Advanced CCIE Security Workbook v4 (Technology Focused)

security-advanced-ccie

Advanced CCIE Security Workbook v4 (Technology Focused)

$350.00$550.00

The Advanced CCIE Security E-Workbook (Locklizard Secured PDF File/DRM) is designed to empower CCIE Security candidates who want to get up to speed quickly on all security technologies covered by current CCIE Security Blueprint. This book is a combination of security technologies, how to configure and troubleshoot. The new workbook is covering all technologies and features necessary to pass CCIE Security practical exam. This book has over 2000 pages of technology-focused labs with detailed explanation of configuration lines and debugs. Purchases are non-refundable. 

To view a sample of our Security workbook, please login to the following link:
http://micronics.nl/Sample.pdf
 
Locklizard Technical Requirement login to http://www.locklizard.com/pdf_security_technical.htm.

Please contact sales@micronicstraining.com for shipping rates to Hawaii or Alaska. We do not ship printed version to international locations other than U.S. Territories and Military APO/FPO addresses. You should receive your order within 7-10 business days.
Please allow additional time for shipments to U.S. Territories, PO Boxes, or Military APO/FPO addresses. All purchases are final and non-refundable.

Clear
SKU: N/A Categories: ,

Additional Information

Workbook Options

Electronic, Printed

Book Outline



LAB 1.1. BASIC ASA CONFIGURATION
LAB 1.2. BASIC SECURITY POLICY
LAB 1.3. DYNAMIC ROUTING PROTOCOLS
LAB 1.4. ASA MANAGEMENT
LAB 1.5. STATIC NAT (8.2)
LAB 1.6. DYNAMIC NAT (8.2)
LAB 1.7. NAT EXEMPTION (8.2)
LAB 1.8. STATIC POLICY NAT (8.2)
LAB 1.9. DYNAMIC POLICY NAT (8.2)
LAB 1.10. STATIC NAT (8.3+)
LAB 1.11. DYNAMIC NAT (8.3+)
LAB 1.12. BIDIRECTIONAL NAT (8.3+)
LAB 1.13. MODULAR POLICY FRAMEWORK (MPF)
LAB 1.14. FTP ADVANCED INSPECTION
LAB 1.15. HTTP ADVANCED INSPECTION
LAB 1.16. INSTANT MESSAGING ADVANCED INSPECTION
LAB 1.17. ESMTP ADVANCED INSPECTION
LAB 1.18. DNS ADVANCED INSPECTION
LAB 1.19. ICMP ADVANCED INSPECTION
LAB 1.20. CONFIGURING VIRTUAL FIREWALLS
LAB 1.21. ACTIVE/STANDBY FAILOVER
LAB 1.22. ACTIVE/ACTIVE FAILOVER
LAB 1.23. REDUNDANT INTERFACES
LAB 1.24. TRANSPARENT FIREWALL
LAB 1.25. THREAT DETECTION
LAB 1.26. CONTROLLING ICMP AND FRAGMENTED TRAFFIC
LAB 1.27. TIME BASED ACCESS CONTROL
LAB 1.28. QOS – PRIORITY QUEUING
LAB 1.29. QOS – TRAFFIC POLICING
LAB 1.30. QOS – TRAFFIC SHAPING
LAB 1.31. QOS – TRAFFIC SHAPING WITH PRIORITIZATION
LAB 1.32. SLA ROUTE TRACKING
LAB 1.33. ASA IP SERVICES (DHCP)
LAB 1.34. URL FILTERING AND APPLETS BLOCKING
LAB 1.35. TROUBLESHOOTING USING PACKET TRACER AND CAPTURE TOOLS


LAB 1.36. BASIC SITE-TO-SITE IPSEC VPN MAIN MODE (IOS-IOS)
LAB 1.37. BASIC SITE-TO-SITE IPSEC VPN AGGRESSIVE MODE (IOS-IOS)
LAB 1.38. BASIC SITE-TO-SITE VPN WITH NAT (IOS-IOS)
LAB 1.39. IOS CERTIFICATE AUTHORITY
LAB 1.40. SITE-TO-SITE IPSEC VPN USING PKI (ASA-ASA)
LAB 1.41. SITE-TO-SITE IPSEC VPN USING PKI (IOS-IOS)
LAB 1.42. SITE-TO-SITE IPSEC VPN USING PKI (STATIC IP IOS-ASA)
LAB 1.43. SITE-TO-SITE IPSEC VPN USING PKI (DYNAMIC IP IOS-ASA)
LAB 1.44. SITE-TO-SITE IPSEC VPN USING PSK (IOS-ASA HAIRPINNING)
LAB 1.45. SITE-TO-SITE IPSEC VPN USING EASYVPN NEM  (IOS-IOS)
LAB 1.46. SITE-TO-SITE IPSEC VPN USING EASYVPN NEM  (IOS-ASA)
LAB 1.47. SITE-TO-SITE IPSEC VPN USING EASYVPN WITH ISAKMP PROFILES  (IOS-IOS)
LAB 1.48. GRE OVER IPSEC
LAB 1.49. DMVPN PHASE 1
LAB 1.50. DMVPN PHASE 2 (WITH EIGRP)
LAB 1.51. DMVPN PHASE 2 (WITH OSPF)
LAB 1.52. DMVPN PHASE 3 (WITH EIGRP)
LAB 1.53. DMVPN PHASE 3 (WITH OSPF)
LAB 1.54. DMVPN PHASE 2 DUAL HUB  (SINGLE CLOUD)
LAB 1.55. DMVPN PHASE 2 DUAL HUB  (DUAL CLOUD)
LAB 1.56. GET VPN (PSK)
LAB 1.57. GET VPN (PKI)
LAB 1.58. GET VPN COOP (PKI)


