site VPN Topologies |
•IPsec VPN Overview |
•IPsec Static Crypto Maps |
•IPsec Static Virtual Tunnel Interface |
•Dynamic Multipoint VPN |
•Cisco IOS FlexVPN |
|
Deploying Cisco IOS VTI-Based Point-to-Point |
•Cisco IOS VTIs |
•Static VTI Point-to-Point IPsec IKEv2 VPN Configuration |
|
Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW |
•Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW |
•Cisco ASA Point-to-Point VPN Configuration |
•Cisco Firepower NGFW Point-to-Point VPN Configuration |
|
Introducing Cisco Secure Remote Access VPN Solutions |
•Remote Access VPN Components |
•Remote Access VPN Technologies |
•SSL Overview |
|
Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW |
•Remote Access Configuration Concepts |
•Connection Profiles |
•Group Policies |
•Cisco ASA Remote Access VPN Configuration |
•Cisco Firepower NGFW Remote Access VPN Configuration |
|
Explaining Cisco Secure Network Access Solutions |
•Cisco Secure Network Access |
•Cisco Secure Network Access Components |
•AAA Role in Cisco Secure Network Access Solution |
•Cisco Identity Services Engine |
•Cisco TrustSec |
|
Describing 802.1X Authentication |
•802.1X and EAP |
•EAP Methods |
•Role of RADIUS in 802.1X Communications |
•RADIUS Change of Authorization |
|
Configuring 802.1X Authentication |
•Cisco Catalyst Switch 802.1X Configuration |
•Cisco WLC 802.1X Configuration |
•Cisco ISE 802.1X Configuration |
•Supplicant 802.1x Configuration |
•Cisco Central Web Authentication |
|
Describing Endpoint Security Technologies* |
•Host-Based Personal Firewall |
•Host-Based Anti-Virus |
•Host-Based Intrusion Prevention System |
•Application Whitelists and Blacklists |
•Host-Based Malware Protection |
•Sandboxing Overview |
•File Integrity Checking |
|
Deploying Cisco AMP for Endpoints* |
•Cisco AMP for Endpoints Architecture |
•Cisco AMP for Endpoints Engines |
•Retrospective Security with Cisco AMP |
•Cisco AMP Device and File Trajectory |
•Managing Cisco AMP for Endpoints |
|
Introducing Network Infrastructure Protection* |
•Identifying Network Device Planes |
•Control Plane Security Controls |
•Management Plane Security Controls |
•Network Telemetry |
•Layer 2 Data Plane Security Controls |
•Layer 3 Data Plane Security Controls |
|
Deploying Control Plane Security Controls* |
•Infrastructure ACLs |
•Control Plane Policing |
•Control Plane Protection |
•Routing Protocol Security |
|
Deploying Layer 2 Data Plane Security Controls* |
•Overview of Layer 2 Data Plane Security Controls |
•VLAN-Based Attacks Mitigation |
•STP Attacks Mitigation |
•Port Security |
•Private VLANs |
•DHCP Snooping |
•ARP Inspection |
•Storm Control |
•MACsec Encryption |
|
Deploying Layer 3 Data Plane Security Controls* |
•Infrastructure Antispoofing ACLs |
•Unicast Reverse Path Forwarding |
•IP Source Guard |
|
* This section is self-study material that can be done at your own pace if you are taking the instructor-led version of this course. |