| Describing Information Security Concepts* |
| -Information Security Overview |
| -Managing Risk |
| -Vulnerability Assessment |
| -Understanding CVSS |
|
| Describing Common TCP/IP Attacks* |
| -Legacy TCP/IP Vulnerabilities |
| -IP Vulnerabilities |
| -ICMP Vulnerabilities |
| -TCP Vulnerabilities |
| -UDP Vulnerabilities |
| -Attack Surface and Attack Vectors |
| -Reconnaissance Attacks |
| -Access Attacks |
| -Man-In-The-Middle Attacks |
| -Denial of Service and Distributed Denial of Service Attacks |
| -Reflection and Amplification Attacks |
| -Spoofing Attacks |
| -DHCP Attacks |
|
| Describing Common Network Application Attacks |
| -Password Attacks |
| -DNS-Based Attacks |
| -DNS Tunneling |
| -Web-Based Attacks |
| -HTTP 302 Cushioning |
| -Command Injections |
| -SQL Injections |
| -Cross-Site Scripting and Request Forgery |
| -Email-Based Attacks |
|
| Describing Common Endpoint Attacks |
| -Buffer Overflow |
| -Malware |
| -Reconnaissance Attack |
| -Gaining Access and Control |
| -Gaining Access via Social Engineering |
| -Gaining Access via Web-Based Attacks |
| -Exploit Kits and Rootkits |
| -Privilege Escalation |
| -Post-Exploitation Phase |
| -Angler Exploit Kit |
|
| Describing Network Security Technologies |
| -Defence-in-Depth Strategy |
| -Defending Across the Attack Continuum |
| -Network Segmentation and Virtualization Overview |
| -Stateful Firewall Overview |
| -Security Intelligence Overview |
| -Threat Information Standardisation |
| -Network-Based Malware Protection Overview |
| -IPS Overview |
| -Next Generation Firewall Overview |
| -Email Content Security Overview |
| -Web Content Security Overview |
| -Threat Analytic Systems Overview |
| -DNS Security Overview |
| -Authentication, Authorization, and Accounting Overview |
| -Identity and Access Management Overview |
| -Virtual Private Network Technology Overview |
| -Network Security Device Form Factors Overview |
|
| Deploying Cisco ASA Firewall |
| -Cisco ASA Deployment Types |
| -Cisco ASA Interface Security Levels |
| -Cisco ASA Objects and Object Groups |
| -Network Address Translation |
| -Cisco ASA Interface ACLs |
| -Cisco ASA Global ACLs |
| -Cisco ASA Advanced Access Policies |
| -Cisco ASA High Availability Overview |
|
| Deploying Cisco Firepower Next-Generation Firewall |
| -Cisco Firepower NGFW Deployments |
| -Cisco Firepower NGFW Packet Processing and Policies |
| -Cisco Firepower NGFW Objects |
| -Cisco Firepower NGFW NAT |
| -Cisco Firepower NGFW Prefilter Policies |
| -Cisco Firepower NGFW Access Control Policies |
| -Cisco Firepower NGFW Security Intelligence |
| -Cisco Firepower NGFW Discovery Policies |
| -Cisco Firepower NGFW IPS Policies |
| -Cisco Firepower NGFW Malware and File Policies |
|
| Deploying Email Content Security |
| -Cisco Email Content Security Overview |
| -SMTP Overview |
| -Email Pipeline Overview |
| -Public and Private Listeners |
| -Host Access Table Overview |
| -Recipient Access Table Overview |
| -Mail Policies Overview |
| -Protection Against Spam and Graymail |
| -Anti-virus and Anti-malware Protection |
| -Outbreak Filters |
| -Content Filters |
| -Data Loss Prevention |
| -Email Encryption |
|
| Deploying Web Content Security |
| -Cisco WSA Overview |
| -Deployment Options |
| -Network Users Authentication |
| -HTTPS Traffic Decryption |
| -Access Policies and Identification Profiles |
| -Acceptable Use Controls Settings |
| -Anti-Malware Protection |
|
| Deploying Cisco Umbrella* |
| -Cisco Umbrella Architecture |
