CCNP SECURITY



Module 1:

SISAS- Implementing Cisco Secure Access Solutions (300-208)

Exam Description The Implementing Cisco Secure Access Solutions (SISAS) (300-208) exam tests whether a network security engineer knows the components and architecture of secure access, by utilizing 802.1X and Cisco TrustSec. This assesses knowledge of Cisco Identity Services Engine (ISE) architecture, solution, and components as an overall network threat mitigation and endpoint control solutions. It also includes the fundamental concepts of bring your own device (BYOD) using posture and profiling services of ISE. Candidates can prepare for this exam by taking the Implementing Cisco Secure Access Solutions (SISAS) course.
1.0 Identity Management/Secure Access
1.1 Implement device administration
1.1.a Compare and select AAA options
1.1.b TACACS+
1.1.c RADIUS
1.1.d Describe Native AD and LDAP
1.2 Describe identity management
1.2.a Describe features and functionality of authentication and authorization
1.2.b Describe identity store options (i.e., LDAP, AD, PKI, OTP, Smart Card, local)
1.2.c Implement accounting
Flow Logic
1.3 Implement wired/wireless 802.1X
1.3.a Describe RADIUS flows
1.3.b AV pairs
1.3.c EAP types
1.3.d Describe supplicant, authenticator, and server
1.3.e Supplicant options
1.3.f 802.1X phasing (monitor mode, low impact, closed mode)
1.3.g AAA server
1.3.h Network access devices
Flow Logic
1.4 Implement MAB
1.4.a Describe the MAB process within an 802.1X framework
1.4.b Flexible authentication configuration
1.4.c ISE authentication/authorization policies
1.4.d ISE endpoint identity configuration
1.4.e Verify MAB Operation
1.5 Implement network authorization enforcement
1.5.a dACL
1.5.b Dynamic VLAN assignment
1.5.c Describe SGA
1.5.d Named ACL
1.5.e CoA
1.6 Implement Central Web Authentication (CWA)
1.6.a Describe the function of CoA to support web authentication
1.6.b Configure authentication policy to facilitate CWA
1.6.c URL redirect policy
1.6.d Redirect ACL
1.6.e Customize web portal
1.6.f Verify central web authentication operation
1.7 Implement profiling
1.7.a Enable the profiling services
1.7.b Network probes
1.7.c IOS Device Sensor
1.7.d Feed service
1.7.e Profiling policy rules
1.7.f Utilize profile assignment in authorization policies
1.7.g Verify profiling operation
1.8 Implement guest services
1.8.a Managing sponsor accounts
1.8.b Sponsor portals
1.8.c Guest portals
1.8.d Guest Policies
1.8.e Self registration
1.8.f Guest activation
1.8.g Differentiated secure access
1.8.g Differentiated secure access
1.8.h Verify guest services operation
1.9 Implement posture services
1.9.a Describe the function of CoA to support posture services
1.9.b Agent options
1.9.c Client provisioning policy and redirect ACL
1.9.d Posture policy
1.9.e Quarantine/remediation
1.9.f Verify posture service operation
1.10 Implement BYOD access
1.10.a Describe elements of a BYOD policy
1.10.b Device registration
1.10.c My devices portal
1.10.d Describe supplicant provisioning
2.0 Threat Defense
2.1 Describe TrustSec Architecture
2.1.a SGT Classification - dynamic/static
2.1.b SGT Transport - inline tagging and SXP
2.1.c SGT Enforcement - SGACL and SGFW
2.1.d MACsec
3.0 Troubleshooting, Monitoring and Reporting Tools
3.1 Troubleshoot identity management solutions
3.1.a Identify issues using authentication event details in Cisco ISE
3.1.b Troubleshoot using Cisco ISE diagnostic tools
3.1.c Troubleshoot endpoint issues
3.1.d Use debug commands to troubleshoot RADIUS and 802.1X on IOS switches and wireless controllers
3.1.e Troubleshoot backup operations
4.0 Threat Defense Architectures
4.1 Design highly secure wireless solution with ISE
4.1.a Identity Management
4.1.b 802.1X
4.1.c MAB
4.1.d Network authorization enforcement
4.1.e CWA
4.1.f Profiling
4.1.g Guest Services
4.1.h Posture Services
4.1.i BYOD Access
5.0 Identity Management Architectures
5.1 Device administration
5.2 Identity Management
5.4 Guest Services
5.5 Posturing Services
5.6 BYOD Access

Module 2:

SENSS- Implementing Cisco Edge Network Security Solutions (300-206)

