CCIE Security V6 WRITTEN + LAB
- World Largest Cisco Lab
- 100% Practical Training
- 24X7 Lab Facility
Hands-on Training for CCIE Security V6 Written + Lab Exam
CCIE Security Version 6 certification is an expert level of Cisco certification, where it validates the skills and knowledge required to implement and maintain network security solutions. Cisco certified professionals are experts in design, implement, engineer, troubleshoot and support all Cisco security technologies using industry best and advanced practices. They are responsible to maintain their networks absolutely secure from advanced security threats, risks, and vulnerabilities.
The engineers, who certified in CCIE, are in high demands and best-paid professionals in the IT industry globally. It is a challenge for those who want to make their career in network security with good job profiles. Cisco Security certified engineers are responsible to manage and for creating end-to-end secure networks in their organization.
JNtech Networks is a pool of CCIE certified trainers where candidates get high-end solutions for CCIE security training. Our training course program is designed according to Cisco exam topics and syllabus. We use real Cisco devices for the CCIE security V6 training for lab practices where candidates can access labs for 24*7, virtual online racks for those students who want to join training online, LVC and many other facilities.
We are providing the CCIE security training course program is specially designed with the focus on written exam and lab exam topics. Industry best expert trainers are responsible for providing quality based training which assures aspirants could pass their exam in the first attempt.
JNtech Networks provide classroom training for CCIE security course in India. Our training center infrastructure is equipped with advanced and latest lab devices required to pass written and lab exam.
What do you get in CCIE Security Course?
CCIE Security as Cisco Certified Internetwork Expert Security program acknowledges single who have the understanding and expertise to implement, retain and support extensive Cisco Network Security using modern business practices and technologies. JNtech Networks is the name you can believe in when it comes to doing the best CCIE course. It has outstanding and advanced training programs that will give you better performance & hands-on experience.
Our company professional trainers provide a wide range of skills and experience in their graded areas. Our training environment is the best for individual, corporate, professional, live project training, and industrial training. CCIE Security course and Labs infrastructure are modern, well managed and you can acquire LAB 24X7 from anywhere. The training center has world-class expert professionals and they have superb knowledge, real-time industry experience.
Our CCIE Security course combines several innovative learning methods and delivery models. CCIE Security training at JNtech Networks considers getting a broader range of expertise and a huge focus in critical technical areas as per the course content authorized by the CISCO CCIE Security certification. JNtech Networks makes sure that you have real-world security implementation and troubleshooting experience/skills that the market demands and differentiates you from the rest of the crowd.
Training Mode
Instructor Led Training/Online Training
Classroom Training
On Demand Training
CCIE Security Course Duration
Weekdays
2 Hours/Day
4.5 Month
Weekends
3 Hours/Day
6 Month
Fast-Track
Training Schedule For CCIE Course
Month
Upcoming Batches
August 2024
09th August 2024
August 2024
18th August 2024
Fee of CCIE Security Course
Fee | Indian Students | International Students |
---|---|---|
Course Fee | Rs. 1,05,000 INR |
$1700 USD |
Prerequisite
There is CCNA Enterprise Infrastructure Certification and CCNP Security certification must be Cleared.
CCIE Security Certification Course Syllabus
Cisco ASA Overview
- Firewall Overview
- Firewall Techniques
- Stateless Packet Filtering
- Stateful Packet Filtering
Cisco ASA Product Family
- Introducing the Cisco ASA 5500-X Series NGFW
- Introducing the Cisco ASAv
- Difference between UTM and NGFW
Cisco ASA Features
- Using the CLI
- Using the Cisco ASDM
- Understanding Factory default configuration
- Working on the configuration files
Cisco ASA Firewall Interfaces
- Configuring Physical interfaces
- Configuring Vlan interfaces
- Redundant Interface
- Configuring Interface Security Parameters
- Naming the interface
- Security Level
- Assigning the IP Address
Cisco ASA IP Connectivity
- Configuring the Static Routing
- Routing with EIGRP
- Routing with OSPF
- Routing with BGP
- Verifying the routing Table
- Configuring the SSH and Telnet
- Configuring HTTP/S
Cisco ASA NAT (Network Address Translation)
- Understanding the NAT
- Methods of NAT
- Inside NAT
- Outside NAT
- Implementation of NAT
- Auto NAT
- Manual NAT
- Types of NAT
- Static
- NAT
- PAT
- Dynamic
- NAT
- PAT
- Twice NAT
- Identity NAT
Cisco ASA ACL
- Inside/ Outside ACL.
- Object GROUP ACL.
- Life of a Packet on the Cisco
Cisco ASA Modes
- Transparent Mode
- Routed Mode
Cisco ASA Context
- Admin Context
- System Context
- User Context
- Deployment Guide
Cisco High Availability
- ASA Failover
- Active/Standby
- Active/Active
- Verifying failover Operations
- Clustering ASA firewall Wireshark Capture
Cryptography Overview
- Hash Algorithm
- Encryption Overview
- Cryptanalysis
- Symmetric Encryption Algorithm
- Asymmetric Encryption Algorithm
- Digital Signatures
- PKI Overview
- PKI Operations
Fundamentals of VPN Technologies and IPSec
- What is VPN
- Introduction of Ipsec Terminology
- VPN Types
- Ipsec Features
- Confidentiality, Integrity, Availability and Anti-Replay.
