- Join CCNP Training Course & Get CCNA Absolutely FREE
- Courses Available Both Online and Classroom
- Best IT Networking Training Institute in Dubai
- + 971559454771
- + 97143346660
- training@iprulers.com
Job Availability is High : CCNP certification qualifies you for many different jobs such as IT Managers, computers and information systems manager etc.
Salary Potential is High : Getting a CCNP certification will qualify you for an array of employment opportunities and the chance to earn a higher salary.
More Skill Recognition : Being certified from a reputable organization like Cisco means that you will be recognized more in the industry.
Opportunity to Learn New Technology : The best way to keep your career growing is to keep up with the current technology, like getting CCNP certification.
Excellent Job Growth : Earning a CCNP certification puts you on the top of the list when it is time for promotions and career advancements.
Makes You Eligible For Advanced Certifications : Many Cisco certifications work as stepping stones for more advanced certifications.
350-701 SCOR Implementing and Operating Cisco Security Core Technologies (SCOR)
300-710 SNCF | Securing Networks with Cisco Firepower Next Generation Firewall (SSNGFW) |
300-715 SISE | Implementing and Configuring Cisco Identity Services Engine (SISE) |
300-720 SESA | Securing Email with Cisco Email Security Appliance (SESA) |
300-725 SWSA | Securing the Web with Cisco Web Security Appliance (SWSA) |
300-730 SVPN | Implementing Secure Solutions with Virtual Private Networks (SVPN) |
300-735 SAUTO | Implementing Automation for Cisco Security Solutions (SAUI) |
Date | Course | Training Type | Batch | Register |
14 March 2022 | CCNP Security | Classroom / Online | Weekdays (Mon-Fri) | |
28 March 2022 | CCNP Security | Classroom / Online | Weekdays (Mon-Fri) | |
12 March 2022 | CCNP Security | Classroom / Online | Weekend (Sat-Sun) | |
26 March 2022 | CCNP Security | Classroom / Online | Weekend (Sat-Sun) |
IP Rulers has a training schedule that can suit anyone, whether it be in groups or one-on-one, classroom-based, online or onsite corporate training, on weekdays or weekends. Each course, which is a combination of a core paper and a concentration paper, has a duration of 80 hours. For extra concentration papers, duration will change.
1.Identify security solutions for cloud environments
1.1 Implement NGFW modes
1.2 Implement NGIPS modes
1.3 Implement high availability options
1.4 Describe IRB configurations
2.1 Configure system settings in Cisco Firepower Management Center
2.2 Configure these policies in Cisco Firepower Management Center
2.3 Configure these features using Cisco Firepower Management Center
2.4 Configure objects using Firepower Management Center
2.5 Configure devices using Firepower Management Center
3.1 Troubleshoot with FMC CLI and GUI
3.2 Configure dashboards and reporting in FMC
3.3 Troubleshoot using packet capture procedures
3.4 Analyze risk and standard reports
4.1 Configure Cisco AMP for Networks in Firepower Management Center
4.2 Configure Cisco AMP for Endpoints in Firepower Management Center
4.3 Implement Threat Intelligence Director for third-party security intelligence feeds
4.4 Describe using Cisco Threat Response for security investigations
4.5 Describe Cisco FMC PxGrid Integration with Cisco Identify Services Engine (ISE)
4.6 Describe Rapid Threat Containment (RTC) functionality within Firepower Management Center
1.1 Configure personas
1.2 Describe deployment options
2.1 Configure native AD and LDAP
2.2 Describe identity store options
2.3 Configure wired/wireless 802.1X network access
2.4 Configure 802.1X phasing deployment
2.5 Configure network access devices
2.6 Implement MAB
2.7 Configure Cisco TrustSec
2.8 Configure policies including authentication and authorization profiles
3.1 Configure web authentication
3.2 Configure guest access services
3.3 Configure sponsor and guest portals
4.1 Implement profiler services
4.2 Implement probes
4.3 Implement CoA
4.4 Configure endpoint identity management
5.1 Describe Cisco BYOD functionality
5.2 Configure BYOD device on-boarding using internal CA with Cisco switches and Cisco wireless LAN controllers
5.3 Configure certificates for BYOD
