INE – CCIE Security Advanced Technologies Class Training ( Full Course) | 26.88GB
The CCIE Security Advanced Technologies Course uses a hands-on demonstration approach designed to provide you with a CCIE-level understanding of the technologies covered by the current blueprint of Cisco Systems’ CCIE Security Lab Exam. It contains more than 26 hours of highly advanced instruction on cutting edge CCIE-level technologies. This course goes deep into the advanced implementation of the latest in Cisco Security technologies such as PIX, ASA, IOS firewalls, IOS-based security, attack mitigation, VPN’s, identity management, and intrusion detection and prevention.
Course Outline:
Module 1
Lesson 1 – ASA Overview
Lesson 2 – ASA Routing
Lesson 3 – ADA – ACLs/Failover
Lesson 4 – Failover
Lesson 5 – Contexts
Lesson 6 – Transparent Firewall
Module 2
Lesson 1 – ACLs, lock and key ACLs
Lesson 2 – TCP Intercept / IOS Firewall Configuration
Lesson 3 – IOS Firewall tuning
Lesson 4 – Zone Based Firewall
Lesson 5 – VPN Introduction
Lesson 6 – VPN Configuration / Troubleshooting
Lesson 7 – VPN – IOS Certificate Authority
Module 3
Lesson 1 – VPN – Certificate Map Config / Debug
Lesson 2 – ASA VPN Configuration
Lesson 2.5 – SSL VPN Configuration
Lesson 3 – Dynamic Multipoint VPN Intro/ Config
Lesson 4 – DMVPN Routing Configuration
Lesson 5 – VPN Features – ISAKMP Key Encryption
Lesson 6 – Group Encrypted Transport – Part 1
Lesson 7 – Group Encrypted Transport – Part 2
Lesson 8 – AAA Introduction
Lesson 9 – ACS GUI Interface Overview
Lesson 10 – AAA Command Authorization / Accounting Config
Module 4
Lesson 1 – ASA cut-through TACACS+
Lesson 2 – Cut-through Radius – Local vs DL Part 1
Lesson 3 – Cut-through Radius – Local vs DL Part 2
Lesson 4 – Cut-through Radius – Local vs DL Part 3
Lesson 5 – Dot1x Configuration – Router as client
Lesson 6 – Online Documentation navigation / review
Lesson 7 – IDS / IPS intro
Lesson 8 – IPS part 2 – configuration
Lesson 9 – IPS – blocking configuration
Lesson 10 – IPS inline mode
Lesson 11 – ASA shunning / ASA IPS
Module 5
Lesson 1 – Role Based CLI
Lesson 2 – Management – SNMP
Lesson 3 – Management – Logging
Lesson 4 – ASA Policy Tuning – MPF – BGP Example
Lesson 5 – Flexible Packet Matching
Lesson 6 – Switch Features
Lesson 7 – Attack Mitigation – Part 1
Lesson 8 – Attack Mitigation – Part 2
INE.CCIE.Security.Advanced.Technologies.5Days.part01
INE.CCIE.Security.Advanced.Technologies.5Days.part02
INE.CCIE.Security.Advanced.Technologies.5Days.part03
INE.CCIE.Security.Advanced.Technologies.5Days.part04
INE.CCIE.Security.Advanced.Technologies.5Days.part05
INE.CCIE.Security.Advanced.Technologies.5Days.part06
INE.CCIE.Security.Advanced.Technologies.5Days.part07
INE.CCIE.Security.Advanced.Technologies.5Days.part08
INE.CCIE.Security.Advanced.Technologies.5Days.part09
INE.CCIE.Security.Advanced.Technologies.5Days.part10
INE.CCIE.Security.Advanced.Technologies.5Days.part11
INE.CCIE.Security.Advanced.Technologies.5Days.part12
INE.CCIE.Security.Advanced.Technologies.5Days.part13
INE.CCIE.Security.Advanced.Technologies.5Days.part14
INE.CCIE.Security.Advanced.Technologies.5Days.part15
INE.CCIE.Security.Advanced.Technologies.5Days.part16
INE.CCIE.Security.Advanced.Technologies.5Days.part17
INE.CCIE.Security.Advanced.Technologies.5Days.part18
INE.CCIE.Security.Advanced.Technologies.5Days.part19
INE.CCIE.Security.Advanced.Technologies.5Days.part20
