Difference between revisions of "CCNP SECURE"
From Teknologisk videncenter
m (→Part IV: Managing and Implementing Cisco IOS Site-to-Site Security Solutions) |
m |
||
Line 2: | Line 2: | ||
New version of CCSP SNRS | New version of CCSP SNRS | ||
[[Image:CCNP Security Secure 642-637 Official Cert Guide.png|right|300px]] | [[Image:CCNP Security Secure 642-637 Official Cert Guide.png|right|300px]] | ||
+ | *[http://www.cisco.com/en/US/docs/solutions/Enterprise/Security/SAFE_RG/SAFE_rg.pdf Cisco SAFE Reference Guide] (Best material) | ||
+ | |||
*Book on Safari [http://search.safaribooksonline.com/search?q=CCNP%20Security%20Secure%20642-637%20Official%20Cert%20Guide CCNP Security Secure 642-637 Official Cert Guide] | *Book on Safari [http://search.safaribooksonline.com/search?q=CCNP%20Security%20Secure%20642-637%20Official%20Cert%20Guide CCNP Security Secure 642-637 Official Cert Guide] | ||
Revision as of 06:37, 19 August 2013
New version of CCSP SNRS
- Cisco SAFE Reference Guide (Best material)
- Book on Safari CCNP Security Secure 642-637 Official Cert Guide
Part I: Network Security Technologies Overview
- Chapter 1 Network Security Fundamentals
- Chapter 2 Network Security Threats
- Chapter 3 Network Foundation Protection (NFP) Overview
- Chapter 4 Configuring and Implementing Switched Data Plane Security Solutions
- Chapter 5 802.1X and Cisco Identity-Based Networking Services (IBNS)
- Chapter 6 Implementing and Configuring Basic 802.1X
- Chapter 7 Implementing and Configuring Advanced 802.1X
Part II: Cisco IOS Foundation Security Solutions
- Chapter 8 Implementing and Configuring Cisco IOS Routed Data Plane Security
- Chapter 9 Implementing and Configuring Cisco IOS Control Plane Security
- Chapter 10 Implementing and Configuring Cisco IOS Management Plane Security
- Chapter 11 Implementing and Configuring Network Address Translation (NAT)
- Chapter 12 Implementing and Configuring Zone-Based Policy Firewalls
- Chapter 13 Implementing and Configuring IOS Intrusion Prevention System (IPS)
- Chapter 14 Introduction to Cisco IOS Site-to-Site Security Solutions
- Chapter 15 Deploying VTI-Based Site-to-Site IPsec VPNs
Part III: Cisco IOS Threat Detection and Control
- Chapter 16 Deploying Scalable Authentication in Site-to-Site IPsec VPNs
- Chapter 17 Deploying DMVPNs
- Chapter 18 Deploying High Availability in Tunnel-Based IPsec VPNs
- Chapter 19 Deploying GET VPNs
Part IV: Managing and Implementing Cisco IOS Site-to-Site Security Solutions
- Chapter 20 Deploying Remote Access Solutions Using SSL VPNs
- Chapter 21 Deploying Remote Access Solutions Using EZVPNs