Describing Information Security Concepts*
- Information Security Overview
 
- Assets, Vulnerabilities, and Countermeasures
 
- Managing Risk
 
Describing Common TCP/IP Attacks*
- Legacy TCP/IP Vulnerabilities
 
- IP Vulnerabilities
 
- Internet Control Message Protocol (ICMP) Vulnerabilities
 
Describing Common Network Application Attacks*
- Password Attacks
 
- Domain Name System (DNS)-Based Attacks
 
- DNS Tunneling
 
Describing Common Endpoint Attacks*
- Buffer Overflow
 
- Malware
 
- Reconnaissance Attack
 
Describing Network Security Technologies
- Defense-in-Depth Strategy
 
- Defending Across the Attack Continuum
 
- Network Segmentation and Virtualization Overview
 
Deploying Cisco ASA Firewall
- Cisco ASA Deployment Types
 
- Cisco ASA Interface Security Levels
 
- Cisco ASA Objects and Object Groups
 
Deploying Cisco Firepower Next-Generation Firewall
- Cisco Firepower NGFW Deployments
 
- Cisco Firepower NGFW Packet Processing and Policies
 
- Cisco Firepower NGFW Objects
 
Deploying Email Content Security
- Cisco Email Content Security Overview
 
- Simple Mail Transfer Protocol (SMTP) Overview
 
- Email Pipeline Overview
 
Deploying Web Content Security
- Cisco Web Security Appliance (WSA) Overview
 
- Deployment Options
 
- Network Users Authentication
 
Deploying Cisco Umbrella*
- Cisco Umbrella Architecture
 
- Deploying Cisco Umbrella
 
- Cisco Umbrella Roaming Client
 
Explaining VPN Technologies and Cryptography
- VPN Definition
 
- VPN Types
 
- Secure Communication and Cryptographic Services
 
Introducing Cisco Secure Site-to-Site VPN Solutions
- Site-to-Site VPN Topologies
 
- IPsec VPN Overview
 
- IPsec Static Crypto Maps
 
Deploying Cisco IOS VTI-Based Point-to-Point IPsec VPNs
- Cisco IOS VTIs
 
- Static VTI Point-to-Point IPsec Internet Key Exchange (IKE) v2 VPN Configuration
 
Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW
- Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW
 
- Cisco ASA Point-to-Point VPN Configuration
 
- Cisco Firepower NGFW Point-to-Point VPN Configuration
 
Introducing Cisco Secure Remote Access VPN Solutions
- Remote Access VPN Components
 
- Remote Access VPN Technologies
 
- Secure Sockets Layer (SSL) Overview
 
Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW
- Remote Access Configuration Concepts
 
- Connection Profiles
 
- Group Policies
 
Explaining Cisco Secure Network Access Solutions
- Cisco Secure Network Access
 
- Cisco Secure Network Access Components
 
- AAA Role in Cisco Secure Network Access Solution
 
Describing 802.1X Authentication
- 802.1X and Extensible Authentication Protocol (EAP)
 
- EAP Methods
 
- Role of Remote Authentication Dial-in User Service (RADIUS) in 802.1X Communications
 
Configuring 802.1X Authentication
- Cisco Catalyst® Switch 802.1X Configuration
 
- Cisco Wireless LAN Controller (WLC) 802.1X Configuration
 
- Cisco Identity Services Engine (ISE) 802.1X Configuration
 
Describing Endpoint Security Technologies*
- Host-Based Personal Firewall
 
- Host-Based Anti-Virus
 
- Host-Based Intrusion Prevention System
 
Deploying Cisco Advanced Malware Protection (AMP) for Endpoints*
- Cisco AMP for Endpoints Architecture
 
- Cisco AMP for Endpoints Engines
 
- Retrospective Security with Cisco AMP
 
Introducing Network Infrastructure Protection*
- Identifying Network Device Planes
 
- Control Plane Security Controls
 
- Management Plane Security Controls
 
Deploying Control Plane Security Controls*
- Infrastructure ACLs
 
- Control Plane Policing
 
- Control Plane Protection
 
Deploying Layer 2 Data Plane Security Controls*
- Overview of Layer 2 Data Plane Security Controls
 
- Virtual LAN (VLAN)-Based Attacks Mitigation
 
- Spanning Tree Protocol (STP) Attacks Mitigation
 
Deploying Layer 3 Data Plane Security Controls*
- Infrastructure Antispoofing ACLs
 
- Unicast Reverse Path Forwarding
 
- IP Source Guard
 
Deploying Management Plane Security Controls*
- Cisco Secure Management Access
 
- Simple Network Management Protocol Version 3
 
- Secure Access to Cisco Devices
 
Deploying Traffic Telemetry Methods*
- Network Time Protocol
 
- Device and Network Events Logging and Export
 
- Network Traffic Monitoring Using NetFlow
 
Deploying Cisco Stealthwatch Enterprise*
- Cisco Stealthwatch Offerings Overview
 
- Cisco Stealthwatch Enterprise Required Components
 
- Flow Stitching and Deduplication
 
Describing Cloud and Common Cloud Attacks*
- Evolution of Cloud Computing
 
- Cloud Service Models
 
- Security Responsibilities in Cloud
 
Securing the Cloud*
- Cisco Threat-Centric Approach to Network Security
 
- Cloud Physical Environment Security
 
- Application and Workload Security
 
Deploying Cisco Stealthwatch Cloud*
- Cisco Stealthwatch Cloud for Public Cloud Monitoring
 
- Cisco Stealthwatch Cloud for Private Network Monitoring
 
- Cisco Stealthwatch Cloud Operations
 
Describing Software-Defined Networking (SDN*)
- Software-Defined Networking Concepts
 
- Network Programmability and Automation
 
- Cisco Platforms and APIs
 
* This section is self-study material that can be done at your own pace if you are taking the instructor-led version of this course.