| -Deploying Cisco Umbrella |
| -Cisco Umbrella Roaming Client |
| -Managing Cisco Umbrella |
| -Cisco Umbrella Investigate Overview |
|
| Explaining VPN Technologies and Cryptography |
| -VPN Definition |
| -VPN Types |
| -Secure Communication and Cryptographic Services |
| -Keys in Cryptography |
| -Public Key Infrastructure |
|
| Introducing Cisco Secure Site-to-Site VPN Solutions |
| -Site-to-Site VPN Topologies |
| -IPsec VPN Overview |
| -IPsec Static Crypto Maps |
| -IPsec Static Virtual Tunnel Interface |
| -Dynamic Multipoint VPN |
| -Cisco IOS FlexVPN |
|
| Deploying Cisco IOS VTI-Based Point-to-Point |
| -Cisco IOS VTIs |
| -Static VTI Point-to-Point IPsec IKEv2 VPN Configuration |
|
| Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW |
| -Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW |
| -Cisco ASA Point-to-Point VPN Configuration |
| -Cisco Firepower NGFW Point-to-Point VPN Configuration |
|
| Introducing Cisco Secure Remote Access VPN Solutions |
| -Remote Access VPN Components |
| -Remote Access VPN Technologies |
| -SSL Overview |
|
| Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW |
| -Remote Access Configuration Concepts |
| -Connection Profiles |
| -Group Policies |
| -Cisco ASA Remote Access VPN Configuration |
| -Cisco Firepower NGFW Remote Access VPN Configuration |
|
| Explaining Cisco Secure Network Access Solutions |
| -Cisco Secure Network Access |
| -Cisco Secure Network Access Components |
| -AAA Role in Cisco Secure Network Access Solution |
| -Cisco Identity Services Engine |
| -Cisco TrustSec |
|
| Describing 802.1X Authentication |
| -802.1X and EAP |
| -EAP Methods |
| -Role of RADIUS in 802.1X Communications |
| -RADIUS Change of Authorization |
|
| Configuring 802.1X Authentication |
| -Cisco Catalyst Switch 802.1X Configuration |
| -Cisco WLC 802.1X Configuration |
| -Cisco ISE 802.1X Configuration |
| -Supplicant 802.1x Configuration |
| -Cisco Central Web Authentication |
|
| Describing Endpoint Security Technologies* |
| -Host-Based Personal Firewall |
| -Host-Based Anti-Virus |
| -Host-Based Intrusion Prevention System |
| -Application Whitelists and Blacklists |
| -Host-Based Malware Protection |
| -Sandboxing Overview |
| -File Integrity Checking |
|
| Deploying Cisco AMP for Endpoints* |
| -Cisco AMP for Endpoints Architecture |
| -Cisco AMP for Endpoints Engines |
| -Retrospective Security with Cisco AMP |
| -Cisco AMP Device and File Trajectory |
| -Managing Cisco AMP for Endpoints |
|
| Introducing Network Infrastructure Protection |
| -Identifying Network Device Plans |
| -Control Plane Security Controls |
| -Management Plane Security Controls |
| -Network Telemetry |
| -Layer 2 Data Plane Security Controls |
| -Layer 3 Data Plane Security Controls |
|
| Deploying Control Plane Security Controls* |
| -Infrastructure ACLs |
| -Control Plane Policing |
| -Control Plane Protection |
| -Routing Protocol Security |
|
| Deploying Layer 2 Data Plane Security Controls* |
| -Overview of Layer 2 Data Plane Security Controls |
| -VLAN-Based Attacks Mitigation |
| -STP Attacks Mitigation |
| -Port Security |
| -Private VLANs |
| -DHCP Snooping |
| -ARP Inspection |
| -Storm Control |
| -MACsec Encryption |
|
| Deploying Layer 3 Data Plane Security Controls* |
| -Infrastructure Antispoofing ACLs |
| -Unicast Reverse Path Forwarding |
| -IP Source Guard |
|
| * This section is self-study material that can be done at your own pace if you are taking the instructor-led version of this course. |