Exam Description The Implementing Cisco Edge Network Security (SENSS) (300-206) exam tests the knowledge of a network security engineer to configure and implement security on Cisco network perimeter edge devices such as a Cisco switch, Cisco router, and Cisco ASA firewall. This focuses on the technologies used to strengthen security of a network perimeter such as Network Address Translation (NAT), ASA policy and application inspect, and a zone-based firewall on Cisco routers. Candidates can prepare for this exam by taking the Cisco Edge Network Security (SENSS) course.
1.0 Threat Defense
1.1 Implement firewall (ASA or IOS depending on which supports the implementation)
1.1.a Implement ACLs
1.1.b Implement static/dynamic NAT/PAT
1.1.c Implement object groups
1.1.d Describe threat detection features
1.1.e Implement botnet traffic filtering
1.1.f Configure application filtering and protocol inspection
1.1.g Describe ASA security contexts
1.2 Implement Layer 2 Security
1.2.a Configure DHCP snooping
1.2.b Describe dynamic ARP inspection
1.2.c Describe storm control
1.2.d Configure port security
1.2.e Describe common Layer 2 threats and attacks and mitigation
1.2.f Describe MACSec
1.2.g Configure IP source verification
1.3 Configure device hardening per best practices
1.3.a Routers
1.3.b Switches
1.3.c Firewalls
2.0 Cisco Security Devices GUIs and Secured CLI Management
Implement SSHv2, HTTPS, and SNMPv3 access on the network devices
Implement RBAC on the ASA/IOS using CLI and ASDM
2.3 Describe Cisco Prime Infrastructure
2.3.a Functions and use cases of Cisco Prime
2.3.b Device Management
2.4 Describe Cisco Security Manager (CSM)
2.4.a Functions and use cases of CSM
2.4.b Device Management
2.5 Implement Device Managers
2.5.a Implement ASA firewall features using ASDM
3.0 Management Services on Cisco Devices
3.1 Configure NetFlow exporter on Cisco Routers, Switches, and ASA
3.2 Implement SNMPv3 ,Create views, groups, users, authentication, and encryption
3.3 Implement logging on Cisco Routers, Switches, and ASA using Cisco best practices
3.4 Implement NTP with authentication on Cisco Routers, Switches, and ASA
3.5 Describe CDP, DNS, SCP, SFTP, and DHCP
3.5.a Describe security implications of using CDP on routers and switches
3.5.b Need for dnssec
4.0 Troubleshooting, Monitoring and Reporting Tools
4.1 Monitor firewall using analysis of packet tracer, packet capture, and syslog
4.1.a Analyze packet tracer on the firewall using CLI/ASDM
4.1.b Configure and analyze packet capture using CLI/ASDM
4.1.c Analyze syslog events generated from ASA
5.0 Threat Defense Architectures
5.1 Design a Firewall Solution
5.1.b Basic concepts of security zoning
5.1.c Transparent & Routed Modes
5.1.d Security Contexts
5.2 Layer 2 Security Solutions
5.2.a Implement defenses against MAC, ARP, VLAN hopping, STP, and DHCP rogue attacks
5.2.b Describe best practices for implementation
5.2.c Describe how PVLANs can be used to segregate network traffic at Layer 2
6.0 Security Components and Considerations
5.1 Design a Firewall Solution
6.1 Describe security operations management architectures
6.1.a Single device manager vs. multi-device manager
6.2 Describe Data Center security components and considerations
6.3 Describe Collaboration security components and considerations
6.3.a Basic ASA UC Inspection features
6.4 Describe common IPv6 security considerations
6.4.a Unified IPv6/IPv4 ACL on the ASA

Module 3:

SIMOS_- Implementing Cisco Secure Mobility Solutions (300-209)