5.4 Configure blacklist/whitelist
6.1 Describe endpoint compliance, posture services, and client provisioning
6.2 Configure posture conditions and policy, and client provisioning
6.3 Configure the compliance module
6.4 Configure Cisco ISE posture agents and operational modes
6.5 Describe supplicant, supplicant options, authenticator, and server
7.1 Compare AAA protocols
7.2 Configure TACACS+ device administration and command authorization
1.1. Configure Cisco Email Security Appliance features
1.2. Describe centralized services on a Cisco Content SMA
1.3. Configure mail policies
2.1 Control spam with Talos SenderBase and Antispam
2.2 Describe graymail management solution
2.3 Configure file reputation filtering and file analysis features
2.4 Implement malicious or undesirable URLs protection
2.5 Describe the bounce verification feature
3.1 Describe the functions and capabilities of content filters
3.2 Create text resources such as content dictionaries, disclaimers, and templates
3.3 Configure message filters components, rules, processing order and attachment scanning
3.4 Configure scan behavior
3.5 Configure the Cisco ESA to scan for viruses using Sophos and McAfee scanning engines
3.6 Configure outbreak filters
3.7 Configure Data Loss Prevention (DLP)
4.1 Configure and verify LDAP servers and queries (Queries and Directory Harvest Attack)
4.2 Understand spam quarantine functions
4.3 Understand SMTP functionality
5.1 Configure Domain Keys and DKIM signing
5.2 Configure SPF and SIDF
5.3 Configure DMARC verification
5.4 Configure forged email detection
5.5 Configure email encryption
5.6 Describe S/MIME security services and communication encryption with other MTAs
5.7 Manage certificate authorities
6.1 Configure quarantine (spam, policy, virus, and outbreak)
6.2 Utilize safelists and blocklists to control email delivery
6.3 Manage messages in local or external spam quarantines
6.4 Configure virtual gateways
1.1 Describe Cisco WSA features and functionality
1.2 Describe WSA solutions
1.3 Integrate Cisco WSA with Splunk
1.4 Integrate Cisco WSA with Cisco ISE
1.5 Troubleshoot data security and external data loss using log files
2.1 Perform initial configuration tasks on Cisco WSA
2.2 Configure an Acceptable Use Policy
2.3 Configure and verify web proxy features
2.4 Configure a referrer header to filter web categories
3.1 Compare proxy terms
3.2 Describe tune caching behavior for safety or performance
3.3 Describe the functions of a Proxy Auto-Configuration (PAC) file
3.4 Describe the SOCKS protocol and the SOCKS proxy services
4.1 Describe authentication features
4.2 Configure traffic redirection to Cisco WSA using explicit forward proxy mode
4.3 Describe the FTP proxy authentication
4.4 Troubleshoot authentication issues
5.1 Describe SSL and TLS inspection
5.2 Configure HTTPS capabilities
5.3 Configure self-signed and intermediate certificates within SSL/TLS transactions
6.1 Describe access policies
6.2 Describe identification profiles and authentication
6.3 Troubleshoot using access logs
7.1 Configure URL filtering
7.2 Configure the dynamic content analysis engine
7.3 Configure time-based & traffic volume acceptable use policies and end user notifications
7.4 Configure web application visibility and control (Office 365, third-party feeds)
7.5 Create a corporate global acceptable use policy
7.6 Implement policy trace tool to verify corporate global acceptable use policy
7.7 Configure WSA to inspect archive file types
8.1 Describe anti-malware scanning
8.2 Configure file reputation filtering and file analysis
8.3 Describe Advanced Malware Protection (AMP)
8.4 Describe integration with Cognitive Threat Analytics
9.1 Configure and analyze web tracking reports
9.2 Configure Cisco Advanced Web Security Reporting (AWSR)
9.3 Troubleshoot connectivity issues
1.1 Describe GETVPN
1.2 Implement DMVPN (hub-and-spoke and spoke-to-spoke on both IPv4 & IPv6)
1.3 Implement FlexVPN (hub-and-spoke on both IPv4 & IPv6) using local AAA
2.1 Implement AnyConnect IKEv2 VPNs on ASA and routers
2.2 Implement AnyConnect SSLVPN on ASA and routers
2.3 Implement Clientless SSLVPN on ASA and routers
2.4 Implement Flex VPN on routers
3.1 Troubleshoot IPsec
3.2 Troubleshoot DMVPN
3.3 Troubleshoot FlexVPN