INE.CCIE.Security.Advanced.Technologies.5Days.part21
INE.CCIE.Security.Advanced.Technologies.5Days.part22
INE.CCIE.Security.Advanced.Technologies.5Days.part23
INE.CCIE.Security.Advanced.Technologies.5Days.part24
INE.CCIE.Security.Advanced.Technologies.5Days.part25
INE.CCIE.Security.Advanced.Technologies.5Days.part26
INE.CCIE.Security.Advanced.Technologies.5Days.part27
INE.CCIE.Security.Advanced.Technologies.5Days.part28
INE.CCIE.Security.Advanced.Technologies.5Days.part29
INE.CCIE.Security.Advanced.Technologies.5Days.part30
INE.CCIE.Security.Advanced.Technologies.5Days.part31
INE.CCIE.Security.Advanced.Technologies.5Days.part32
INE.CCIE.Security.Advanced.Technologies.5Days.part33
INE.CCIE.Security.Advanced.Technologies.5Days.part34
INE.CCIE.Security.Advanced.Technologies.5Days.part35
INE.CCIE.Security.Advanced.Technologies.5Days.part36
INE.CCIE.Security.Advanced.Technologies.5Days.part37
INE.CCIE.Security.Advanced.Technologies.5Days.part38
INE.CCIE.Security.Advanced.Technologies.5Days.part39
INE.CCIE.Security.Advanced.Technologies.5Days.part40
INE.CCIE.Security.Advanced.Technologies.5Days.part41
INE.CCIE.Security.Advanced.Technologies.5Days.part42
INE.CCIE.Security.Advanced.Technologies.5Days.part43
INE.CCIE.Security.Advanced.Technologies.5Days.part44
INE.CCIE.Security.Advanced.Technologies.5Days.part45
INE.CCIE.Security.Advanced.Technologies.5Days.part46
INE.CCIE.Security.Advanced.Technologies.5Days.part47
INE.CCIE.Security.Advanced.Technologies.5Days.part48
INE.CCIE.Security.Advanced.Technologies.5Days.part49
INE.CCIE.Security.Advanced.Technologies.5Days.part50
INE.CCIE.Security.Advanced.Technologies.5Days.part51
INE.CCIE.Security.Advanced.Technologies.5Days.part52
INE.CCIE.Security.Advanced.Technologies.5Days.part53
INE.CCIE.Security.Advanced.Technologies.5Days.part54
INE.CCIE.Security.Advanced.Technologies.5Days.part55
INE.CCIE.Security.Advanced.Technologies.5Days.part56
INE.CCIE.Security.Advanced.Technologies.5Days.part57
INE.CCIE.Security.Advanced.Technologies.5Days.part58
INE.CCIE.Security.Advanced.Technologies.5Days.part59
INE.CCIE.Security.Advanced.Technologies.5Days.part60
INE.CCIE.Security.Advanced.Technologies.5Days.part61
INE.CCIE.Security.Advanced.Technologies.5Days.part62
INE.CCIE.Security.Advanced.Technologies.5Days.part63
INE.CCIE.Security.Advanced.Technologies.5Days.part64
INE.CCIE.Security.Advanced.Technologies.5Days.part65
INE.CCIE.Security.Advanced.Technologies.5Days.part66
INE.CCIE.Security.Advanced.Technologies.5Days.part67
INE.CCIE.Security.Advanced.Technologies.5Days.part68
INE.CCIE.Security.Advanced.Technologies.5Days.part69
INE.CCIE.Security.Advanced.Technologies.5Days.part01
INE.CCIE.Security.Advanced.Technologies.5Days.part02
INE.CCIE.Security.Advanced.Technologies.5Days.part03
INE.CCIE.Security.Advanced.Technologies.5Days.part04
INE.CCIE.Security.Advanced.Technologies.5Days.part05
INE.CCIE.Security.Advanced.Technologies.5Days.part06
INE.CCIE.Security.Advanced.Technologies.5Days.part07
INE.CCIE.Security.Advanced.Technologies.5Days.part08
INE.CCIE.Security.Advanced.Technologies.5Days.part09
INE.CCIE.Security.Advanced.Technologies.5Days.part10
INE.CCIE.Security.Advanced.Technologies.5Days.part11
INE.CCIE.Security.Advanced.Technologies.5Days.part12
INE.CCIE.Security.Advanced.Technologies.5Days.part13
INE.CCIE.Security.Advanced.Technologies.5Days.part14
INE.CCIE.Security.Advanced.Technologies.5Days.part15
INE.CCIE.Security.Advanced.Technologies.5Days.part16
