腾科网络

CCIE 安全方向.

上课时段: 详见内容

课程价格: 请咨询

优惠价格: 请咨询

授课学校: 腾科网络

课程详情2013-06-06 14:42
CCIE 安全方向 CCIE Sec (网络安全方向CCIE) 网络安全CCIE认证意味着从业人士拥有专家级别网络安全知识,可以从事园区网到骨干网的安全设计、规划、实施、维护及安全故障分析等工作。为企业或者客户提供专家级网络安全解决方案。 认证所需 CCIE Sec考试无需其它证书做为前提,任何有意了解网络安全架构的个人都可以参加 认证考试 CCIE Sec认证考试分为以两个组成部分: 1. CCIE Sec 笔试(),2小时考试时间 2. CCIE Sec Lab 考试,8小时的实验考试时间 任何方向的CCIE有有效期为2年,届时参加任何一方向的CCIE笔试便可以激活! 其中笔试称为ualification Exam,即资格考试,意味着必须先通过笔试部分的考试才能参加第2部分的Lab考试。笔试部分思科是委托国际电子考试中心VUE统一考试,目前*大多数都有VUE考场,所以基本可以本地预约完成考试。而实验部分,目前思科在全球有13个考场。*在北京和香港的思科分部都有CCIE Lab考场。Lab考试需要在通过资格考试之后向思科预约考试位置 CCIE Sec 官方考试大纲一览 The topic areas listed are general guidelines for the type of content that is likely to appear on the exam. Please note, however, that other relevant or related topic areas may also appear. The CCIE Security Written exam for the curriculum is a two-hour, multiple choice test with 100 uestions covering the areas of skills and competency needed by a Security Engineer to implement、deploy、configure、maintain、and troubleshoot Cisco Network Security solutions and designs. Topics include Cisco network security devices、appliances、protocols、firewalls、VPNs、intrusion prevention devices、policy management、and best practices for implementing a secure network. Exam Sections and Sub-task Objectives
1. Implement secure networks using Cisco ASA Firewalls -Perform basic firewall Initialization -Configure device management -Configure address translation (nat, global, static) -Configure ACLs -Configure IP routing -Configure object groups -Configure VLANs -Configure filtering -Configure failover -Configure Layer 2 Transparent Firewall -Configure security contexts (virtual firewall) -Configure Modular Policy Framework -Configure Application-Aware Inspection -Configure high availability solutions -Configure oS policies
2. Implement secure networks using Cisco IOS Firewalls -Configure CBAC -Configure Zone-Based Firewall -Configure Audit -Configure Auth Proxy -Configure PAM -Configure access control -Configure performance tuning -Configure advanced IOS Firewall features
3. Implement secure networks using Cisco VPN solutions -Configure IPsec LAN-to-LAN (IOS/ASA) -Configure SSL VPN (IOS/ASA) -Configure Dynamic Multipoint VPN (DMVPN) -Configure Group Encrypted Transport (GET) VPN -Configure Easy VPN (IOS/ASA) -Configure CA (PKI) -Configure Remote Access VPN -Configure Cisco Unity Client -Configure Clientless WebVPN -Configure AnyConnect VPN -Configure XAuth, Split-Tunnel, RRI, NAT-T -Configure High Availability -Configure oS for VPN -Configure GRE, mGRE -Configure L2TP -Configure advanced Cisco VPN features
4. Configure Cisco IPS to mitigate network threats -Configure IPS 4200 Series Sensor Appliance -Initialize the Sensor Appliance -Configure Sensor Appliance management -Configure virtual Sensors on the Sensor Appliance -Configure security policies -Configure promiscuous and inline monitoring on the Sensor Appliance -Configure and tune signatures on the Sensor Appliance -Configure custom signatures on the Sensor Appliance -Configure blocking on the Sensor Appliance -Configure TCP resets on the Sensor Appliance -Configure rate limiting on the Sensor Appliance -Configure signature engines on the Sensor Appliance -Use IDM to configure the Sensor Appliance -Configure event action on the Sensor Appliance -Configure event monitoring on the Sensor Appliance -Configure advanced features on the Sensor Appliance Configure and tune Cisco IOS IPS -Configure SPAN & RSPAN on Cisco switches -Configure proxy authentication -Configure -Configure advanced identity management features -Configure Cisco NAC Framework
5. Implement Control Plane and Management Plane Security -Implement routing plane security features -Configure Control Plane Policing -Configure CP protection and management protection -Configure broadcast control and switchport security -Configure additional CPU protection mechanisms (options drop, logging interval) -Disable unnecessary services -Control device access (Telnet, HTTP, SSH, Privilege levels) -Configure SNMP, Syslog, AAA, NTP -Configure service authentication (FTP, Telnet, HTTP, other) -Configure RADIUS and TACACS+ security protocols -Configure device management and security
6. Configure Advanced Security -Configure mitigation techniues to respond to network attacks -Configure packet marking techniues -Implement security RFCs (RFC1918/3330, RFC2827/3704) -Configure Black Hole and Sink Hole solutions -Configure RTBH filtering (Remote Triggered Black Hole) -Configure Traffic Filtering using Access-Lists -Configure IOS NAT -Configure TCP Intercept -Configure uRPF 、CAR、 NBAR、 NetFlow 、Anti-Spoofing solutions -Capture and utilize packet captures -Configure Transit Traffic Control and Congestion Management -Configure Cisco Catalyst advanced security features
7. Identify and Mitigate Network Attacks -Identify and protect against fragmentation attacks -Identify and protect against malicious IP option usage -Identify and protect against network reconnaissance attacks -Identify and protect against IP spoofing attacks -Identify and protect against MAC spoofing attacks -Identify and protect against ARP spoofing attacks -Identify and protect against Denial of Service (DoS) attacks -Identify and protect against Distributed Denial of Service (DDoS) attacks -Identify and protect against Man-in-the-Middle (MiM) attacks -Identify and protect against port redirection attacks -Identify and protect against DHCP attacks -Identify and protect against DNS attacks -Identify and protect against Smurf attacks -Identify and protect against SYN attacks -Identify and protect against MAC Flooding attacks -Identify and protect against VLAN hopping attacks -Identify and protect against various Layer2 and Layer3 attacks

相关课程

温馨提示:提交留言后老师会第一时间与您联系! 热线电话:400-850-8622