| Describing Information Security Concepts* | 
		
		
			| •Information Security Overview | 
		
		
			| •Managing Risk | 
		
		
			| •Vulnerability Assessment | 
		
		
			| •Understanding CVSS | 
		
		
			|   | 
		
		
			| Describing Common TCP/IP Attacks* | 
		
		
			| •Legacy TCP/IP Vulnerabilities | 
		
		
			| •IP Vulnerabilities | 
		
		
			| •ICMP Vulnerabilities | 
		
		
			| •TCP Vulnerabilities | 
		
		
			| •UDP Vulnerabilities | 
		
		
			| •Attack Surface and Attack Vectors | 
		
		
			| •Reconnaissance Attacks | 
		
		
			| •Access Attacks | 
		
		
			| •Man-In-The-Middle Attacks | 
		
		
			| •Denial of Service and Distributed Denial of Service Attacks | 
		
		
			| •Reflection and Amplification Attacks | 
		
		
			| •Spoofing Attacks | 
		
		
			| •DHCP Attacks | 
		
		
			|   | 
		
		
			| Describing Common Network Application Attacks* | 
		
		
			| •Password Attacks | 
		
		
			| •DNS-Based Attacks | 
		
		
			| •DNS Tunneling | 
		
		
			| •Web-Based Attacks | 
		
		
			| •HTTP 302 Cushioning | 
		
		
			| •Command Injections | 
		
		
			| •SQL Injections | 
		
		
			| •Cross-Site Scripting and Request Forgery | 
		
		
			| •Email-Based Attacks | 
		
		
			|   | 
		
		
			| Describing Common Endpoint Attacks* | 
		
		
			| •Buffer Overflow | 
		
		
			| •Malware | 
		
		
			| •Reconnaissance Attack | 
		
		
			| •Gaining Access and Control | 
		
		
			| •Gaining Access via Social Engineering | 
		
		
			| •Gaining Access via Web-Based Attacks | 
		
		
			| •Exploit Kits and Rootkits | 
		
		
			| •Privilege Escalation | 
		
		
			| •Post-Exploitation Phase | 
		
		
			| •Angler Exploit Kit | 
		
		
			|   | 
		
		
			| Describing Network Security Technologies | 
		
		
			| •Defense-in-Depth Strategy | 
		
		
			| •Defending Across the Attack Continuum | 
		
		
			| •Network Segmentation and Virtualization Overview | 
		
		
			| •Stateful Firewall Overview | 
		
		
			| •Security Intelligence Overview | 
		
		
			| •Threat Information Standardization | 
		
		
			| •Network-Based Malware Protection Overview | 
		
		
			| •IPS Overview | 
		
		
			| •Next Generation Firewall Overview | 
		
		
			| •Email Content Security Overview | 
		
		
			| •Web Content Security Overview | 
		
		
			| •Threat Analytic Systems Overview | 
		
		
			| •DNS Security Overview | 
		
		
			| •Authentication, Authorization, and Accounting Overview | 
		
		
			| •Identity and Access Management Overview | 
		
		
			| •Virtual Private Network Technology Overview | 
		
		
			| •Network Security Device Form Factors Overview | 
		
		
			|   | 
		
		
			| Deploying Cisco ASA Firewall | 
		
		
			| •Cisco ASA Deployment Types | 
		
		
			| •Cisco ASA Interface Security Levels | 
		
		
			| •Cisco ASA Objects and Object Groups | 
		
		
			| •Network Address Translation | 
		
		
			| •Cisco ASA Interface ACLs | 
		
		
			| •Cisco ASA Global ACLs | 
		
		
			| •Cisco ASA Advanced Access Policies | 
		
		
			| •Cisco ASA High Availability Overview | 
		
		
			|   | 
		
		
			| Deploying Cisco Firepower Next-Generation Firewall | 
		
		
			| •Cisco Firepower NGFW Deployments | 
		
		
			| •Cisco Firepower NGFW Packet Processing and Policies | 
		
		
			| •Cisco Firepower NGFW Objects | 
		
		
			| •Cisco Firepower NGFW NAT | 
		
		
			| •Cisco Firepower NGFW Prefilter Policies | 
		
		
			| •Cisco Firepower NGFW Access Control Policies | 
		
		
			| •Cisco Firepower NGFW Security Intelligence | 
		
		
			| •Cisco Firepower NGFW Discovery Policies | 
		
		
			| •Cisco Firepower NGFW IPS Policies | 
		
		
			| •Cisco Firepower NGFW Malware and File Policies | 
		
		
			|   | 
		
		
			| Deploying Email Content Security | 
		
		
			| •Cisco Email Content Security Overview | 
		
		
			| •SMTP Overview | 
		
		
			| •Email Pipeline Overview | 
		
		
			| •Public and Private Listeners | 
		
		
			| •Host Access Table Overview | 
		
		
			| •Recipient Access Table Overview | 
		
		
			| •Mail Policies Overview | 
		
		
			| •Protection Against Spam and Graymail | 
		
		
			| •Anti-virus and Anti-malware Protection | 
		
		
			| •Outbreak Filters | 
		
		
			| •Content Filters | 
		
		
			| •Data Loss Prevention | 
		
		
			| •Email Encryption | 
		
		
			|   | 
		
		
			| Deploying Web Content Security | 
		
		
			| •Cisco WSA Overview | 
		
		
			| •Deployment Options | 
		
		
			| •Network Users Authentication | 
		
		
			| •HTTPS Traffic Decryption | 
		
		
			| •Access Policies and Identification Profiles | 
		
		
			| •Acceptable Use Controls Settings | 
		
		
			| •Anti-Malware Protection | 
		
		
			|   | 
		
		
			| Deploying Cisco Umbrella* | 
		
		
			| •Cisco Umbrella Architecture | 
		
		