INE.CCIE.Security.Advanced.Technologies.5Days.part17
INE.CCIE.Security.Advanced.Technologies.5Days.part18
INE.CCIE.Security.Advanced.Technologies.5Days.part19
INE.CCIE.Security.Advanced.Technologies.5Days.part20
INE.CCIE.Security.Advanced.Technologies.5Days.part21
INE.CCIE.Security.Advanced.Technologies.5Days.part22
INE.CCIE.Security.Advanced.Technologies.5Days.part23
INE.CCIE.Security.Advanced.Technologies.5Days.part24
INE.CCIE.Security.Advanced.Technologies.5Days.part25
INE.CCIE.Security.Advanced.Technologies.5Days.part26
INE.CCIE.Security.Advanced.Technologies.5Days.part27
INE.CCIE.Security.Advanced.Technologies.5Days.part28
INE.CCIE.Security.Advanced.Technologies.5Days.part29
INE.CCIE.Security.Advanced.Technologies.5Days.part30
INE.CCIE.Security.Advanced.Technologies.5Days.part31
INE.CCIE.Security.Advanced.Technologies.5Days.part32
INE.CCIE.Security.Advanced.Technologies.5Days.part33
INE.CCIE.Security.Advanced.Technologies.5Days.part34
INE.CCIE.Security.Advanced.Technologies.5Days.part35
INE.CCIE.Security.Advanced.Technologies.5Days.part36
INE.CCIE.Security.Advanced.Technologies.5Days.part37
INE.CCIE.Security.Advanced.Technologies.5Days.part38
INE.CCIE.Security.Advanced.Technologies.5Days.part39
INE.CCIE.Security.Advanced.Technologies.5Days.part40
INE.CCIE.Security.Advanced.Technologies.5Days.part41
INE.CCIE.Security.Advanced.Technologies.5Days.part42
INE.CCIE.Security.Advanced.Technologies.5Days.part43
INE.CCIE.Security.Advanced.Technologies.5Days.part44
INE.CCIE.Security.Advanced.Technologies.5Days.part45
INE.CCIE.Security.Advanced.Technologies.5Days.part46
INE.CCIE.Security.Advanced.Technologies.5Days.part47
INE.CCIE.Security.Advanced.Technologies.5Days.part48
INE.CCIE.Security.Advanced.Technologies.5Days.part49
INE.CCIE.Security.Advanced.Technologies.5Days.part50
INE.CCIE.Security.Advanced.Technologies.5Days.part51
INE.CCIE.Security.Advanced.Technologies.5Days.part52
INE.CCIE.Security.Advanced.Technologies.5Days.part53
INE.CCIE.Security.Advanced.Technologies.5Days.part54
INE.CCIE.Security.Advanced.Technologies.5Days.part55
INE.CCIE.Security.Advanced.Technologies.5Days.part56
INE.CCIE.Security.Advanced.Technologies.5Days.part57
INE.CCIE.Security.Advanced.Technologies.5Days.part58
INE.CCIE.Security.Advanced.Technologies.5Days.part59
INE.CCIE.Security.Advanced.Technologies.5Days.part60
INE.CCIE.Security.Advanced.Technologies.5Days.part61
INE.CCIE.Security.Advanced.Technologies.5Days.part62
INE.CCIE.Security.Advanced.Technologies.5Days.part63
INE.CCIE.Security.Advanced.Technologies.5Days.part64
INE.CCIE.Security.Advanced.Technologies.5Days.part65
INE.CCIE.Security.Advanced.Technologies.5Days.part66
INE.CCIE.Security.Advanced.Technologies.5Days.part67
INE.CCIE.Security.Advanced.Technologies.5Days.part68
INE.CCIE.Security.Advanced.Technologies.5Days.part69
INE.CCIE.Security.Advanced.Technologies.5Days.part01
INE.CCIE.Security.Advanced.Technologies.5Days.part02
INE.CCIE.Security.Advanced.Technologies.5Days.part03
INE.CCIE.Security.Advanced.Technologies.5Days.part04
INE.CCIE.Security.Advanced.Technologies.5Days.part05
INE.CCIE.Security.Advanced.Technologies.5Days.part06
INE.CCIE.Security.Advanced.Technologies.5Days.part07
INE.CCIE.Security.Advanced.Technologies.5Days.part08
INE.CCIE.Security.Advanced.Technologies.5Days.part09
INE.CCIE.Security.Advanced.Technologies.5Days.part10
INE.CCIE.Security.Advanced.Technologies.5Days.part11
