CCIE Security Preparation Video on Demand Course

$499.00
 
 
 

About Our CCIE Security Video on Demand Course

iPexpert's CCIE Security Video on Demand Course is designed for CCIE Security candidates who wish to learn about the protocols and technologies included in the CCIE Security blueprint in the comfort of their own home or office and at their own pace. It's clearly the industry's most thorough CCIE Security video training solution!

Listen as industry expert Piotr Kaluzny lectures on nearly every technology and protocol seen on the new blueprint. Piotr's lectures are an information-rich video training solution that consists of almost 50 hours of content. After each topic is covered, the instructor dives into lab exercises designed to demonstrate the fundamentals and complex implementations of the challenging protocols that you may encounter in the real lab.

Table of Contents

Below, you will find the topics, technologies and protocols that are currently included in iPexpert's CCIE Security Video on Demand Course.

  • Course Introduction
  • Section 1: System Hardening & Availability - Device Access Control
    • Device Access Control - DEMO
    • CoPP
    • CoPP - DEMO
    • CPPr
    • CPPr - DEMO
    • MPP
    • MPP - DEMO
    • CPU Protection, SPD & Disabling Unnecessary Services
    • Routing Protocol Authentication
    • Routing Protocol Authentication - DEMO
    • Route Filtering
    • NTP
    • NTP - DEMO
    • SNMP
    • SNMP - DEMO
    • Logging

 

  • Section 2: Threat Identification & Migration - Fragmentation Attacks
    • IP Options Attacks
    • IP Spoofing Attacks
    • Flexible NetFlow
    • Flexible NetFlow - DEMO
    • TCP Intercept
    • RTBH
    • RTBH - DEMO
    • DoS & DDoS Attacks
    • MQC, NBAR & Next Generation NBAR
    • FPM
    • FPM - DEMO
    • Application Attacks
    • SEND
    • SEND - DEMO
    • VLAN Hopping
    • MAC Spoofing, Flooding & Port Security
    • DHCP Attacks & DHCP Snooping
    • ARP Spoofing & DAI
    • IP Source Guard
    • DHCP Snooping, DAI & IP Source Guard - DEMO

 

  • Section 3: Intrusion Prevention & Content Security - IPS Basics
    • IPS Initialization - DEMO
    • SPAN, RSPAN
    • IPS Deployment Modes
    • IPS Deployment Modes - DEMO
    • Virtual Sensors
    • IPS Signatures & Tuning
    • IPS Signatures & Tuning - DEMO
    • Event Actions
    • Event Actions Overrides & Filters - DEMO
    • IPS Blocking
    • IPS Blocking - DEMO
    • Anomaly Detection
    • IOS IPS
    • ASA IPS
    • WSA Overview, Deployment & Initialization - Part 1
    • WSA Overview, Deployment & Initialization - Part 2
    • WSA Initialization & Explicit Forwarding - DEMO
    • WSA Layer 4 Traffic Monitor - DEMO
    • WSA Transparent Web Proxy - DEMO
    • WSA Policies & Related Topics - Part 1
    • WSA Policies & Related Topics - Part 2
    • Authentication, Policies & Proxy Bypass - DEMO

 

  • Section 4: Identity Management - AAA & ACS Basics
    • ACS Overview & AD Integration - DEMO: Part 1
    • ACS Overview & AD Integration - DEMO: Part 2
    • AAA Configuration
    • ACS Device Administration - DEMO
    • ISE Overview
    • ISE Overview - DEMO
    • Proxy Authentication
    • Proxy Authentication - DEMO: Part 1
    • Proxy Authentication - DEMO: Part 2
    • Basic Wireless Setup
    • ISE Profiling - Part 1
    • ISE Profiling - Part 2
    • ISE Profiling - DEMO
    • 802.1x Fundamentals
    • 802.1x Monitor Mode
    • 802.1x Monitor Mode - DEMO
    • 802.1x Low Impact Mode, Guest Services & CWA - Part 1
    • 802.1x Low Impact Mode, Guest Services & CWA - Part 2
    • 802.1x Low Impact Mode, Guest Services & CWA - DEMO: Part 1
    • 802.1x Low Impact Mode, Guest Services & CWA - DEMO: Part 2
    • 802.1x Low Impact Mode, Guest Services & CWA - DEMO: Part 3
    • 802.1x Closed Mode
    • 802.1x Closed Mode - DEMO: Part 1
    • 802.1x Closed Mode - DEMO: Part 2

 

  • Section 5: Perimeter Security & Services - ASA Initialization
    • ASA Initialization - DEMO
    • ASA Management & ACLs - Part 1
    • ASA Management & ACLs - Part 2
    • ASA Management & ACLs - DEMO: Part 1
    • ASA Management & ACLs - DEMO: Part 2
    • Transparent ASA
    • Transparent ASA - DEMO
    • Multiple-Context ASA
    • Multiple-Context ASA - DEMO
    • Failover
    • Failover - DEMO
    • ASA Routing
    • ASA NAT
    • ASA NAT - DEMO
    • MPF
    • MPF - DEMO
    • IOS ACLs
    • CBAC
    • CBAC - DEMO
    • ZFW
    • ZFW - DEMO
    • IOS NAT

 

  • Section 6: Confidentiality & Secure Access - PKI & IOS CA
    • PKI - DEMO
    • IPSec Basisc: IKE Phase I
    • IPSec Basisc: IKE Phase II
    • IKE DPD, IPSec & QoS
    • IPSec on ASA
    • IOS-ASA L2L: DEMO
    • VRF-Aware IPSec
    • VRF-Aware IPSec - DEMO
    • GRE & SVTIs
    • GRE & SVTIs - DEMO
    • DMVPN
    • DMVPN - DEMO
    • GETVPN
    • GETVPN - DEMO
    • EasyVPN
    • EasyVPN - DEMO
    • SSL VPNs
    • SSL VPNs - DEMO
    • IKEv2
    • FlexVPNs
    • IOS-IOS IKEv2 - DEMO
    • IKEv2 IOS ASA - DEMO
    • IKEv2 Remote Access - DEMO


 

 
 
 
Investment Assurance Program