CCIE Securty Preparation

You might also like

Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 2

Perimeter Security and Intrusion Prevention

Hide Titles
Cisco ASA: All-in-one Next-Generation Firewall, IPS, and VPN Services 1248 pages
Cisco Firewalls 912 pages
Penetration Testing and Network Defense 624 pages
Configuring Clustering on Cisco ASA Varies
Configuring OSPF on Cisco ASA Varies
Configuring EIGRP on Cisco ASA Varies
Configuring BGP on Cisco ASA Varies
Configuring RIP on Cisco ASA Varies
Configuriing Firewall Modes on Cisco ASA Varies
Configuring Multiple Context Mode on Cisco ASA Varies
Cisco ASA Configuration Guides Varies
Configuring Application Layer Protocols Inspection on Cisco ASA Varies
Zone-Based Policy Firewall Design and Application Guide Varies
Zone-Based Policy Firewall Configuration Guide Varies
Configuring NAT Varies
Configuring TCP Intercept Varies
FMC Configuration Guide Varies
Configuring SSL Inspection on Cisco FireSIGHT System Varies
Cisco Application and Visibility Control Varies
Cisco FMC Configuration Guide Varies
Guide to Defending Against Distributed Denial of Service Attacks Varies
Defeating DDOS Attacks Varies
Types of Attacks Varies
Configuring Botnet traffic filter Varies
Troubleshooting: ASA FirePOWER NGFW - BRKSEC-3055 2:00:00
FP NGIPS Deployment and Operationalisation - BRKSEC-2032 1:30:00
Firewall Deployment - BRKSEC-2020 1:30:00
Intermediate - Building a Highly Secure Internet Edge - BRKSEC-2134 2:00:00
Advanced - ASA Clustering Deep Dive - BRKSEC-3032 2:00:00
DDoS Attacks: An End-to-End Mitigation Approach - BRKSEC-2766 2:00:00
ASA Firepower NGFW typical deployment scenarios - BRKSEC-2050 2:00:00
A Deep Dive into using the Firepower Manager - BRKSEC-2058 2:00:00
Cisco FTD HA Varies
Cisco Firepower NGFW: Security from the Network to the Endpoint Varies
Cisco Firepower Next-Generation Firewall Varies
Introduction to FirePOWER & FireSIGHT Policies Varies
Cisco Firepower Threat Defense (FTD): Configuration and Troubleshooting Best
Practices for the Next-Generation Firewall (NGFW), Next-Generation Intrusion
Prevention System (NGIPS), and Advanced Malware Protection (AMP) 800 pages
Integrated Security Technologies and Solutions - Volume I: Cisco Security Solutions
for Advanced Threat Protection with Next Generation Firewall, Intrusion Prevention,
AMP, and Content Security 592 pages
Advanced Threat Protection and Content Security

Show Titles
Integrated Security Technologies and Solutions - Volume I: Cisco Security Solutions
for Advanced Threat Protection with Next Generation Firewall, Intrusion Prevention,
AMP, and Content Security 592 pages
Secure Connectivity and Segmentation

Hide Titles
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks
272 pages
Internet Key Exchange v2 IPsec Virtual Private Networks: Understanding and
Deploying IKEv2, IPsec VPNs, and FlexVPN in Cisco IOS 450 pages
Network Security Technologies and Solutions 840 pages
IPSec VPN Design 384 pages
CCIE Security SSL VPN IOS & ASA 29 pages
CCIE Security DMVPN Dual Hub Workbook 15 pages
CCIEv5 DMVPN Quick Guide 15 pages
CCIEv5 DMVPN Labs Workbook 54 pages
CCIE Security IKEv2 & FlexVPN Quick Overview 47 pages
CCIE Security GET VPN Quick Overview 46 pages
CCIE Security IOS/ASA PKI Quick Overview 33 pages
FlexVPN Configuration Examples Varies
SSL VPN Configuration Guide Varies
Digital Certificates/PKI For IPSec VPNs Varies
Cisco Group Encrypted Transport VPN Varies
DMVPN Configuration Guide Varies
Configuring MACsec Encryption Varies
Remote VPN Client Load Balancing on Cisco ASA Varies
ASA VPN Load Balancing Master Election Process Varies
DMVPN With Dual Hubs Varies
VRF-lite Based Group Encrypted Transport VPN Varies
Configuring VRF-Lite Varies
VRF-Aware IPsec Varies
Cisco TrustSec Varies
Configuring Identities and Connections Varies
VLAN Configuration Varies
Private VLAN Configuration Varies
Generic Routing Encapsulation Varies
Cisco Virtual Security Gateway Varies
Improving Security with an Application-Centric Infrastructure Varies
Ethernet VPN Varies
Virtual Extensible LAN Varies
Network Virtualization Using Generic Routing Encapsulation Varies
Enterprise Network Segmentation with Cisco TrustSec - BRKCRS-2891 1:30:00
Deploying Security Group Tags - BRKSEC-2690 1:30:00
Innovations for Extending L3 VPN Segmentation over IP-Based WAN - BRKRST-2045
1:30:00
Building an Enterprise Access Control Architecture using ISE and TrustSec - BRKSEC-
2695 2:00:00
Advanced Security Group Tags: The Detailed Walk Through - BRKSEC-3690 2:00:00
Deploying TrustSec Security Group Tagging - BRKSEC-2203 1:30:00
Identity Management, Information Exchange, and Access Control

Show Titles
AAA Identity Management Security 480 pages
Infrastructure Security, Virtualization, and Automation

Show Titles
Evolving Technologies v1.1

Show Titles

You might also like