CCIE Security Lab / Bootcamp

Why choose JNtech Networks for Cisco CCIE LAB/BOOT CAMP?

CCIE Security Lab / Bootcamp Training

CCIE Security lab V5 exam is a mandatory exam to become a Cisco CCIE Security certified network engineer. It is an 8-hour exam needs to have hands-on experience to plan, configure, implement, maintain, and troubleshoot complex network security scenarios in enterprise networks. Lab exam validates candidate skills and knowledge about troubleshooting and diagnosis techniques to keep networks safe from security threats.

JNtech Networks offers the Bootcamp training for the lab exam in India, where we cover each topic in depth. We have a large pool of CCIE certified trainers with 24*7 lab access facility for classroom training and 24*7 virtual racks access to online training. Our CCIE Security boot camp training covers in-depth topics of troubleshooting module, diagnostic module and configuration module.

Aspirants will train in network security requirements, how different network devices inter-operate, and how to translate it into the device configuration.

The requirement of CCIE certified engineers is huge in Networking Industry. With this fact in mind, even the recession phase like the pandemic won’t affect the need for Certified CCIE Security Engineers.

For most of the IT giants, there is an immense need for a properly made and executed secured network. Even a small hindrance in the network can cause huge losses for these companies. Hence, network specialists are inevitable in such companies. For the same reason, CCIE is considered as the ladder to a secured and high-end career across the globe.

CCIE experts are the highest paid IT professionals and even the freshers carry an attractive salary package to start with. So, if you are considering a career for your future and getting conscious ready, CCIE can bag you a great opportunity.

Choosing JNTech Networks –

At JNTech Networks, you can achieve a new track that covers technology from previous CCIE routing. We cover SD-ACCESS and SD-WAN technologies which are the most demanded in the future.

To earn CCIE Enterprise Infrastructure Certification, you have to pass two exams, that covers core enterprise and a hands-on lab exam. In our Bootcamp training, we can teach you technologies to cover entire enterprise networking, designing and deploying the network to operation and optimizing.

CCIE lab examination training includes

  • Hands-on Experience on CCIE Lab
  • Training Video Provided
  • World-class Instructors
  • Detailed Training
  • Rack Rental Pricing available
  • Full Support 24*7

Find the Best Career Transforming Training Style

We understand that many of us are not able to attend the classroom classes and there are many more who prefer in-room classes. Both of the class types have their benefits. We have classes-

  1. Cost-effective Online classes by Instructor-led training gives benefits of live, in-person training with the comfort of home. All you need is a computer to get the lectures. We also have doubt sessions for clearing all the questions about the subject.
  2. Self-Paced e-learning course material for learning at your times and subscriptions. These are on-demand lectures that can be accessed from anywhere and anytime at any speed.
  3. Classroom training, for those who are willing to have an in-lab practice and experience which gives an immersive experience. Our labs are 24*7*365 open for practice and doubts.

You can use our contact details to contact us and get the offer immediately and register for CCIE Security Bootcamp training.

Training Modes

Instructor Led Training/Online Training for course

Classroom Training

On Demand Training

Training Schedule For CCIE Course


Upcoming Batches

February 2024

16th February 2024

February 2024

25th February 2024

CCIE Security Course Duration:


1.5 Months 


2.5 Months


As per candidate schedule

Exam Duration:

Lab Exam V5 – 8 hours exam

Fee of CCIE Security Lab Course

Fee Indian Students International Students
Course Fee Rs. 1,30,000 INR $2100 USD


There is CCNA Enterprise Infrastructure Certification and CCNP Security certification must be Cleared.

CCIE Security Lab Exam Syllabus

Cisco ASA Overview

  • Firewall Overview
  • Firewall Techniques
  • Stateless Packet Filtering
  • Stateful Packet Filtering

Cisco ASA Product Family

  • Introducing the Cisco ASA 5500-X Series NGFW
  • Introducing the Cisco ASAv
  • Difference between UTM and NGFW

Cisco ASA Features

  • Using the CLI
  • Using the Cisco ASDM
  • Understanding Factory default configuration
  • Working on the configuration files

Cisco ASA Firewall Interfaces

  • Configuring Physical interfaces
  • Configuring Vlan interfaces
  • Redundant Interface
  • Configuring Interface Security Parameters
  • Naming the interface
  • Security Level
  • Assigning the IP Address

Cisco ASA IP Connectivity

  • Configuring the Static Routing
  • Routing with EIGRP
  • Routing with OSPF
  • Routing with BGP
  • Verifying the routing Table
  • Configuring the SSH and Telnet
  • Configuring HTTP/S

Cisco ASA NAT (Network Address Translation)

  • Understanding the NAT
  • Methods of NAT
  • Inside NAT
  • Outside NAT
  • Implementation of NAT
  • Auto NAT
  • Manual NAT
  • Types of NAT
  • Static
  • NAT
  • PAT
  • Dynamic
  • NAT
  • PAT
  • Twice NAT
  • Identity NAT


  • Inside/ Outside ACL.
  • Object GROUP ACL.
  • Life of a Packet on the Cisco

Cisco ASA Modes

  • Transparent Mode
  • Routed Mode

Cisco ASA Context

  • Admin Context
  • System Context
  • User Context
  • Deployment Guide

Cisco High Availability

  • ASA Failover
  • Active/Standby
  • Active/Active
  • Verifying failover Operations
  • Clustering ASA firewall Wireshark Capture

Cryptography Overview

  • Hash Algorithm
  • Encryption Overview
  • Cryptanalysis
  • Symmetric Encryption Algorithm
  • Asymmetric Encryption Algorithm
  • Digital Signatures
  • PKI Overview
  • PKI Operations

