Sorry...Did a reply all by mistake....
Best Wishes.
C SAMARTH
CCIE #18535 (R&S , Security)
Date: Mon, 26 Nov 2012 19:29:35 -0800
Subject: Re: CCIE Sec v4
From: narbikk_at_gmail.com
To: samarth_04_at_hotmail.com
CC: tenge911_at_gmail.com; ccielab_at_groupstudy.com
Samarth,
You don't think it's enough?
On Mon, Nov 26, 2012 at 6:18 PM, Samarth Chidanand <samarth_04_at_hotmail.com>
wrote:
http://www.netmetric-solutions.com/about_us/ccie_security.html
Best Wishes.
C SAMARTH
CCIE #18535 (R&S , Security)
Date: Mon, 26 Nov 2012 15:56:53 -0600
Subject: Re: CCIE Sec v4
From: tenge911_at_gmail.com
To: samarth_04_at_hotmail.com
CC: ccielab_at_groupstudy.com
Hi there, this looks great. Can you please send me the link again, in all of
this email MADNESS about what you are allowed and not allowed to do, I have
lost the actul link. Please share the link for this new security course as
none of the other vendors have anything yet.
I for one, appreciate you small plug. Its easy to ignore one email, much
harder to ignore 50. Christian
On Sun, Nov 25, 2012 at 3:32 AM, Samarth Chidanand <samarth_04_at_hotmail.com>
wrote:
10 Day Advance Technology Bootcamp for CCIEv4 - Bootcamp contents and Vol 1
workbooknetmetric-solutions.com
Module 1: ASA FirewallASA Initialization (Include redundant interface & ether
channeling)Static and Default Routing With Route TrackingRouting on ASA
(Unicast & Multicast)Management Access & Setup (SSH, Telnet, ASDM)DHCP
Configuration & Relay ConfigurationTraffic Filtering on ASANetwork Address
Translation (8.2)Network Address Translation (8.4/8.6)Single-Mode Transparent
FirewallAdvance Features in Transparent FirewallNAT in Transparent
FirewallApplication Inspection using MPFTCP Normalization using MPFContent
FilteringHigh Availability b Active/Standby (Routed & Transparent
Mode)Multi-Context Routed ModeMulti-Context Transparent ModeHigh Availability
b Active/Active (Routed Mode)High Availability b Active/Active
(Transparent Mode)Resource Allocation for ContextsThreat DetectionQoS on
ASAIdentity Based FirewallContext Aware FirewallSystem Management (e.g., SNMP
v3, Logging)Module 2: IOS FirewallBasic ZBF ConfigurationAdvance ZBF
Configuration (Connection Limits)ZBF Application InspectionZBF Rate
LimitingZBF (Transparent Mode)Basic CBACAdvance CBACIOS Content
FilteringPAMAccess Control ListsFlexible Packet MatchingIOS Transparent
Firewall (Basic & Advanced)Module 3: Intrusion Prevention System (IPS)IPS
basic InitializationSwitch Settings for SPAN, RSPAN, TrunkPromiscuous Mode
Settings (Basic & Advance)Inline Mode Settings (Basic & Advance)Configuring
Multiple Virtual SensorsTraffic Analysis Settings for different IPS
ModesTweaking IPS Signatures & ResponsesCreating Custom SignaturesConfiguring
Advance Signature ActionsThreat & Risk ManagementConfiguring Event Action
OverridesGlobal correlation and reputation based filteringAnomaly Based
DetectionIPS System ManagementBasic IPS features on ASAEnabling IPS software
module ASA 5515-xIOS IPSModule 4: Identity Services Engine (ISE)ISE
InitializationCertificate ManagementActive Directory IntegrationCreating NDGs
& Configuring AAA Clients (WLC & Switches)Creating User Identity Groups &
Local Network Access UsersCreating Identity Store SequenceConfiguring the
Switch for 802.1xConfiguring WLC for 802.1xConfiguring Authentication
Policies
for 802.1xConfiguring Authorization Policies for 802.1x b BasicConfiguring
Authorization Policies for 802.1x b Advanced (With Machine authentication
and Machine Access Restrictions)Configuring switch for 802.1x - Flex Auth
(Order & Priority) + (Different host modes)Configuring & understanding 802.1x
Open mode, Low Impact Mode and High Secure modeConfiguring end point identity
groups and adding hostsConfiguring authentication & authorization policies
for
MAB on ISEConfiguring profiler services on ISEConfiguring probes on
NADsConfiguring profiler policies and appropriate authentication &
authorization policiesUnderstanding and configuring Central Web
AuthenticationConfiguring MAB fallback authentication & authorization
policies
for CWA on ISEConfiguring Guest Services for external guest users on
ISEConfiguring and Tweaking Sponsor & Guess PortalConfiguring ISE for Client
Provisioning Services & PoliciesConfiguring ISE for Posture Services &
Policies using NAC and Web Agents.Configuring Switch and ISE with MAC SEC
option for 802.1xUnderstanding and Configuring ISE for Security Group Tags -
SGT (Config Only)Configuring inline ISE for VPN Services (iPEP /
iPEN)Configuring ISE for Distributed ArchitectureCut-Through Proxy /