3.4 Troubleshoot AnyConnect IKEv2 and SSL VPNs on ASA and routers
3.5 Troubleshoot Clientless SSLVPN on ASA and routers
4.1 Identify functional components of GETVPN, FlexVPN, DMVPN, and IPsec for site-to-site VPN solutions
4.2 Identify functional components of FlexVPN, IPsec, and Clientless SSL for remote access VPN solutions
4.3 Identify VPN technology based on configuration output for site-to-site VPN solutions
4.4 Identify VPN technology based on configuration output for remote access VPN solutions
4.5 Identify split tunneling requirements for remote access VPN solutions
4.6 Design site-to-site VPN solutions
4.7 Design remote access VPN solutions
4.8 Identify Elliptic Curve Cryptography (ECC) algorithms
1.1 Utilize common version control operations with git (add, clone, push, commit, diff, branching, and merging conflict)
1.2 Describe characteristics of API styles (REST and RPC)
1.3 Describe the challenges encountered and patterns used when consuming APIs synchronously and asynchronously
1.4 Interpret Python scripts containing data types, functions, classes, conditions, and looping
1.5 Describe the benefits of Python virtual environments
1.6 Explain the benefits of using network configuration tools such as Ansible and Puppet for automating security platforms
2.1 Describe the event streaming capabilities of Firepower Management Center eStreamer API
2.2 Describe the capabilities and components of these APIs
2.3 Implement firewall objects, rules, intrusion policies, and access policies using Firepower Management Center API
2.4 Implement firewall objects, rules, intrusion policies, and access policies using Firepower Threat Defense API (also known as Firepower Device Manager API)
2.5 Construct a Python script for pxGrid to retrieve information such as endpoint device type, network policy and security telemetry
2.6 Construct API requests using Stealthwatch API
3.1 Describe the capabilities and components of these APIs
3.2 Construct an Umbrella Investigate API request
3.3 Construct AMP for endpoints API requests for event, computer, and policies
3.4 Construct ThreatGRID APIs request for search, sample feeds, IoC feeds, and threat disposition
4.1 Describe the capabilities and components of these APIs
4.2 Construct Stealthwatch cloud API request for reporting
4.3 Construct an Umbrella Reporting and Enforcement API request
4.4 Construct a report using Cisco Security Management Appliance API request (email and web)
Learn Deep Routed Technology from basics to advanced level
CCIE Certified trainers with industry experience.
CCNP Security Written exam preparation materials provided
Get Class recordings , Class notes , Reference books and lab videos
An enhanced lab topology that represents a real-world network
80 hours of technology labs
I am highly thankful to My Trainer Gigi Sir, who is 4XCCIE and his way teaching is unique, precise and very understandable. The experience I had in the lab was amazing. Labs are excellent and practical’s are done on real Cisco devices and it is available 24×7. I will always recommend IP Rulers for Cisco Certifications and other courses as well. IP Rulers is one of the best training Centre in this region.
This was one of the best Network training I have ever attended. The Institute, materials & facilitation was excellent. I recommend this training & Institute to all Network engineers who interested in seeing real progress in their professional carrier. Thank you again IP Rulers , Great Team & Great Work.
I really appreciate remarkable training I experienced from IP Rulers, they always provided good answers with real time scenarios of Cloud Infrastructure. Post-training helped & improved on my daily work concerns. IP Rulers is the best choice for the best training !!!.
Mr. Gigi Vikraman has been very supportive and amazing person. His way of teaching is completely a different style than others where the one who get in depth knowledge about the products. If anyone dream the lucky number, I recommend Gigi..
It was a great journey with IP Rulers for learning CCNP Enterprise. From the best guidance of Gigi Vikraman Sir, he is very helpful with exceptional teaching skill and he even make every complex topic very easy to understand which is really amazing. Thanks a lot..