INE.CCIE.Security.Advanced.Technologies.5Days.part12
INE.CCIE.Security.Advanced.Technologies.5Days.part13
INE.CCIE.Security.Advanced.Technologies.5Days.part14
INE.CCIE.Security.Advanced.Technologies.5Days.part15
INE.CCIE.Security.Advanced.Technologies.5Days.part16
INE.CCIE.Security.Advanced.Technologies.5Days.part17
INE.CCIE.Security.Advanced.Technologies.5Days.part18
INE.CCIE.Security.Advanced.Technologies.5Days.part19
INE.CCIE.Security.Advanced.Technologies.5Days.part20
INE.CCIE.Security.Advanced.Technologies.5Days.part21
INE.CCIE.Security.Advanced.Technologies.5Days.part22
INE.CCIE.Security.Advanced.Technologies.5Days.part23
INE.CCIE.Security.Advanced.Technologies.5Days.part24
INE.CCIE.Security.Advanced.Technologies.5Days.part25
INE.CCIE.Security.Advanced.Technologies.5Days.part26
INE.CCIE.Security.Advanced.Technologies.5Days.part27
INE.CCIE.Security.Advanced.Technologies.5Days.part28
INE.CCIE.Security.Advanced.Technologies.5Days.part29
INE.CCIE.Security.Advanced.Technologies.5Days.part30
INE.CCIE.Security.Advanced.Technologies.5Days.part31
INE.CCIE.Security.Advanced.Technologies.5Days.part32
INE.CCIE.Security.Advanced.Technologies.5Days.part33
INE.CCIE.Security.Advanced.Technologies.5Days.part34
INE.CCIE.Security.Advanced.Technologies.5Days.part35
INE.CCIE.Security.Advanced.Technologies.5Days.part36
INE.CCIE.Security.Advanced.Technologies.5Days.part37
INE.CCIE.Security.Advanced.Technologies.5Days.part38
INE.CCIE.Security.Advanced.Technologies.5Days.part39
INE.CCIE.Security.Advanced.Technologies.5Days.part40
INE.CCIE.Security.Advanced.Technologies.5Days.part41
INE.CCIE.Security.Advanced.Technologies.5Days.part42
INE.CCIE.Security.Advanced.Technologies.5Days.part43
INE.CCIE.Security.Advanced.Technologies.5Days.part44
INE.CCIE.Security.Advanced.Technologies.5Days.part45
INE.CCIE.Security.Advanced.Technologies.5Days.part46
INE.CCIE.Security.Advanced.Technologies.5Days.part47
INE.CCIE.Security.Advanced.Technologies.5Days.part48
INE.CCIE.Security.Advanced.Technologies.5Days.part49
INE.CCIE.Security.Advanced.Technologies.5Days.part50
INE.CCIE.Security.Advanced.Technologies.5Days.part51
INE.CCIE.Security.Advanced.Technologies.5Days.part52
INE.CCIE.Security.Advanced.Technologies.5Days.part53
INE.CCIE.Security.Advanced.Technologies.5Days.part54
INE.CCIE.Security.Advanced.Technologies.5Days.part55
INE.CCIE.Security.Advanced.Technologies.5Days.part56
INE.CCIE.Security.Advanced.Technologies.5Days.part57
INE.CCIE.Security.Advanced.Technologies.5Days.part58
INE.CCIE.Security.Advanced.Technologies.5Days.part59
INE.CCIE.Security.Advanced.Technologies.5Days.part60
INE.CCIE.Security.Advanced.Technologies.5Days.part61
INE.CCIE.Security.Advanced.Technologies.5Days.part62
INE.CCIE.Security.Advanced.Technologies.5Days.part63
INE.CCIE.Security.Advanced.Technologies.5Days.part64
INE.CCIE.Security.Advanced.Technologies.5Days.part65
INE.CCIE.Security.Advanced.Technologies.5Days.part66
INE.CCIE.Security.Advanced.Technologies.5Days.part67
INE.CCIE.Security.Advanced.Technologies.5Days.part68
INE.CCIE.Security.Advanced.Technologies.5Days.part69
INE.CCIE.Security.Advanced.Technologies.5Days.part01
INE.CCIE.Security.Advanced.Technologies.5Days.part02
INE.CCIE.Security.Advanced.Technologies.5Days.part03
INE.CCIE.Security.Advanced.Technologies.5Days.part04
INE.CCIE.Security.Advanced.Technologies.5Days.part05
INE.CCIE.Security.Advanced.Technologies.5Days.part06
INE.CCIE.Security.Advanced.Technologies.5Days.part07
