INE – CCIE Security Advanced Technologies Class | 17.4Gb
The CCIE Security Advanced Technologies Course uses a hands-on demonstration approach designed to provide you with a CCIE-level understanding of the technologies covered by the current blueprint of Cisco Systems’ CCIE Security Lab Exam. Taught by Brian McGahan CCIEx3 #8593, it contains more than 39 hours of highly advanced instruction on cutting edge CCIE-level technologies. This course goes deep into the advanced implementation of the latest in Cisco Security technologies such as PIX, ASA, IOS firewalls, IOS-based security, attack mitigation, VPN’s, identity management, and intrusion detection and prevention.
CCIE Security Advanced Technologies Class Outline :: Runtime 39 hours 19 minutes
Introduction
CCIE Security Preparation Resources
ASA Overview
Basic ASA Initialization
ASA Routing
ASA Reliable Static Routing
ASA Access Control Lists (ACLs)
ASA Modular Policy Framework (MPF) Overview
ASA Modular Policy Framework (MPF) Configuration
ASA Advanced TCP Inspection with MPF
ASA Advanced Application Inspection with MPF
ASA Quality of Service (QoS)
ASA Network Address Translation (NAT) Part 1
ASA Network Address Translation (NAT) Part 2
ASA Transparent Firewall Overview
ASA Transparent Firewall Configuration
ASA ARP Inspection with Transparent Firewall
ASA Multiple Context Mode Overview
ASA Multiple Context Mode Configuration
ASA Redundant Interfaces
ASA Failover Overview
ASA Active/Standby Failover Routed Firewall Configuration
ASA Active/Standby Failover Transparent Firewall Configuration
ASA Active/Active Failover Routed Firewall Configuration
ASA Multiple Context Transparent Firewall Configuration
ASA Active/Active Failover Transparent Firewall Configuration
IOS Access Control Lists (ACLs)
IOS Time Based ACLs
IOS Lock & Key Security with Dynamic ACLs
IOS Reflexive ACLs
IOS TCP Intercept and Content Based Access Control (CBAC)
Zone Based Policy Firewall Overview
Zone Based Policy Firewall Configuration
ZBPF Self Zone & ZBPF Exceptions
Port to Application Mapping (PAM)
ZBPF Parameter Tuning
ZBPF Application Inspection
IOS Transparent Firewall
IPsec Overview
IOS IPsec LAN-to-LAN Configuration
IPsec Troubleshooting
GRE over IPsec, IPsec Profiles, & VTIs
ASA IPsec Overview
ASA IPsec LAN-to-LAN Configuration
Certificate Authority (CA) Overview
IOS & ASA LAN-to-LAN IPsec with Certificates
Easy VPN Overview
IOS Easy VPN Server
IOS Easy VPN Client
IOS Easy VPN with Dynamic VTIs, ISAKMP Profiles
ASA Easy VPN Server
ASA Easy VPN Server & IOS Easy VPN Client
ASA Clientless & AnyConnect SSL VPN
DMVPN
IPS Overview, Promiscuous Mode & SPAN
IPS Promiscuous Mode & RSPAN
IPS Blocking Devices & Custom Signatures
IPS Inline Mode, VLAN Pairing
IPS Virtual Sensors and Signature Engines
AAA Overview, Local AAA, & Role Based CLI
RADIUS, TACACS+, & Cisco Secure ACS Configuration
RADIUS & TACACS+ Exec Authorization & Accounting
TACACS+ Command Accounting
RADIUS & TACACS+ Enable Authentication
IOS Authentication Proxy
INE.CCIE.Security.Advanced.Technologies.part01
INE.CCIE.Security.Advanced.Technologies.part02
INE.CCIE.Security.Advanced.Technologies.part03
INE.CCIE.Security.Advanced.Technologies.part04
INE.CCIE.Security.Advanced.Technologies.part05
INE.CCIE.Security.Advanced.Technologies.part06
INE.CCIE.Security.Advanced.Technologies.part07
INE.CCIE.Security.Advanced.Technologies.part08
INE.CCIE.Security.Advanced.Technologies.part09
INE.CCIE.Security.Advanced.Technologies.part10
INE.CCIE.Security.Advanced.Technologies.part11
INE.CCIE.Security.Advanced.Technologies.part12
INE.CCIE.Security.Advanced.Technologies.part13
INE.CCIE.Security.Advanced.Technologies.part14
INE.CCIE.Security.Advanced.Technologies.part15
INE.CCIE.Security.Advanced.Technologies.part16
INE.CCIE.Security.Advanced.Technologies.part17
INE.CCIE.Security.Advanced.Technologies.part18