Authentication Proxy using ISE as AAA ServerSystem Management / Monitoring
and
TroubleshootingModule 5: Access Control Server (ACS)ACS
InitializationConfiguring NAD s for AAA Device Access Administration
(Routers/Switches/ASA) (Telnet, HTTP, SSH, Privilege levels etc.)Configuring
NDG and Adding AAA Clients on ACSConfiguring Internal Identity Groups & Local
Users, HostsIntegrating with Active DirectoryCertificate Management &
Certificate Authentication Profiles with attribute retrievalCreating Identity
Store SequenceConfiguring Policy Elements Parameters for AAA Device
Administration (Shell Profile, Command Authorization Sets, Date and Time,
DACL, Radius Attributes)Configuring Service Selection Policy (SSP) & Access
ServicesConfiguring identity and authorization policies for AAA device
administration (Authentication, Exec and Command authorization)Configuring
policy elements parameters for Network Access AAA (cut-through proxy,
authentication proxy and 802.1x)Configuring identity and authorization
policies for cut through proxyConfiguring identity and authorization policies
for 802.1x & MABIOS role based CLI using Local Database and ACSMonitoring,
Reports and System AdministrationModule 6: Web Security Appliance
(WSA)Configure WCCP (Needed for transparent mode of WSA)WSA Initialization
using setup wizardUnderstanding explicit proxy deployment and transparent
proxy deploymentEnable proxy services with basic URL filteringConfiguring
proxy server information in web browsersConfigure acknowledgment and custom
end-user notificationsConfiguring native FTP proxyConfiguring NTLM and LDAP
based authenticationConfiguring authentication based access
policiesConfiguring access policiesConfiguring identitiesConfiguring
authentication exemptionsConfiguring acceptable use policiesConfiguring URL
filtersConfiguring custom URL categoriesConfiguring media bandwidth
limitsConfiguring application visibility and controlConfiguring proxy bypass
list for WSA in transparent deploymentEnabling Web Reputation Scores
(WBRS)Configuring anti-malware scanning (DVS, Access Policies, Outbound
Malware Scanning)Configuring HTTPS proxy, HTTP decryption policies and
inspectionConfiguring Iron Port data securityConfiguring Data Loss Prevention
(DLP)Understanding and interpreting ACL tags/logsSystem
ManagementUnderstanding L4TM (Brief)Module 7: Virtual Private Network
(VPN)IPSec LAN-to-LAN Tunnel on IOS (Classical & VTI method)IPSec LAN-to-LAN
Tunnel between IOS and ASA (WithB and Without NAT-T)IPSec hub and spoke on
ASAIPSec redundancy features (link failure, node failure and SSO)Remote
access
IPSec VPN on IOS (Classical and DVTI)Remote access IPSec VPN on ASAIPSec
Tunnels using ISAKMP profilesGRE over IPSec using ISAKMP profilesVRF Aware
IPSec (LAN-LAN + Remote Access)CA Certificate Authority and IOS Sub CA
ServerIOS certificate map & IOS DN based crypto mapsTunnel group mapping on
ASAIPSec VPN Tunnels using IOS CADMVPN Phase-2 & Phase-3VRF Aware DMVPNDMVPN
Phase-3 with hierarchical hubsGET VPN & Advance GET VPNFlexVPN (IKE v2)Misc
IPSec Features and Options on IOS and ASAClientless SSL VPN on IOS and
ASAAnyConnect BasicAnyConnect AdvancedRemote Access VPN authentication using
AAA serverModule 8: System Hardening and AvailabilityRouting protocol
security
featuresControl Plane Protection and Management Plane ProtectionBroadcast
control and switchport securityAdditional CPU protection mechanisms (options
drop, logging interval)Disable unnecessary servicesDevice system services
(SNMP, Syslog, NTP)Transit Traffic Control and Congestion ManagementModule 9:
Threat Identification and MitigationMitigate or prevent fragmentation
attacksMitigate or prevent against malicious IP option usageMitigate or
prevent network reconnaissance attacksMitigate or prevent IP spoofing
attacksMitigate or prevent MAC spoofing attacksMitigate or prevent ARP
spoofing attacksMitigate or prevent DoS and DDoS attacksMitigate or prevent
Man-in-the-Middle (MiM) attacksIdentify and protect port redirection
attacksMitigate or prevent DHCP attacksMitigate or prevent DNS
attacksMitigate
or prevent MAC Flooding attacksMitigate or prevent VLAN hopping
attacksMitigate or prevent various common Layer2 and Layer3 attacksUsing NBAR
to mitigate network attacks on IOSNetFlow as attack mitigation tool on IOS
and
ASA
Best Wishes.
C SAMARTH
CCIE #18535 (R&S , Security)
Blogs and organic groups at http://www.ccie.net
Received on Tue Nov 27 2012 - 03:30:49 ART
This archive was generated by hypermail 2.2.0 : Sat Dec 01 2012 - 07:27:51 ART