LAB 1.59. CONFIGURING REMOTE ACCESS IPSEC VPN USING EASYVPN (IOS TO IOS)
LAB 1.60. CONFIGURING REMOTE ACCESS IPSEC VPN USING EASYVPN (IOS TO ASA)
LAB 1.61. CONFIGURING RA VPN USING CISCO VPN CLIENT AND ASA (PSK)
LAB 1.62. CONFIGURING RA VPN USING CISCO VPN CLIENT AND ASA (PKI)
LAB 1.63. CONFIGURING SSL VPN (IOS)
LAB 1.64. CONFIGURING SSL VPN (ASA)
LAB 1.65. ANYCONNECT 3.0 BASIC SETUP
LAB 1.66. ANYCONNECT 3.0 ADVANCED FEATURES
LAB 1.67. EASYVPN SERVER ON ASA WITH LDAP AUTHENTICATION


LAB 1.68. IPSEC STATEFUL FAILOVER
LAB 1.69. IPSEC STATIC VTI
LAB 1.70. IKE ENCRYPTED KEYS
LAB 1.71. IPSEC DYNAMIC VTI
LAB 1.72. REVERSE ROUTE INJECTION (RRI)
LAB 1.73. CALL ADMISSION CONTROL FOR IKE
LAB 1.74. IPSEC LOAD BALANCING (ASA CLUSTER)


LAB 2.1. SENSOR INITIALIZATION
LAB 2.2. PROMISCUOUS MODE
LAB 2.3. INLINE MODE
LAB 2.4. INLINE VLAN PAIR MODE (ON-A-STICK)
LAB 2.5.SIGNATURE TUNING
LAB 2.6. CUSTOM HTTP SIGNATURE
LAB 2.7. CUSTOM STRING TCP SIGNATURE
LAB 2.8. CUSTOM ATOMIC IP SIGNATURE
LAB 2.9. META SIGNATURE
LAB 2.10. BLOCKING AND RATE LIMITING
LAB 2.11. RULES
LAB 2.12. ANOMALY DETECTION
LAB 2.13. VIRTUAL SENSORS
LAB 2.14. EVENT SUMMARIZATION
LAB 2.15. APPLICATION INSPECTION AND LOGGING


LAB 2.16. WSA BOOTSTRAPPING (OPTIONAL)
LAB 2.17. DNS AND ROUTING CONFIGRATION
LAB 2.18. WSA IDENTITIES AND ACCESS POLICIES
LAB 2.19. ACTIVE DIRECTORY INTEGRATION
LAB 2.20. USER AUTHENTICATION
LAB 2.21. CUSTOM URL CATEGORIES
LAB 2.22. DECRYPTION POLICIES
LAB 2.23. BANDWIDTH AND FILE TYPE LIMITS
LAB 2.24. APPLICATION VISIBILITY AND CONTROL
LAB 2.25. WEB REPUTATION AND DVS
LAB 2.26. TRANSPARENT PROXY WITH ASA


LAB 2.27. ACS BOOTSTRAPPING
LAB 2.28. SETUP AAA CLIENTS
LAB 2.29. USER AUTHENTICATION AND AUTHORIZATION (IOS)
LAB 2.30. LOCAL USER AUTHENTICATION AND AUTHORIZATION USING AAA (IOS)
LAB 2.31. TACACS+ USER AUTHENTICATION (IOS)
LAB 2.32. TACACS+ AUTHENTICATION AND AUTHORIZATION (IOS)
LAB 2.33. ACCOUNTING USING TACACS+ AND RADIUS (IOS)
LAB 2.34. IOS AUTHENTICATION PROXY
LAB 2.35. AUTHENTICATION PROXY ON ASA
LAB 2.36. ACS EXTERNAL IDENTITY STORE


