Why not just follow the guidelines of Groupstudy?
> Do not post commercial advertisements concerning some product you are
>trying to sell to the
> list members. If you would like to offer the list members a discount for
>your product, please
> contact cisco-owner_at_groupstudy.com
><mailto:cisco-owner_at_groupstudy.com>for further instructions.
http://groupstudy.com/list/guide.html
-- Brian Dennis, CCIEx5 #2210 (R&S/ISP-Dial/Security/SP/Voice) bdennis_at_ine.com INE, Inc. http://www.INE.com On 11/25/12 11:40 PM, "Narbik Kocharians" <narbikk_at_gmail.com> wrote: >I honestly believe that vendors should be able to advertise their >product/s >in a forum like this, so people can see and know the new product/s that >are >available in the market. > >Why should a person go to a seriously bad boot camp and NOT talk about it, >or why should someone go to a good boot camp and not talk about it? > > > >I also believe that having vendors advertise here (Obviously a limited >version) will probably stop the vendor wars. > >It will also help people know their choices in books, racks, boot camps, >etc?. > >It will be a win win situation for all. > >If every advertisement has a heading that says that this is an >advertisement, you can delete it if you want. Limit the advertisement to >one a month per vendor. > > > >But if you truly need to stop all ads, *you should NOT allow signatures*, >or reference a blog or a URL that you are the owner or work for. This >means >all sorts of advertisements. BTW, I am OK either way? > > > >Just an idea??. > >On Sun, Nov 25, 2012 at 7:12 PM, Samarth Chidanand ><samarth_04_at_hotmail.com>wrote: > >> Friends and Marko, Sorry I posted the link. Below is the technical >> contents. >> This is the content of our workbook vol1 and Adv tech bootcamp. >> Module 1: ASA FirewallASA Initialization (Include redundant interface & >> ether >> channeling)Static and Default Routing With Route TrackingRouting on ASA >> (Unicast & Multicast)Management Access & Setup (SSH, Telnet, ASDM)DHCP >> Configuration & Relay ConfigurationTraffic Filtering on ASANetwork >>Address >> Translation (8.2)Network Address Translation (8.4/8.6)Single-Mode >> Transparent >> FirewallAdvance Features in Transparent FirewallNAT in Transparent >> FirewallApplication Inspection using MPFTCP Normalization using >>MPFContent >> FilteringHigh Availability b Active/Standby (Routed & Transparent >> Mode)Multi-Context Routed ModeMulti-Context Transparent ModeHigh >> Availability >> b Active/Active (Routed Mode)High Availability b Active/Active >> (Transparent Mode)Resource Allocation for ContextsThreat DetectionQoS on >> ASAIdentity Based FirewallContext Aware FirewallSystem Management (e.g., >> SNMP >> v3, Logging)Module 2: IOS FirewallBasic ZBF ConfigurationAdvance ZBF >> Configuration (Connection Limits)ZBF Application InspectionZBF Rate >> LimitingZBF (Transparent Mode)Basic CBACAdvance CBACIOS Content >> FilteringPAMAccess Control ListsFlexible Packet MatchingIOS Transparent >> Firewall (Basic & Advanced)Module 3: Intrusion Prevention System >>(IPS)IPS >> basic InitializationSwitch Settings for SPAN, RSPAN, TrunkPromiscuous >>Mode >> Settings (Basic & Advance)Inline Mode Settings (Basic & >>Advance)Configuring >> Multiple Virtual SensorsTraffic Analysis Settings for different IPS >> ModesTweaking IPS Signatures & ResponsesCreating Custom >> SignaturesConfiguring >> Advance Signature ActionsThreat & Risk ManagementConfiguring Event >>Action >> OverridesGlobal correlation and reputation based filteringAnomaly Based >> DetectionIPS System ManagementBasic IPS features on ASAEnabling IPS >> software >> module ASA 5515-xIOS IPSModule 4: Identity Services Engine (ISE)ISE >> InitializationCertificate ManagementActive Directory IntegrationCreating >> NDGs >> & Configuring AAA Clients (WLC & Switches)Creating User Identity Groups >>& >> Local Network Access UsersCreating Identity Store SequenceConfiguring >>the >> Switch for 802.1xConfiguring WLC for 802.1xConfiguring