			| •Deploying Cisco Umbrella | 
		
		
			| •Cisco Umbrella Roaming Client | 
		
		
			| •Managing Cisco Umbrella | 
		
		
			| •Cisco Umbrella Investigate Overview | 
		
		
			|   | 
		
		
			| Explaining VPN Technologies and Cryptography | 
		
		
			| •VPN Definition | 
		
		
			| •VPN Types | 
		
		
			| •Secure Communication and Cryptographic Services | 
		
		
			| •Keys in Cryptography | 
		
		
			| •Public Key Infrastructure | 
		
		
			|   | 
		
		
			| Introducing Cisco Secure Site-to-Site VPN Solutions | 
		
		
			| •Site-to-Site VPN Topologies | 
		
		
			| •IPsec VPN Overview | 
		
		
			| •IPsec Static Crypto Maps | 
		
		
			| •IPsec Static Virtual Tunnel Interface | 
		
		
			| •Dynamic Multipoint VPN | 
		
		
			| •Cisco IOS FlexVPN | 
		
		
			|   | 
		
		
			| Deploying Cisco IOS VTI-Based Point-to-Point | 
		
		
			| •Cisco IOS VTIs | 
		
		
			| •Static VTI Point-to-Point IPsec IKEv2 VPN Configuration | 
		
		
			|   | 
		
		
			| Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW | 
		
		
			| •Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW | 
		
		
			| •Cisco ASA Point-to-Point VPN Configuration | 
		
		
			| •Cisco Firepower NGFW Point-to-Point VPN Configuration | 
		
		
			|   | 
		
		
			| Introducing Cisco Secure Remote Access VPN Solutions | 
		
		
			| •Remote Access VPN Components | 
		
		
			| •Remote Access VPN Technologies | 
		
		
			| •SSL Overview | 
		
		
			|   | 
		
		
			| Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW | 
		
		
			| •Remote Access Configuration Concepts | 
		
		
			| •Connection Profiles | 
		
		
			| •Group Policies | 
		
		
			| •Cisco ASA Remote Access VPN Configuration | 
		
		
			| •Cisco Firepower NGFW Remote Access VPN Configuration | 
		
		
			|   | 
		
		
			| Explaining Cisco Secure Network Access Solutions | 
		
		
			| •Cisco Secure Network Access | 
		
		
			| •Cisco Secure Network Access Components | 
		
		
			| •AAA Role in Cisco Secure Network Access Solution | 
		
		
			| •Cisco Identity Services Engine | 
		
		
			| •Cisco TrustSec | 
		
		
			|   | 
		
		
			| Describing 802.1X Authentication | 
		
		
			| •802.1X and EAP | 
		
		
			| •EAP Methods | 
		
		
			| •Role of RADIUS in 802.1X Communications | 
		
		
			| •RADIUS Change of Authorization | 
		
		
			|   | 
		
		
			| Configuring 802.1X Authentication | 
		
		
			| •Cisco Catalyst Switch 802.1X Configuration | 
		
		
			| •Cisco WLC 802.1X Configuration | 
		
		
			| •Cisco ISE 802.1X Configuration | 
		
		
			| •Supplicant 802.1x Configuration | 
		
		
			| •Cisco Central Web Authentication | 
		
		
			|   | 
		
		
			| Describing Endpoint Security Technologies* | 
		
		
			| •Host-Based Personal Firewall | 
		
		
			| •Host-Based Anti-Virus | 
		
		
			| •Host-Based Intrusion Prevention System | 
		
		
			| •Application Whitelists and Blacklists | 
		
		
			| •Host-Based Malware Protection | 
		
		
			| •Sandboxing Overview | 
		
		
			| •File Integrity Checking | 
		
		
			|   | 
		
		
			| Deploying Cisco AMP for Endpoints* | 
		
		
			| •Cisco AMP for Endpoints Architecture | 
		
		
			| •Cisco AMP for Endpoints Engines | 
		
		
			| •Retrospective Security with Cisco AMP | 
		
		
			| •Cisco AMP Device and File Trajectory | 
		
		
			| •Managing Cisco AMP for Endpoints | 
		
		
			|   | 
		
		
			| Introducing Network Infrastructure Protection* | 
		
		
			| •Identifying Network Device Planes | 
		
		
			| •Control Plane Security Controls | 
		
		
			| •Management Plane Security Controls | 
		
		
			| •Network Telemetry | 
		
		
			| •Layer 2 Data Plane Security Controls | 
		
		
			| •Layer 3 Data Plane Security Controls | 
		
		
			|   | 
		
		
			| Deploying Control Plane Security Controls* | 
		
		
			| •Infrastructure ACLs | 
		
		
			| •Control Plane Policing | 
		
		
			| •Control Plane Protection | 
		
		
			| •Routing Protocol Security | 
		
		
			|   | 
		
		
			| Deploying Layer 2 Data Plane Security Controls* | 
		
		
			| •Overview of Layer 2 Data Plane Security Controls | 
		
		
			| •VLAN-Based Attacks Mitigation | 
		
		
			| •STP Attacks Mitigation | 
		
		
			| •Port Security | 
		
		
			| •Private VLANs | 
		
		
			| •DHCP Snooping | 
		
		
			| •ARP Inspection | 
		
		
			| •Storm Control | 
		
		
			| •MACsec Encryption | 
		
		
			|   | 
		
		
			| Deploying Layer 3 Data Plane Security Controls* | 
		
		
			| •Infrastructure Antispoofing ACLs | 
		
		
			| •Unicast Reverse Path Forwarding | 
		
		
			| •IP Source Guard | 
		
		
			|   | 
		
		
			| * This section is self-study material that can be done at your own pace if you are taking the instructor-led version of this course. |