INE.CCIE.Security.Advanced.Technologies.5Days.part08
INE.CCIE.Security.Advanced.Technologies.5Days.part09
INE.CCIE.Security.Advanced.Technologies.5Days.part10
INE.CCIE.Security.Advanced.Technologies.5Days.part11
INE.CCIE.Security.Advanced.Technologies.5Days.part12
INE.CCIE.Security.Advanced.Technologies.5Days.part13
INE.CCIE.Security.Advanced.Technologies.5Days.part14
INE.CCIE.Security.Advanced.Technologies.5Days.part15
INE.CCIE.Security.Advanced.Technologies.5Days.part16
INE.CCIE.Security.Advanced.Technologies.5Days.part17
INE.CCIE.Security.Advanced.Technologies.5Days.part18
INE.CCIE.Security.Advanced.Technologies.5Days.part19
INE.CCIE.Security.Advanced.Technologies.5Days.part20
INE.CCIE.Security.Advanced.Technologies.5Days.part21
INE.CCIE.Security.Advanced.Technologies.5Days.part22
INE.CCIE.Security.Advanced.Technologies.5Days.part23
INE.CCIE.Security.Advanced.Technologies.5Days.part24
INE.CCIE.Security.Advanced.Technologies.5Days.part25
INE.CCIE.Security.Advanced.Technologies.5Days.part26
INE.CCIE.Security.Advanced.Technologies.5Days.part27
INE.CCIE.Security.Advanced.Technologies.5Days.part28
INE.CCIE.Security.Advanced.Technologies.5Days.part29
INE.CCIE.Security.Advanced.Technologies.5Days.part30
INE.CCIE.Security.Advanced.Technologies.5Days.part31
INE.CCIE.Security.Advanced.Technologies.5Days.part32
INE.CCIE.Security.Advanced.Technologies.5Days.part33
INE.CCIE.Security.Advanced.Technologies.5Days.part34
INE.CCIE.Security.Advanced.Technologies.5Days.part35
INE.CCIE.Security.Advanced.Technologies.5Days.part36
INE.CCIE.Security.Advanced.Technologies.5Days.part37
INE.CCIE.Security.Advanced.Technologies.5Days.part38
INE.CCIE.Security.Advanced.Technologies.5Days.part39
INE.CCIE.Security.Advanced.Technologies.5Days.part40
INE.CCIE.Security.Advanced.Technologies.5Days.part41
INE.CCIE.Security.Advanced.Technologies.5Days.part42
INE.CCIE.Security.Advanced.Technologies.5Days.part43
INE.CCIE.Security.Advanced.Technologies.5Days.part44
INE.CCIE.Security.Advanced.Technologies.5Days.part45
INE.CCIE.Security.Advanced.Technologies.5Days.part46
INE.CCIE.Security.Advanced.Technologies.5Days.part47
INE.CCIE.Security.Advanced.Technologies.5Days.part48
INE.CCIE.Security.Advanced.Technologies.5Days.part49
INE.CCIE.Security.Advanced.Technologies.5Days.part50
INE.CCIE.Security.Advanced.Technologies.5Days.part51
INE.CCIE.Security.Advanced.Technologies.5Days.part52
INE.CCIE.Security.Advanced.Technologies.5Days.part53
INE.CCIE.Security.Advanced.Technologies.5Days.part54
INE.CCIE.Security.Advanced.Technologies.5Days.part55
INE.CCIE.Security.Advanced.Technologies.5Days.part56
INE.CCIE.Security.Advanced.Technologies.5Days.part57
INE.CCIE.Security.Advanced.Technologies.5Days.part58
INE.CCIE.Security.Advanced.Technologies.5Days.part59
INE.CCIE.Security.Advanced.Technologies.5Days.part60
INE.CCIE.Security.Advanced.Technologies.5Days.part61
INE.CCIE.Security.Advanced.Technologies.5Days.part62
INE.CCIE.Security.Advanced.Technologies.5Days.part63
INE.CCIE.Security.Advanced.Technologies.5Days.part64
INE.CCIE.Security.Advanced.Technologies.5Days.part65
INE.CCIE.Security.Advanced.Technologies.5Days.part66
INE.CCIE.Security.Advanced.Technologies.5Days.part67
INE.CCIE.Security.Advanced.Technologies.5Days.part68
INE.CCIE.Security.Advanced.Technologies.5Days.part69
The post INE – CCIE Security Advanced Technologies Class Training ( Full Course) appeared first on Free Ebooks and Video Training.