- Join CCNP Training Course & Get CCNA Absolutely FREE
- Courses Available Both Online and Classroom
- Best IT Networking Training Institute in Dubai
- + 971559454771
- + 97143346660
- training@iprulers.com
Job Availability is High : CCNP certification qualifies you for many different jobs such as IT Managers, computers and information systems manager etc.
Salary Potential is High : Getting a CCNP certification will qualify you for an array of employment opportunities and the chance to earn a higher salary.
More Skill Recognition : Being certified from a reputable organization like Cisco means that you will be recognized more in the industry.
Opportunity to Learn New Technology : The best way to keep your career growing is to keep up with the current technology, like getting CCNP certification.
Excellent Job Growth : Earning a CCNP certification puts you on the top of the list when it is time for promotions and career advancements.
Makes You Eligible For Advanced Certifications : Many Cisco certifications work as stepping stones for more advanced certifications.
350-701 SCOR Implementing and Operating Cisco Security Core Technologies (SCOR)
300-710 SNCF | Securing Networks with Cisco Firepower Next Generation Firewall (SSNGFW) |
300-715 SISE | Implementing and Configuring Cisco Identity Services Engine (SISE) |
300-720 SESA | Securing Email with Cisco Email Security Appliance (SESA) |
300-725 SWSA | Securing the Web with Cisco Web Security Appliance (SWSA) |
300-730 SVPN | Implementing Secure Solutions with Virtual Private Networks (SVPN) |
300-735 SAUTO | Implementing Automation for Cisco Security Solutions (SAUI) |
Date | Course | Training Type | Batch | Register |
14 March 2022 | CCNP Security | Classroom / Online | Weekdays (Mon-Fri) | |
28 March 2022 | CCNP Security | Classroom / Online | Weekdays (Mon-Fri) | |
12 March 2022 | CCNP Security | Classroom / Online | Weekend (Sat-Sun) | |
26 March 2022 | CCNP Security | Classroom / Online | Weekend (Sat-Sun) |
IP Rulers has a training schedule that can suit anyone, whether it be in groups or one-on-one, classroom-based, online or onsite corporate training, on weekdays or weekends. Each course, which is a combination of a core paper and a concentration paper, has a duration of 80 hours. For extra concentration papers, duration will change.
1.Identify security solutions for cloud environments
1.1 Implement NGFW modes
1.2 Implement NGIPS modes
1.3 Implement high availability options
1.4 Describe IRB configurations
2.1 Configure system settings in Cisco Firepower Management Center
2.2 Configure these policies in Cisco Firepower Management Center
2.3 Configure these features using Cisco Firepower Management Center
2.4 Configure objects using Firepower Management Center
2.5 Configure devices using Firepower Management Center
3.1 Troubleshoot with FMC CLI and GUI
3.2 Configure dashboards and reporting in FMC
3.3 Troubleshoot using packet capture procedures
3.4 Analyze risk and standard reports
4.1 Configure Cisco AMP for Networks in Firepower Management Center
4.2 Configure Cisco AMP for Endpoints in Firepower Management Center
4.3 Implement Threat Intelligence Director for third-party security intelligence feeds
4.4 Describe using Cisco Threat Response for security investigations
4.5 Describe Cisco FMC PxGrid Integration with Cisco Identify Services Engine (ISE)
4.6 Describe Rapid Threat Containment (RTC) functionality within Firepower Management Center
1.1 Configure personas
1.2 Describe deployment options
2.1 Configure native AD and LDAP
2.2 Describe identity store options
2.3 Configure wired/wireless 802.1X network access
2.4 Configure 802.1X phasing deployment
2.5 Configure network access devices
2.6 Implement MAB
2.7 Configure Cisco TrustSec
2.8 Configure policies including authentication and authorization profiles
3.1 Configure web authentication
3.2 Configure guest access services
3.3 Configure sponsor and guest portals
4.1 Implement profiler services
4.2 Implement probes
4.3 Implement CoA
4.4 Configure endpoint identity management
5.1 Describe Cisco BYOD functionality
5.2 Configure BYOD device on-boarding using internal CA with Cisco switches and Cisco wireless LAN controllers
5.3 Configure certificates for BYOD
5.4 Configure blacklist/whitelist
6.1 Describe endpoint compliance, posture services, and client provisioning
6.2 Configure posture conditions and policy, and client provisioning
6.3 Configure the compliance module
6.4 Configure Cisco ISE posture agents and operational modes
6.5 Describe supplicant, supplicant options, authenticator, and server