Authentication >> Policies >> for 802.1xConfiguring Authorization Policies for 802.1x b >>BasicConfiguring >> Authorization Policies for 802.1x b Advanced (With Machine >>authentication >> and Machine Access Restrictions)Configuring switch for 802.1x - Flex >>Auth >> (Order & Priority) + (Different host modes)Configuring & understanding >> 802.1x >> Open mode, Low Impact Mode and High Secure modeConfiguring end point >> identity >> groups and adding hostsConfiguring authentication & authorization >>policies >> for >> MAB on ISEConfiguring profiler services on ISEConfiguring probes on >> NADsConfiguring profiler policies and appropriate authentication & >> authorization policiesUnderstanding and configuring Central Web >> AuthenticationConfiguring MAB fallback authentication & authorization >> policies >> for CWA on ISEConfiguring Guest Services for external guest users on >> ISEConfiguring and Tweaking Sponsor & Guess PortalConfiguring ISE for >> Client >> Provisioning Services & PoliciesConfiguring ISE for Posture Services & >> Policies using NAC and Web Agents.Configuring Switch and ISE with MAC >>SEC >> option for 802.1xUnderstanding and Configuring ISE for Security Group >>Tags >> - >> SGT (Config Only)Configuring inline ISE for VPN Services (iPEP / >> iPEN)Configuring ISE for Distributed ArchitectureCut-Through Proxy / >> Authentication Proxy using ISE as AAA ServerSystem Management / >>Monitoring >> and >> TroubleshootingModule 5: Access Control Server (ACS)ACS >> InitializationConfiguring NAD s for AAA Device Access Administration >> (Routers/Switches/ASA) (Telnet, HTTP, SSH, Privilege levels >> etc.)Configuring >> NDG and Adding AAA Clients on ACSConfiguring Internal Identity Groups & >> Local >> Users, HostsIntegrating with Active DirectoryCertificate Management & >> Certificate Authentication Profiles with attribute retrievalCreating >> Identity >> Store SequenceConfiguring Policy Elements Parameters for AAA Device >> Administration (Shell Profile, Command Authorization Sets, Date and >>Time, >> DACL, Radius Attributes)Configuring Service Selection Policy (SSP) & >>Access >> ServicesConfiguring identity and authorization policies for AAA device >> administration (Authentication, Exec and Command >>authorization)Configuring >> policy elements parameters for Network Access AAA (cut-through proxy, >> authentication proxy and 802.1x)Configuring identity and authorization >> policies for cut through proxyConfiguring identity and authorization >> policies >> for 802.1x & MABIOS role based CLI using Local Database and >>ACSMonitoring, >> Reports and System AdministrationModule 6: Web Security Appliance >> (WSA)Configure WCCP (Needed for transparent mode of WSA)WSA >>Initialization >> using setup wizardUnderstanding explicit proxy deployment and >>transparent >> proxy deploymentEnable proxy services with basic URL >>filteringConfiguring >> proxy server information in web browsersConfigure acknowledgment and >>custom >> end-user notificationsConfiguring native FTP proxyConfiguring NTLM and >>LDAP >> based authenticationConfiguring authentication based access >> policiesConfiguring access policiesConfiguring identitiesConfiguring >> authentication exemptionsConfiguring acceptable use policiesConfiguring >>URL >> filtersConfiguring custom URL categoriesConfiguring media bandwidth >> limitsConfiguring application visibility and controlConfiguring proxy >> bypass >> list for WSA in transparent deploymentEnabling Web Reputation Scores >> (WBRS)Configuring anti-malware scanning (DVS, Access Policies, Outbound >> Malware Scanning)Configuring HTTPS proxy, HTTP decryption policies and >> inspectionConfiguring Iron Port data securityConfiguring Data Loss >> Prevention >> (DLP)Understanding and interpreting ACL tags/logsSystem >> ManagementUnderstanding L4TM (Brief)Module 7: Virtual Private Network >> (VPN)IPSec LAN-to-LAN Tunnel on IOS (Classical & VTI method)IPSec >> LAN-to-LAN >> Tunnel between IOS and ASA (WithB and Without NAT-T)IPSec hub and >>spoke on >> ASAIPSec redundancy features (link failure, node failure and SSO)Remote >> access >> IPSec VPN on IOS (Classical and DVTI)Remote access IPSec VPN on ASAIPSec >> Tunnels using ISAKMP profilesGRE over IPSec using ISAKMP profilesVRF >>Aware >> IPSec (LAN-LAN + Remote Access)CA Certificate Authority and IOS Sub CA >> ServerIOS certificate map & IOS DN based crypto mapsTunnel group >>mapping on >> ASAIPSec VPN Tunnels using IOS CADMVPN Phase-2 & Phase-3VRF Aware >> DMVPNDMVPN >> Phase-3 with hierarchical hubsGET VPN & Advance GET VPNFlexVPN (IKE >>v2)Misc >> IPSec Features and Options on IOS and ASAClientless SSL VPN on IOS and >> ASAAnyConnect BasicAnyConnect AdvancedRemote Access VPN authentication >> using >> AAA serverModule 8: System Hardening and AvailabilityRouting protocol >> security >> featuresControl Plane Protection and Management Plane >>ProtectionBroadcast >> control and switchport securityAdditional CPU protection mechanisms >> (options >> drop, logging interval)Disable unnecessary servicesDevice system >>services >> (SNMP, Syslog, NTP)Transit Traffic Control and Congestion >>ManagementModule >> 9: >> Threat Identification and MitigationMitigate or prevent fragmentation >> attacksMitigate or prevent against malicious IP option usageMitigate or >> prevent network reconnaissance attacksMitigate or prevent IP spoofing >> attacksMitigate or prevent MAC spoofing attacksMitigate or prevent ARP >> spoofing attacksMitigate or prevent DoS and DDoS attacksMitigate or >>prevent >> Man-in-the-Middle (MiM) attacksIdentify and protect port redirection >> attacksMitigate or prevent DHCP attacksMitigate or prevent DNS >> attacksMitigate >> or prevent MAC Flooding attacksMitigate or prevent VLAN hopping >> attacksMitigate or prevent various common Layer2 and Layer3 attacksUsing >> NBAR >> to mitigate network attacks on IOSNetFlow as attack mitigation tool on >>IOS >> and >> ASA >> >> Best Wishes. >> C SAMARTH >> CCIE #18535 (R&S , Security) >> >> >> > From: markom_at_ipexpert.com >> > Date: Sun, 25 Nov 2012 13:30:49 -0800 >> > Subject: Re: 10 days CCIE Sec v4 Adv tech bootcamp >> > To: samarth_04_at_hotmail.com >> > CC: ccielab_at_groupstudy.com >> > >> > And how about a little bit less SPAM, a little more technical content >> > here on the list? :-) >> > >> > -- >> > Marko Milivojevic - CCIE #18427 (SP R&S) >> > Senior CCIE Instructor - IPexpert >> > >> > On Sun, Nov 25, 2012 at 12:42 AM, Samarth Chidanand >> > <samarth_04_at_hotmail.com> wrote: >> > > Content Link -> >> http://netmetric-solutions.com/about_us/ccie_security.htmlWork >> > > book ready and the contents are the same.December class sold out. >>Jan >> 2013 >> > > class is open for registration >> > > SuperLab/Mock Lab workbook and bootcamp in progress - Approx in >> Feb/March >> > > >> > > >> > > >> > > Best Wishes. >> > > C SAMARTH >> > > CCIE #18535 (R&S , Security) >> > > >> > > >> > > Blogs and organic groups at http://www.ccie.net >> > > >> > > >>_______________________________________________________________________ >> > > Subscription information may be found at: >> > > http://www.groupstudy.com/list/CCIELab.html >> >> >> Blogs and organic groups at http://www.ccie.net >> >> _______________________________________________________________________ >> Subscription information may be found at: >> http://www.groupstudy.com/list/CCIELab.html >> >> >> >> >> >> >> >> > > >-- >*Narbik Kocharians >*CCSI#30832, CCIE# 12410 (R&S, SP, Security) >*www.MicronicsTraining.com* <http://www.micronicstraining.com/> >Sr. Technical Instructor >YES! We take Cisco Learning Credits! >A Cisco Learning Partner > > >Blogs and organic groups at http://www.ccie.net > >_______________________________________________________________________ >Subscription information may be found at: >http://www.groupstudy.com/list/CCIELab.html Blogs and organic groups at http://www.ccie.netReceived on Mon Nov 26 2012 - 02:33:59 ART
This archive was generated by hypermail 2.2.0 : Sat Dec 01 2012 - 07:27:51 ART