INE.CCIE.Security.Advanced.Technologies.part19
INE.CCIE.Security.Advanced.Technologies.part20
INE.CCIE.Security.Advanced.Technologies.part21
INE.CCIE.Security.Advanced.Technologies.part22
INE.CCIE.Security.Advanced.Technologies.part23
INE.CCIE.Security.Advanced.Technologies.part24
INE.CCIE.Security.Advanced.Technologies.part25
INE.CCIE.Security.Advanced.Technologies.part26
INE.CCIE.Security.Advanced.Technologies.part27
INE.CCIE.Security.Advanced.Technologies.part28
INE.CCIE.Security.Advanced.Technologies.part29
INE.CCIE.Security.Advanced.Technologies.part30
INE.CCIE.Security.Advanced.Technologies.part31
INE.CCIE.Security.Advanced.Technologies.part32
INE.CCIE.Security.Advanced.Technologies.part33
INE.CCIE.Security.Advanced.Technologies.part34
INE.CCIE.Security.Advanced.Technologies.part35
INE.CCIE.Security.Advanced.Technologies.part36
INE.CCIE.Security.Advanced.Technologies.part37
INE.CCIE.Security.Advanced.Technologies.part38
INE.CCIE.Security.Advanced.Technologies.part39
INE.CCIE.Security.Advanced.Technologies.part40
INE.CCIE.Security.Advanced.Technologies.part41
INE.CCIE.Security.Advanced.Technologies.part42
INE.CCIE.Security.Advanced.Technologies.part43
INE.CCIE.Security.Advanced.Technologies.part44
INE.CCIE.Security.Advanced.Technologies.part45
INE.CCIE.Security.Advanced.Technologies.part01
INE.CCIE.Security.Advanced.Technologies.part02
INE.CCIE.Security.Advanced.Technologies.part03
INE.CCIE.Security.Advanced.Technologies.part04
INE.CCIE.Security.Advanced.Technologies.part05
INE.CCIE.Security.Advanced.Technologies.part06
INE.CCIE.Security.Advanced.Technologies.part07
INE.CCIE.Security.Advanced.Technologies.part08
INE.CCIE.Security.Advanced.Technologies.part09
INE.CCIE.Security.Advanced.Technologies.part10
INE.CCIE.Security.Advanced.Technologies.part11
INE.CCIE.Security.Advanced.Technologies.part12
INE.CCIE.Security.Advanced.Technologies.part13
INE.CCIE.Security.Advanced.Technologies.part14
INE.CCIE.Security.Advanced.Technologies.part15
INE.CCIE.Security.Advanced.Technologies.part16
INE.CCIE.Security.Advanced.Technologies.part17
INE.CCIE.Security.Advanced.Technologies.part18
INE.CCIE.Security.Advanced.Technologies.part19
INE.CCIE.Security.Advanced.Technologies.part20
INE.CCIE.Security.Advanced.Technologies.part21
INE.CCIE.Security.Advanced.Technologies.part22
INE.CCIE.Security.Advanced.Technologies.part23
INE.CCIE.Security.Advanced.Technologies.part24
INE.CCIE.Security.Advanced.Technologies.part25
INE.CCIE.Security.Advanced.Technologies.part26
INE.CCIE.Security.Advanced.Technologies.part27
INE.CCIE.Security.Advanced.Technologies.part28
INE.CCIE.Security.Advanced.Technologies.part29
INE.CCIE.Security.Advanced.Technologies.part30
INE.CCIE.Security.Advanced.Technologies.part31
INE.CCIE.Security.Advanced.Technologies.part32
INE.CCIE.Security.Advanced.Technologies.part33
INE.CCIE.Security.Advanced.Technologies.part34
INE.CCIE.Security.Advanced.Technologies.part35
INE.CCIE.Security.Advanced.Technologies.part36
INE.CCIE.Security.Advanced.Technologies.part37
INE.CCIE.Security.Advanced.Technologies.part38
INE.CCIE.Security.Advanced.Technologies.part39
INE.CCIE.Security.Advanced.Technologies.part40
INE.CCIE.Security.Advanced.Technologies.part41
INE.CCIE.Security.Advanced.Technologies.part42
INE.CCIE.Security.Advanced.Technologies.part43
INE.CCIE.Security.Advanced.Technologies.part44
INE.CCIE.Security.Advanced.Technologies.part45
INE.CCIE.Security.Advanced.Technologies.part01
INE.CCIE.Security.Advanced.Technologies.part02
INE.CCIE.Security.Advanced.Technologies.part03
INE.CCIE.Security.Advanced.Technologies.part04
INE.CCIE.Security.Advanced.Technologies.part05
INE.CCIE.Security.Advanced.Technologies.part06
INE.CCIE.Security.Advanced.Technologies.part07
INE.CCIE.Security.Advanced.Technologies.part08
INE.CCIE.Security.Advanced.Technologies.part09
INE.CCIE.Security.Advanced.Technologies.part10