7.1 Compare AAA protocols
7.2 Configure TACACS+ device administration and command authorization
1.1. Configure Cisco Email Security Appliance features
1.2. Describe centralized services on a Cisco Content SMA
1.3. Configure mail policies
2.1 Control spam with Talos SenderBase and Antispam
2.2 Describe graymail management solution
2.3 Configure file reputation filtering and file analysis features
2.4 Implement malicious or undesirable URLs protection
2.5 Describe the bounce verification feature
3.1 Describe the functions and capabilities of content filters
3.2 Create text resources such as content dictionaries, disclaimers, and templates
3.3 Configure message filters components, rules, processing order and attachment scanning
3.4 Configure scan behavior
3.5 Configure the Cisco ESA to scan for viruses using Sophos and McAfee scanning engines
3.6 Configure outbreak filters
3.7 Configure Data Loss Prevention (DLP)
4.1 Configure and verify LDAP servers and queries (Queries and Directory Harvest Attack)
4.2 Understand spam quarantine functions
4.3 Understand SMTP functionality
5.1 Configure Domain Keys and DKIM signing
5.2 Configure SPF and SIDF
5.3 Configure DMARC verification
5.4 Configure forged email detection
5.5 Configure email encryption
5.6 Describe S/MIME security services and communication encryption with other MTAs
5.7 Manage certificate authorities
6.1 Configure quarantine (spam, policy, virus, and outbreak)
6.2 Utilize safelists and blocklists to control email delivery
6.3 Manage messages in local or external spam quarantines
6.4 Configure virtual gateways
1.1 Describe Cisco WSA features and functionality
1.2 Describe WSA solutions
1.3 Integrate Cisco WSA with Splunk
1.4 Integrate Cisco WSA with Cisco ISE
1.5 Troubleshoot data security and external data loss using log files
2.1 Perform initial configuration tasks on Cisco WSA
2.2 Configure an Acceptable Use Policy
2.3 Configure and verify web proxy features
2.4 Configure a referrer header to filter web categories
3.1 Compare proxy terms
3.2 Describe tune caching behavior for safety or performance
3.3 Describe the functions of a Proxy Auto-Configuration (PAC) file
3.4 Describe the SOCKS protocol and the SOCKS proxy services
4.1 Describe authentication features
4.2 Configure traffic redirection to Cisco WSA using explicit forward proxy mode
4.3 Describe the FTP proxy authentication
4.4 Troubleshoot authentication issues
5.1 Describe SSL and TLS inspection
5.2 Configure HTTPS capabilities
5.3 Configure self-signed and intermediate certificates within SSL/TLS transactions
6.1 Describe access policies
6.2 Describe identification profiles and authentication
6.3 Troubleshoot using access logs
7.1 Configure URL filtering
7.2 Configure the dynamic content analysis engine
7.3 Configure time-based & traffic volume acceptable use policies and end user notifications
7.4 Configure web application visibility and control (Office 365, third-party feeds)
7.5 Create a corporate global acceptable use policy
7.6 Implement policy trace tool to verify corporate global acceptable use policy
7.7 Configure WSA to inspect archive file types
8.1 Describe anti-malware scanning
8.2 Configure file reputation filtering and file analysis
8.3 Describe Advanced Malware Protection (AMP)
8.4 Describe integration with Cognitive Threat Analytics
9.1 Configure and analyze web tracking reports
9.2 Configure Cisco Advanced Web Security Reporting (AWSR)
9.3 Troubleshoot connectivity issues
1.1 Describe GETVPN
1.2 Implement DMVPN (hub-and-spoke and spoke-to-spoke on both IPv4 & IPv6)
1.3 Implement FlexVPN (hub-and-spoke on both IPv4 & IPv6) using local AAA
2.1 Implement AnyConnect IKEv2 VPNs on ASA and routers
2.2 Implement AnyConnect SSLVPN on ASA and routers
2.3 Implement Clientless SSLVPN on ASA and routers
2.4 Implement Flex VPN on routers
3.1 Troubleshoot IPsec
3.2 Troubleshoot DMVPN
3.3 Troubleshoot FlexVPN
3.4 Troubleshoot AnyConnect IKEv2 and SSL VPNs on ASA and routers
3.5 Troubleshoot Clientless SSLVPN on ASA and routers
4.1 Identify functional components of GETVPN, FlexVPN, DMVPN, and IPsec for site-to-site VPN solutions
4.2 Identify functional components of FlexVPN, IPsec, and Clientless SSL for remote access VPN solutions
4.3 Identify VPN technology based on configuration output for site-to-site VPN solutions
4.4 Identify VPN technology based on configuration output for remote access VPN solutions
4.5 Identify split tunneling requirements for remote access VPN solutions
4.6 Design site-to-site VPN solutions
4.7 Design remote access VPN solutions