Fundamentals of VPN Technologies and IPSec

  • What is VPN
  • Introduction of Ipsec Terminology
  • VPN Types
  • Ipsec Features
  • Confidentiality, Integrity, Availability and Anti-Replay.
  • IPSec Protocols: – IKE, ESP and AH
  • IKE Modes
  • IKE Phases
  • NAT-T
  • Security Associations and Components
  • How to configure cisco IOS as CA


  • What is Site-to Site VPN
  • Wireshark Capture
  • GRE
  • Gre over IPSec
  • Site-to-Site VPN Labs

Deploying DMVPN

  • DMVPN Overview
  • DMVPN Terminologies
  • NHRP
  • MGRE
  • DMVPN Working
  • DMVPN Advantages and Limitations
  • DMVPN Phase 1, 2 and 3
  • DMVPN Labs
  • DMVPN Redundancy – Dual Hub DMVPN Deployment

Remote Access VPN

  • Remote Access VPN Introduction
  • Remote Access VPN modes
  • Client Mode Software
  • Client Mode Hardware
  • Remote Access with DVTI
  • Remote Access Working
  • Remote Access Labs

Deploying Clientless SSL VPN

  • SSL VPN Overview
  • SSL Handshake
  • SSL VPN Modes
  • Clientless and Thick Client
  • SSL VPN Working
  • SSL VPN Labs

Deploying Anyconnect VPN

  • Anyconnect Overview
  • Connection Policies
  • Group Policies
  • Split Tunnelling
  • Client Profile
  • Anyconnect Image Upload


  • GET VPN Terminologies
  • GDOI
  • Key Server (KS)
  • KEK (Key Encryption Key)
  • TEK (Traffic Encryption Key)
  • Rekey Process (Unicast and Multicast)
  • Group Member (GM)
  • GET VPN Lab and Working

Flex VPN

  • Introduction and Working IOS Flex VPN
  • Flex VPN Labs

Introducing Cisco ISE Architecture and Deployment

  • Security challenges
  • Cisco ISE solutions Use Cases
  • Secure Access Control
  • ISE function
  • ISE deployment components
  • Context visibility
  • ISE Personas
  • ISE Licensing
  • Infrastructure Components
  • Identity Source

Fundamentals of AAA

  • AAA
  • Radius Overview
  • Radius Messages
  • AV Pair
  • IEEE 802.1x Primer
  • EAP
  • Types of EAP
  • Tunnel EAP
  • PEAP
  • Non-Tunnel EAP
  • EAP-MD5
  • Host Mode
  • Deployment of 802.1x

Bootstrap Network Access Devices

  • Radius Commands
  • AAA Commands

Introduction to ISE GUI

  • AD overview and configuration
  • Admin Access
  • Administrative Work
  • Certificate in ISE
  • Personas
  • Probes for ISE
  • Backup/Restore
  • Maintenance

Configuring Authentication and Authorization Policy

  • Dot1x Authentication and Authorization
  • MAB Authentication and Authorization
  • AP Authentication and Authorization
  • Device Administration

Configuring Posturing and Profiling

  • Posturing
  • Profiling of Devices

Cisco TrustSec and Its Component

  • SGT/SGN Tagging
  • Classification
  • Propagation
  • Inline
  • SXP
  • Enforcement ACL

Miscellaneous Topics

  • Configuring the Cisco WLC and AP via GUI and CLI

Cisco VPN Authentication

  • Cisco Anyconnect VPN authentication from ISE

Troubleshooting ISE

  • Radius Live Log
  • Diagnostic Validator
  • Logs Management
  • Radius Messages with Attribute Type

Cisco NGFW

  • What is NGFW and UTM
  • Components of NGFW
  • Introduction of the SourceFire and Snort Rules
  • Cisco Acquisitions
  • Off Box Management and On Box Management
  • FMC and FDM GUI
  • Licensing on the FMC
  • Registration of FMC with FTD and NGIPS
  • Configuration of the Sensor Interface
  • Configuring NAT and Routing


  • Describe the Cisco WSA
  • Install and verify the WSA
  • Deploy proxy services for the WSA
  • WCCP Services and Transparent Proxy
  • Utilize authentication with the WSA
  • Configure various policies for the WSA
  • Enforce acceptable use using the WSA
  • Defend against malware
  • Configure data security
  • Perform Administration and Troubleshooting of WSA’s

Introduction to Netflow

  • Why we need Cisco StealthWatch
  • Components of StealthWatch
  • Advance Features of StealthWatch
  • Configuring the Stealthwatch Management Console
  • Using the Appliance Setup Tool with the SMC
  • Configuring the Stealthwatch Flow Collector
  • Finalising the Flow Collector Configuration
  • Adding a Flow Collector to the SMC
  • Exploring Where to Enable NetFlow on a Network
  • Configuring NetFlow on Cisco IOS Routers/ASA/Switches
  • An Example of a NetFlow Config Generator Tool
  • Introduction to the Stealthwatch GUIs
  • Organizing Hosts with Host Groups
  • Analyzing Flows
  • Enabling Cognitive Analytics
  • Configuring Encrypted Traffic Analytics
  • Creating Custom Policies
  • Acknowledging Alarms
  • Installing Stealthwatch Apps
  • Capturing Packets for Diagnostics
  • Logs, Stats, and Diagnostic Packs


  • Cisco Umbrella – Security Solution
  • Implementing Cisco Umbrella
  • Roaming Client
  • Umbrella Roaming Security
  • Reporting
  • Active Directory User Sync

CCIE LAB Preparation