Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    INE - CCIE Security 5-Day Bootcamp Training

    Posted By: IrGens
    INE - CCIE Security 5-Day Bootcamp Training

    INE - CCIE Security 5-Day Bootcamp Training
    2014 | .MOV, AVC, 1280x720 | English, AAC, 2 Ch | 7.52 GB
    Genre: eLearning

    For 5 full days you can join our highly certified team of CCIE Instructors for comprehensive CCIE Security lab exam training. This bootcamp will help candidates who are nearing their CCIE lab dates to hone and consolidate their technical knowledge into an organized and effective strategy for passing their CCIE lab exam.

    INE's CCIE Security 5-Day Live Lab Preparation Bootcamp is part lecture, part hands-on, and focuses both on developing a structured approach to CCIE Lab strategy and advanced hands-on scenarios. Students will each have access to a dedicated rack of Cisco equipment that consists of the latest CCIE Security equipment and platforms as outlined by the CCIE lab blueprint.

    The goal of this bootcamp is for students to finish fully prepared to take and pass their CCIE Security lab exam anywhere from 1 - 4 weeks afterwards. While ultimate success is up to each individual, our instructors will ensure that every participant has the tools and information they'll need to be successful.

    CCIE Security 5-Day Bootcamp Overview

    The following is a condensed list of the topics that will be covered during the Bootcamp. The class goes over the theoretical as well as practical aspects of the below mentioned technologies. Notice that the list is just a guideline, and does not exhaust all technologies discussed during the class.

    ASA Firewall

    Interfaces and VLANs
    Routed and Transparent
    Multiple and Single Context
    Access-List Filtering
    Network Address Translation
    MPF and Advanced Inspection
    Failover
    Routing Protocols: OSPF, EIGRP and RIP
    High Availability Features
    Other Advanced Features

    IOS Firewall

    Access-Lists
    CBAC Feature Set
    Zone-Based Firewall
    IOS NAT Features
    Firewall Tuning
    Advanced Filtering Techniques

    VPN

    IPsec LAN-to-LAN
    IPsec ezVPN Server
    SSL VPN (Anyconnect VPN)
    DMVPN
    GET VPN
    WebVPN (Clientless SSL VPN)
    IOS PKI for Authentication
    L2TPv2 and PPTP
    VPN QoS
    Advanced VPN Features

    Intrusion Prevention System (IPS)

    Initializing IPS 4200
    Inline and Promisc Monitoring
    Virtual Sensors, Subinterfaces, VLAN Groups
    Signature Tuning
    Custom Signatures
    Blocking/Rate Limiting/TCP Resets
    Tuning Signature Engines
    Event Monitoring and Processing
    Configuring SPAN/RSPAN/RITE
    IDM and IPS Manager Express
    Other Advanced Features

    Identity Management

    AAA List Configuration
    RADIUS, TACACS+ Protocols and Attrbutes
    LDAP server VPN Authorization and Authentication
    Configuring CS ACS Server
    X.509 Certificate-Based Authentication for VPNs
    IOS Authentication Proxy
    802.1x Authentication and Authorization
    IOS/ASA Command Authorization
    ASA Cut-Through Authentication Proxy
    Other Advanced Features

    Advanced Security

    Routing Protocol Security
    Control Plane Protection Features
    Flexible Packet Matching
    Storm Control and STP Security Features
    VLAN Access-Lists
    Router Hardening
    Router Management: Telnet, SSH, SNMP, HTTP
    QoS for Attack Mitigation: Classification, Marking, Queueing and Policing
    DHCP Security Features
    Traffic Capturing
    Other Advanced Features

    Network Attacks

    Layer 2 Attacks: MAC Flooding, Spoofing, VLAN Hopping
    Layer 3 Attacks: Fragmentation, IP Spoofing, ARP Spoofing, IP Options, Smurf
    Layer 4 Attacks: SYN Flooding, TCP Hijacking, Port Redirection, MitM
    Application Level Attacks: MitM, DNS poisoning, Vulnerability Exploitation
    Network Reconnaissance
    DoS and DDoS Attacks: Using RTBH for Mitigation
    Other mitigation techniques

    INE - CCIE Security 5-Day Bootcamp Training