Difference between revisions of "CCNP SECURE"
From Teknologisk videncenter
m |
m |
||
(10 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
− | New version of CCSP SNRS | + | __NOTOC__ |
+ | New version of CCSP SNRS (Fag [[2149 Sikkerhed IV]]) | ||
+ | [[Image:CCNP Security Secure 642-637 Official Cert Guide.png|right|300px]] | ||
+ | *[http://www.cisco.com/en/US/docs/solutions/Enterprise/Security/SAFE_RG/SAFE_rg.pdf Cisco SAFE Reference Guide] (Best material) | ||
− | *Book on Safari [http://search.safaribooksonline.com/search?q=CCNP%20Security%20Secure%20642-637%20Official%20Cert%20Guide CCNP Security Secure 642-637 Official Cert Guide] | + | *Book on Safari [http://search.safaribooksonline.com/search?q=CCNP%20Security%20Secure%20642-637%20Official%20Cert%20Guide CCNP Security Secure 642-637 Official Cert Guide] (Old version) |
+ | *Book on safari [http://search.safaribooksonline.com/book/certification/ccnp/9780133888751 CCNP Security SISAS 300-208 Official Cert Guide] (New version) | ||
+ | =Part I: Network Security Technologies Overview= | ||
+ | *Chapter 1 [[/Chapter 1: Network Security Fundamentals|Network Security Fundamentals]] | ||
+ | *Chapter 2 [[/Chapter 2: Network Security Threats|Network Security Threats]] | ||
+ | *Chapter 3 [[/Chapter 3: Network Foundation Protection (NFP) Overview|Network Foundation Protection (NFP) Overview]] | ||
+ | *Chapter 4 [[/Chapter 4: Configuring and Implementing Switched Data Plane Security Solutions | Configuring and Implementing Switched Data Plane Security Solutions ]] | ||
+ | *Chapter 5 [[/Chapter 5: 802.1X and Cisco Identity-Based Networking Services (IBNS) | 802.1X and Cisco Identity-Based Networking Services (IBNS) ]] | ||
+ | *Chapter 6 [[/Chapter 6: Implementing and Configuring Basic 802.1X | Implementing and Configuring Basic 802.1X ]] | ||
+ | *Chapter 7 [[/Chapter 7: Implementing and Configuring Advanced 802.1X | Implementing and Configuring Advanced 802.1X ]] | ||
+ | =Part II: Cisco IOS Foundation Security Solutions= | ||
+ | *Chapter 8 [[/Chapter 8: Implementing and Configuring Cisco IOS Routed Data Plane Security | Implementing and Configuring Cisco IOS Routed Data Plane Security ]] | ||
+ | *Chapter 9 [[/Chapter 9: Implementing and Configuring Cisco IOS Control Plane Security | Implementing and Configuring Cisco IOS Control Plane Security ]] | ||
+ | *Chapter 10 [[/Chapter 10: Implementing and Configuring Cisco IOS Management Plane Security | Implementing and Configuring Cisco IOS Management Plane Security ]] | ||
+ | *Chapter 11 [[/Chapter 11: Implementing and Configuring Network Address Translation (NAT) | Implementing and Configuring Network Address Translation (NAT) ]] | ||
+ | *Chapter 12 [[/Chapter 12: Implementing and Configuring Zone-Based Policy Firewalls | Implementing and Configuring Zone-Based Policy Firewalls ]] | ||
+ | *Chapter 13 [[/Chapter 13: Implementing and Configuring IOS Intrusion Prevention System (IPS) | Implementing and Configuring IOS Intrusion Prevention System (IPS) ]] | ||
+ | *Chapter 14 [[/Chapter 14: Introduction to Cisco IOS Site-to-Site Security Solutions | Introduction to Cisco IOS Site-to-Site Security Solutions ]] | ||
+ | *Chapter 15 [[/Chapter 15: Deploying VTI-Based Site-to-Site IPsec VPNs | Deploying VTI-Based Site-to-Site IPsec VPNs ]] | ||
+ | =Part III: Cisco IOS Threat Detection and Control= | ||
+ | *Chapter 16 [[/Chapter 16: Deploying Scalable Authentication in Site-to-Site IPsec VPNs | Deploying Scalable Authentication in Site-to-Site IPsec VPNs ]] | ||
+ | *Chapter 17 [[/Chapter 17: Deploying DMVPNs | Deploying DMVPNs ]] | ||
+ | *Chapter 18 [[/Chapter 18: Deploying High Availability in Tunnel-Based IPsec VPNs | Deploying High Availability in Tunnel-Based IPsec VPNs ]] | ||
+ | *Chapter 19 [[/Chapter 19: Deploying GET VPNs | Deploying GET VPNs ]] | ||
+ | =Part IV: Managing and Implementing Cisco IOS Site-to-Site Security Solutions= | ||
+ | *Chapter 20 [[/Chapter 20: Deploying Remote Access Solutions Using SSL VPNs | Deploying Remote Access Solutions Using SSL VPNs ]] | ||
+ | *Chapter 21 [[/Chapter 21: Deploying Remote Access Solutions Using EZVPNs | Deploying Remote Access Solutions Using EZVPNs ]] | ||
+ | |||
+ | =Materialer= | ||
+ | *[http://www.cisco.com/en/US/docs/solutions/Enterprise/Security/SAFE_RG/SAFE_rg.pdf Cisco SAFE Reference Guide] | ||
[[Category:CCNP Security]] | [[Category:CCNP Security]] |
Latest revision as of 14:49, 14 January 2016
New version of CCSP SNRS (Fag 2149 Sikkerhed IV)
- Cisco SAFE Reference Guide (Best material)
- Book on Safari CCNP Security Secure 642-637 Official Cert Guide (Old version)
- Book on safari CCNP Security SISAS 300-208 Official Cert Guide (New version)
Part I: Network Security Technologies Overview
- Chapter 1 Network Security Fundamentals
- Chapter 2 Network Security Threats
- Chapter 3 Network Foundation Protection (NFP) Overview
- Chapter 4 Configuring and Implementing Switched Data Plane Security Solutions
- Chapter 5 802.1X and Cisco Identity-Based Networking Services (IBNS)
- Chapter 6 Implementing and Configuring Basic 802.1X
- Chapter 7 Implementing and Configuring Advanced 802.1X
Part II: Cisco IOS Foundation Security Solutions
- Chapter 8 Implementing and Configuring Cisco IOS Routed Data Plane Security
- Chapter 9 Implementing and Configuring Cisco IOS Control Plane Security
- Chapter 10 Implementing and Configuring Cisco IOS Management Plane Security
- Chapter 11 Implementing and Configuring Network Address Translation (NAT)
- Chapter 12 Implementing and Configuring Zone-Based Policy Firewalls
- Chapter 13 Implementing and Configuring IOS Intrusion Prevention System (IPS)
- Chapter 14 Introduction to Cisco IOS Site-to-Site Security Solutions
- Chapter 15 Deploying VTI-Based Site-to-Site IPsec VPNs
Part III: Cisco IOS Threat Detection and Control
- Chapter 16 Deploying Scalable Authentication in Site-to-Site IPsec VPNs
- Chapter 17 Deploying DMVPNs
- Chapter 18 Deploying High Availability in Tunnel-Based IPsec VPNs
- Chapter 19 Deploying GET VPNs
Part IV: Managing and Implementing Cisco IOS Site-to-Site Security Solutions
- Chapter 20 Deploying Remote Access Solutions Using SSL VPNs
- Chapter 21 Deploying Remote Access Solutions Using EZVPNs