- IPSec Protocols: – IKE, ESP and AH
- IKE Modes
- IKE Phases
- NAT-T
- Security Associations and Components
- How to configure cisco IOS as CA
Site to Site VPN ROUTER AND ALSO ON CISCO ASA
- What is Site-to Site VPN
- Wireshark Capture
- GRE
- Gre over IPSec
- Site-to-Site VPN Labs
Deploying DMVPN
- DMVPN Overview
- DMVPN Terminologies
- NHRP
- MGRE
- DMVPN Working
- DMVPN Advantages and Limitations
- DMVPN Phase 1, 2 and 3
- DMVPN Labs
- DMVPN Redundancy – Dual Hub DMVPN Deployment
Remote Access VPN
- Remote Access VPN Introduction
- Remote Access VPN modes
- Client Mode Software
- Client Mode Hardware
- Remote Access with DVTI
- Remote Access Working
- Remote Access Labs
Deploying Clientless SSL VPN
- SSL VPN Overview
- SSL Handshake
- SSL VPN Modes
- Clientless and Thick Client
- SSL VPN Working
- SSL VPN Labs
Deploying Anyconnect VPN
- Anyconnect Overview
- Connection Policies
- Group Policies
- Split Tunnelling
- Client Profile
- Anyconnect Image Upload
GET VPN
- GET VPN
- GET VPN Terminologies
- GDOI
- Key Server (KS)
- KEK (Key Encryption Key)
- TEK (Traffic Encryption Key)
- Rekey Process (Unicast and Multicast)
- Group Member (GM)
- GET VPN Lab and Working
Flex VPN
- Introduction and Working IOS Flex VPN
- Flex VPN Labs
Introducing Cisco ISE Architecture and Deployment
- Security challenges
- Cisco ISE solutions Use Cases
- Secure Access Control
- ISE function
- ISE deployment components
- Context visibility
- ISE Personas
- ISE Licensing
- Infrastructure Components
- Identity Source
Fundamentals of AAA
- AAA
- Radius Overview
- Radius Messages
- AV Pair
- IEEE 802.1x Primer
- EAP
- Types of EAP
- Tunnel EAP
- EAP-FAST
- PEAP
- EAP-TLS
- Non-Tunnel EAP
- EAP-MD5
- MSCHAP
- EAP GTC
- Host Mode
- Deployment of 802.1x
Bootstrap Network Access Devices
- Radius Commands
- AAA Commands
Introduction to ISE GUI
- AD overview and configuration
- Admin Access
- Administrative Work
- Certificate in ISE
- Personas
- Probes for ISE
- Backup/Restore
- Maintenance
Configuring Authentication and Authorization Policy
- Dot1x Authentication and Authorization
- MAB Authentication and Authorization
- AP Authentication and Authorization
- Device Administration
Configuring Posturing and Profiling
- Posturing
- Profiling of Devices
Cisco TrustSec and Its Component
- SGT/SGN Tagging
- Classification
- Propagation
- Inline
- SXP
- Enforcement ACL
Miscellaneous Topics
- Configuring the Cisco WLC and AP via GUI and CLI
Cisco VPN Authentication
- Cisco Anyconnect VPN authentication from ISE
Troubleshooting ISE
- Radius Live Log
- Diagnostic Validator
- Logs Management
- Radius Messages with Attribute Type
Cisco NGFW
- What is NGFW and UTM
- Components of NGFW
- Introduction of the SourceFire and Snort Rules
- Cisco Acquisitions
- FTD, NGIPS
- Off Box Management and On Box Management
- FMC and FDM GUI
- Licensing on the FMC
- Registration of FMC with FTD and NGIPS
- Configuration of the Sensor Interface
- Configuring NAT and Routing
WSA/ESA
- Describe the Cisco WSA
- Install and verify the WSA
- Deploy proxy services for the WSA
- WCCP Services and Transparent Proxy
- Utilize authentication with the WSA
- Configure various policies for the WSA
- Enforce acceptable use using the WSA
- Defend against malware
- Configure data security
- Perform Administration and Troubleshooting of WSA’s
Introduction to Netflow
- Why we need Cisco StealthWatch
- Components of StealthWatch
- Advance Features of StealthWatch
- Configuring the Stealthwatch Management Console
- Using the Appliance Setup Tool with the SMC
- Configuring the Stealthwatch Flow Collector
- Finalising the Flow Collector Configuration
- Adding a Flow Collector to the SMC
- Exploring Where to Enable NetFlow on a Network
- Configuring NetFlow on Cisco IOS Routers/ASA/Switches
- An Example of a NetFlow Config Generator Tool
- Introduction to the Stealthwatch GUIs
- Organizing Hosts with Host Groups
- Analyzing Flows
- Enabling Cognitive Analytics
- Configuring Encrypted Traffic Analytics
- Creating Custom Policies
- Acknowledging Alarms
- Installing Stealthwatch Apps
- Capturing Packets for Diagnostics
- Logs, Stats, and Diagnostic Packs
Umbrella
- Cisco Umbrella – Security Solution
- Implementing Cisco Umbrella
- Roaming Client
- Umbrella Roaming Security
- Reporting
- Active Directory User Sync
CCIE LAB Preparation