- 当前机构其他课程
- 更多+
- 同类热点网络课程
- 暂无相关热门网络课程
课程介绍
课程评论
课程问答
课程视频
Cisco Certified Internetwork Expert 被视为是全球Internetworking领域中的顶级CCIE认证证书。这个认证主要提供工程师在今日快速变动的网络环境中驾驭Cisco设备所需的专业知识。
成为CCIE除了整个产业的认同之外,Security CCIE也是你不断持有最新网络知识的指标;你将会在你的专业领域中成为一位最具竞争力的人。
入学条件
已经通过CCSP或者具备相应水平者
Security CCIE认证培训目标
现在市场上主流的3大防火墙产品,checkpoint公司的checkpoint全套产品.juniper公司的
netscreen,cisco 公司的ASA .作为三家业界龙头的防火墙产品,在市场上具有很高的市场占有率。
让学员真正学会使用所有的防火墙产品,成为名副其实网络安全专家。
netscreen,cisco 公司的ASA .作为三家业界龙头的防火墙产品,在市场上具有很高的市场占有率。
让学员真正学会使用所有的防火墙产品,成为名副其实网络安全专家。
Security CCIE课程介绍
Firewall
PIX and ASA Firewall
Basic Initialization
Access Management
Address Translation
ACLs
IP Routing
Object Groups
VLANs
AAA
VPNs
Filtering
Failover
Layer 2 Transparent Firewall
Security Contexts (Virtual Firewall)
Modular Policy Framework
Application-Aware Inspection
High Availability Scenarios
QoS Policies
Other Advanced Features
Basic Initialization
Access Management
Address Translation
ACLs
IP Routing
Object Groups
VLANs
AAA
VPNs
Filtering
Failover
Layer 2 Transparent Firewall
Security Contexts (Virtual Firewall)
Modular Policy Framework
Application-Aware Inspection
High Availability Scenarios
QoS Policies
Other Advanced Features
IOS Firewall
CBAC
Audit
Auth Proxy
PAM
Access Control
Performance Tuning
Advanced Features
Audit
Auth Proxy
PAM
Access Control
Performance Tuning
Advanced Features
VPN
IPSec LAN-to-LAN
SSL VPN
DMVPN
CA (PKI)
Remote Access VPN
VPN3000 Concentrator
VPN3000 IP Routing
Unity Client
WebVPN
EzVPN Hardware Client
XAuth, Split-tunnel, RRI, NAT-T
High Availability
QoS for VPN
GRE, mGRE
L2TP
PPTP
Advanced VPN Features
SSL VPN
DMVPN
CA (PKI)
Remote Access VPN
VPN3000 Concentrator
VPN3000 IP Routing
Unity Client
WebVPN
EzVPN Hardware Client
XAuth, Split-tunnel, RRI, NAT-T
High Availability
QoS for VPN
GRE, mGRE
L2TP
PPTP
Advanced VPN Features
Intrusion Prevention System (IPS)
IPS 4200 Series Sensor Appliance
Basic Initialization
Sensor Configuration
Sensor Management
Promiscuous and Inline Monitoring
Signature Tuning
Custom Signatures
Blocking
TCP Resets
Rate Limiting
Signature Engines
IDM
Event Action
Event Monitoring
IOS IPS
PIX IDS
SPAN, RSPAN
Advanced Features
Identity Management
Security Protocols (RADIUS and TACACS+)
Cisco Secure ACS Configuration
Access Management (Telnet, SSH, Pwds, Priv Levels)
Proxy Authentication
Service Authentication (FTP, Telnet, HTTP, other)
Network Admission Control (NAC Framework solution)
802.1x
Advanced Features
Basic Initialization
Sensor Configuration
Sensor Management
Promiscuous and Inline Monitoring
Signature Tuning
Custom Signatures
Blocking
TCP Resets
Rate Limiting
Signature Engines
IDM
Event Action
Event Monitoring
IOS IPS
PIX IDS
SPAN, RSPAN
Advanced Features
Identity Management
Security Protocols (RADIUS and TACACS+)
Cisco Secure ACS Configuration
Access Management (Telnet, SSH, Pwds, Priv Levels)
Proxy Authentication
Service Authentication (FTP, Telnet, HTTP, other)
Network Admission Control (NAC Framework solution)
802.1x
Advanced Features
Advanced Security
Mitigation Techniques
Packet Marking Techniques
Security RFCs (RFC1918, RFC2827, RFC2401)
Service Provider Security
Black Holes, Sink Holes
RTBH Filtering (Remote Triggered Black Hole)
Traffic Filtering using Access-lists
NAT
TCP Intercept
uRPF
CAR
NBAR
NetFlow
Flooding
Spoofing
Policing
Fragmentation
Sniffer Traces
Catalyst Management and Security
Traffic Control and Congestion Management
Catalyst Features and Advanced Configuration
Packet Marking Techniques
Security RFCs (RFC1918, RFC2827, RFC2401)
Service Provider Security
Black Holes, Sink Holes
RTBH Filtering (Remote Triggered Black Hole)
Traffic Filtering using Access-lists
NAT
TCP Intercept
uRPF
CAR
NBAR
NetFlow
Flooding
Spoofing
Policing
Fragmentation
Sniffer Traces
Catalyst Management and Security
Traffic Control and Congestion Management
Catalyst Features and Advanced Configuration
Network Attacks
Network Reconnaissance
IP Spoofing Attacks
MAC Spoofing Attacks
ARP Spoofing Attacks
Denial of Service (DoS)
Distributed Denial of Service (DDoS)
Man-in-the-Middle (MiM) Attacks
Port Redirection Attacks
DHCP Attacks
DNS Attacks
Fragment Attacks
Smurf Attacks
SYN Attacks
MAC Attacks
VLAN Hopping Attacks
Other Layer2 and Layer3 Attacks
IP Spoofing Attacks
MAC Spoofing Attacks
ARP Spoofing Attacks
Denial of Service (DoS)
Distributed Denial of Service (DDoS)
Man-in-the-Middle (MiM) Attacks
Port Redirection Attacks
DHCP Attacks
DNS Attacks
Fragment Attacks
Smurf Attacks
SYN Attacks
MAC Attacks
VLAN Hopping Attacks
Other Layer2 and Layer3 Attacks
更多IT认证课程信息详情请点击:http://sh.pxto.com.cn/JiGou/134622B98J.html
资料添加资料添加资料添加资料添加资料添加资料添加资料添加资料添加资料添加资料添加资料添加资料添加资料添加资料添加资料添加资料添加