LAB 3.1. ISE INSTALLATION (OPTIONAL)
LAB 3.2. GENERATE AND INSTALL A CERTIFICATE
LAB 3.3. ADMINISTRATIVE ACCESS TO ISE
LAB 3.4. INTEGRATION WITH ACTIVE DIRECTROY
LAB 3.5. CONFIGURE ISE FOR MAB
LAB 3.6. CONFIGURE MAC WHITELIST
LAB 3.7. MAB WITH VLAN AUTHORIZATION
LAB 3.8. WINDOWS 7 AD INTEGRATION (OPTIONAL)
LAB 3.9. CONFIGURE WIRED 802.1X
LAB 3.10. WIRED 802.1X VLAN ASSIGNMENT
LAB 3.11. CONFIGURE WIRELESS 802.1X
LAB 3.12. LOCAL WEB AUTHENTICATION (LWA) FOR WIRED
LAB 3.13. CENTRAL WEB AUTHENTICATION (CWA) FOR WIRED
LAB 3.14. CENTRAL WEB AUTHENTICATION (CWA) FOR WIRELESS
LAB 3.15. CONFIGURE ISE FOR GUEST ACCESS
LAB 3.16. CONFIGURE ISE PROFILER
LAB 3.17. ANYCONNECT NAM
LAB 3.18. MACSEC SWITCH-TO-HOST
LAB 3.19. MACSEC SWITCH-TO-SWITCH


LAB 3.20. BASIC ROUTER SECURITY
LAB 3.21. STANDARD NAMED ACCESS LIST
LAB 3.22. CONTROLLING TELNET ACCESS AND SSH
LAB 3.23. EXTENDED ACCESS LIST IP AND ICMP
LAB 3.24 .EXTENDED ACCESS LIST OSPF & EIGRP
LAB 3.25. EXTENDED ACCESS LIST WITH ESTABLISHED
LAB 3.26. DYNAMIC ACCESS LIST
LAB 3.27. REFLEXIVE ACCESS-LISTS
LAB 3.28. ACCESS-LIST AND TIME-RANGE
LAB 3.29. CONFIGURING BASIC CBAC
LAB 3.30. CONFIGURING ADVANCED CBAC
LAB 3.31. CONFIGURING CBAC & JAVA BLOCKING
LAB 3.32. CONFIGURING PAM
LAB 3.33. ZONE BASED POLICY FIREWALL (ZFW)
LAB 3.34. IMPLEMENTING SECURITY RFCS
LAB 3.35. USING MQC AS A FILTERING TOOL
LAB 3.36. BLACKHOLE ROUTING USING PBR
LAB 3.37. CONFIGURING NAT
LAB 3.38. NAT WITH OVERLAPPING NETWORKS
LAB 3.39. NAT TCP LOAD BALANCING
LAB 3.40. STATEFUL HIGH AVAILABILITY NAT
LAB 3.41. NAT VIRTUAL INTERFACE
LAB 3.42. TCP INTERCEPT
LAB 3.43. CONFIGURING NBAR
LAB 3.44. CONFIGURING NETFLOW
LAB 3.45. CONFIGURING IOS IPS


LAB 3.46. CPU PROTECTION MECHANISMS
LAB 3.47. DISABLING UNNECESSARY SERVICES
LAB 3.48. CONFIGURING SNMP
LAB 3.49. CONFIGURING SYSLOG
LAB 3.50. CONFIGURING NTP
LAB 3.51. PROTOCOL AUTHENTICATION AND ROUTE FILTERING
LAB 3.52. CONTROL PLANE POLICY (COPP)


LAB 3.53. PROTECTING AGAINST FRAGMENTATION ATTACKS
LAB 3.54. PROTECTING AGAINST MALICIOUS IP OPTION USAGE
LAB 3.55. PROTECTING AGAINST NETWORK MAPPING
LAB 3.56. PROTECTING AGAINST DOS ATTACKS USING CAR
LAB 3.57. PREVENTING PORT REDIRECTION ATTACKS
LAB 3.58. PROTECTING AGAINST SMURF ATTACKS
LAB 3.59. PORT SECURITY
LAB 3.60. PREVENTING VLAN HOPING ATTACKS
LAB 3.61. VLAN ACCESS LIST
LAB 3.62. DHCP SNOOPING AND DYNAMIC ARP INSPECTION
LAB 3.63. IP SOURCE GUARD
LAB 3.64. PROTECTING AGAINST BROADCAST STORMS
LAB 3.65. PROTECTING SPANNING-TREE PROTOCOL
LAB 3.66. PREVENTING IP SPOOFING


Close
loading...