Exam Description The Implementing Cisco Secure Mobility Solutions (SIMOS) (300-209) exam tests a network security engineer on the variety of Virtual Private Network (VPN) solutions that Cisco has available on the Cisco ASA firewall and Cisco IOS software platforms. This assesses the knowledge necessary to properly implement highly secure remote communications through VPN technology, such as remote access SSL VPN and site-to-site VPN (DMVPN, FlexVPN). Candidates can prepare for this exam by taking the Implementing Cisco Secure Mobility Solutions (SIMOS) course.
1.0 Secure Communications
1.1 Site-to-site VPNs on routers and firewalls
1.1.a Describe GETVPN
1.1.b Implement IPsec (with IKEv1 and IKEv2 for both IPV4 & IPV6)
1.1.c Implement DMVPN (hub-Spoke and spoke-spoke on both IPV4 & IPV6)
1.1.d Implement FlexVPN (hub-Spoke on both IPV4 & IPV6) using local AAA
1.2 Implement remote access VPNs
1.2.a Implement AnyConnect IKEv2 VPNs on ASA and routers
1.2.b Implement AnyConnect SSLVPN on ASA and routers
1.2.c Implement clientless SSLVPN on ASA and routers
1.2.d Implement FLEX VPN on routers
2.0 Troubleshooting, Monitoring and Reporting Tools
2.1 Troubleshoot VPN using ASDM & CLI
2.1.a Troubleshoot IPsec
2.1.b Troubleshoot DMVPN
2.1.c Troubleshoot FlexVPN
2.1.d Troubleshoot AnyConnect IKEv2 and SSL VPNs on ASA and routers
2.1.e Troubleshoot clientless SSLVPN on ASA and routers
3.0 Secure Communications Architectures
3.1 Design site-to-site VPN solutions
3.1.a Identify functional components of GETVPN, FlexVPN, DMVPN, and IPsec
3.1.b VPN technology considerations based on functional requirements
3.1.c High availability considerations
3.1.d Identify VPN technology based on configuration output
3.2 Design remote access VPN solutions
3.2.a Identify functional components of FlexVPN, IPsec, and Clientless SSL
3.2.b VPN technology considerations based on functional requirements
3.2.c High availability considerations
3.2.d Identify VPN technology based on configuration output
3.2.e Identify AnyConnect client requirements
3.2.f Clientless SSL browser and client considerations/requirements
3.2.g Identify split tunneling requirements
3.3 Describe encryption, hashing, and Next Generation Encryption (NGE)
3.3.a Compare and contrast Symmetric and asymmetric key algorithms
3.3.b Identify and describe the cryptographic process in VPNs – Diffie-Hellman, IPsec – ESP, AH, IKEv1, IKEv2, hashing algorithms MD5 and SHA, and authentication methods
3.3.c Describe PKI components and protection methods
3.3.d Describe Elliptic Curve Cryptography (ECC)
3.3.e Compare and contrast SSL, DTLS, and TLS

Module 4:

SITCS- Implementing Cisco Threat Control Solutions (300-207)

Exam Description The Implementing Cisco Threat Control Solutions (SITCS) (300-207) exam tests a network security engineer on advanced firewall architecture and configuration with the Cisco next-generation firewall, utilizing access and identity policies. This covers integration of Intrusion Prevention System (IPS) and context-aware firewall components, as well as Web (Cloud) and Email Security solutions. Candidates can prepare for this exam by taking the Implementing Cisco Threat Control Solutions (SITCS) course.
1.0 Content Security
1.1 Cisco ASA 5500-X NGFW Security Services
1.1.a Describe features and functionality
1.1.b Implement web usage control (URL-filtering, reputation based, file filtering)
1.1.c Implement AVC
1.1.d Implement decryption policies
1.1.e Describe traffic redirection and capture methods
1.2 Cisco Cloud Web Security
1.2.a Describe features and functionality
1.2.b Implement IOS and ASA connectors
1.2.c Implement AnyConnect web security module
1.2.d Describe web usage control
1.2.e Implement AVC
1.2.f Implement anti-malware
1.2.g Describe decryption policies
2.2 Configure device hardening per best practices
2.2.a IPS
2.2.b Content Security appliances
3.0 Devices GUIs and Secured CLI
3.1 Content Security
3.1.a Implement HTTPS and SSH access
3.1.b Describe configuration elements
3.1.c Implement ESA GUI for message tracking
4.0 Troubleshooting, Monitoring and Reporting Tools
4.1 Configure IME and IP logging for IPS
4.2 Content Security
4.2.a Describe reporting functionality
4.2.b Implement the WSA Policy Trace tool
4.2.c Implement the ESA Message Tracking tool
4.2.d Implement the ESA Trace tool
4.2.e Use web interface to verify traffic is being redirected to CWS
4.2.f Use CLI on IOS to verify CWS operations
4.2.g Use CLI on ASA to verify CWS operations
4.2.h Use the PRSM Event Viewer to verify ASA NGFW operations
4.2.i Describe the PRSM Dashboards and Reports
4.3 Monitor Cisco Security IntelliShield
4.3.a Describe at a high level the features of the Cisco Security IntelliShield Alert Manager Service
5.0 Threat Defense Architectures
5.1 Design IPS solution
5.1.b Deploy as IPS appliance, IPS software or hardware module or IOS IPS
5.1.c Describe methods of IPS appliance load-balancing
5.1.d Describe the need for Traffic Symmetry
5.1.e Inline modes comparison – inline interface pair, inline VLAN pair, and inline VLAN group
5.1.f Management options
6.0 Content Security Architectures
6.1 Design Web Security solution
6.1.a Compare ASA NGFW vs. WSA vs. CWS
6.1.b Compare Physical WSA vs. Virtual WSA
6.1.c List available CWS connectors
6.2 Design Email Security solution
6.2.a Compare Physical ESA vs. Virtual ESA
6.2.b Describe Hybrid mode
6.3 Design Application Security solution