INE.CCIE.Security.Advanced.Technologies.part11
INE.CCIE.Security.Advanced.Technologies.part12
INE.CCIE.Security.Advanced.Technologies.part13
INE.CCIE.Security.Advanced.Technologies.part14
INE.CCIE.Security.Advanced.Technologies.part15
INE.CCIE.Security.Advanced.Technologies.part16
INE.CCIE.Security.Advanced.Technologies.part17
INE.CCIE.Security.Advanced.Technologies.part18
INE.CCIE.Security.Advanced.Technologies.part19
INE.CCIE.Security.Advanced.Technologies.part20
INE.CCIE.Security.Advanced.Technologies.part21
INE.CCIE.Security.Advanced.Technologies.part22
INE.CCIE.Security.Advanced.Technologies.part23
INE.CCIE.Security.Advanced.Technologies.part24
INE.CCIE.Security.Advanced.Technologies.part25
INE.CCIE.Security.Advanced.Technologies.part26
INE.CCIE.Security.Advanced.Technologies.part27
INE.CCIE.Security.Advanced.Technologies.part28
INE.CCIE.Security.Advanced.Technologies.part29
INE.CCIE.Security.Advanced.Technologies.part30
INE.CCIE.Security.Advanced.Technologies.part31
INE.CCIE.Security.Advanced.Technologies.part32
INE.CCIE.Security.Advanced.Technologies.part33
INE.CCIE.Security.Advanced.Technologies.part34
INE.CCIE.Security.Advanced.Technologies.part35
INE.CCIE.Security.Advanced.Technologies.part36
INE.CCIE.Security.Advanced.Technologies.part37
INE.CCIE.Security.Advanced.Technologies.part38
INE.CCIE.Security.Advanced.Technologies.part39
INE.CCIE.Security.Advanced.Technologies.part40
INE.CCIE.Security.Advanced.Technologies.part41
INE.CCIE.Security.Advanced.Technologies.part42
INE.CCIE.Security.Advanced.Technologies.part43
INE.CCIE.Security.Advanced.Technologies.part44
INE.CCIE.Security.Advanced.Technologies.part45
INE.CCIE.Security.Advanced.Technologies.part01
INE.CCIE.Security.Advanced.Technologies.part02
INE.CCIE.Security.Advanced.Technologies.part03
INE.CCIE.Security.Advanced.Technologies.part04
INE.CCIE.Security.Advanced.Technologies.part05
INE.CCIE.Security.Advanced.Technologies.part06
INE.CCIE.Security.Advanced.Technologies.part07
INE.CCIE.Security.Advanced.Technologies.part08
INE.CCIE.Security.Advanced.Technologies.part09
INE.CCIE.Security.Advanced.Technologies.part10
INE.CCIE.Security.Advanced.Technologies.part11
INE.CCIE.Security.Advanced.Technologies.part12
INE.CCIE.Security.Advanced.Technologies.part13
INE.CCIE.Security.Advanced.Technologies.part14
INE.CCIE.Security.Advanced.Technologies.part15
INE.CCIE.Security.Advanced.Technologies.part16
INE.CCIE.Security.Advanced.Technologies.part17
INE.CCIE.Security.Advanced.Technologies.part18
INE.CCIE.Security.Advanced.Technologies.part19
INE.CCIE.Security.Advanced.Technologies.part20
INE.CCIE.Security.Advanced.Technologies.part21
INE.CCIE.Security.Advanced.Technologies.part22
INE.CCIE.Security.Advanced.Technologies.part23
INE.CCIE.Security.Advanced.Technologies.part24
INE.CCIE.Security.Advanced.Technologies.part25
INE.CCIE.Security.Advanced.Technologies.part26
INE.CCIE.Security.Advanced.Technologies.part27
INE.CCIE.Security.Advanced.Technologies.part28
INE.CCIE.Security.Advanced.Technologies.part29
INE.CCIE.Security.Advanced.Technologies.part30
INE.CCIE.Security.Advanced.Technologies.part31
INE.CCIE.Security.Advanced.Technologies.part32
INE.CCIE.Security.Advanced.Technologies.part33
INE.CCIE.Security.Advanced.Technologies.part34
INE.CCIE.Security.Advanced.Technologies.part35
INE.CCIE.Security.Advanced.Technologies.part36
INE.CCIE.Security.Advanced.Technologies.part37
INE.CCIE.Security.Advanced.Technologies.part38
INE.CCIE.Security.Advanced.Technologies.part39
INE.CCIE.Security.Advanced.Technologies.part40
INE.CCIE.Security.Advanced.Technologies.part41
INE.CCIE.Security.Advanced.Technologies.part42
INE.CCIE.Security.Advanced.Technologies.part43
INE.CCIE.Security.Advanced.Technologies.part44
INE.CCIE.Security.Advanced.Technologies.part45
The post INE – CCIE Security Advanced Technologies Class Training appeared first on Free Ebooks and Video Training.