CCNP Security New

Upcoming Trainings

DATE TRAINING TYPE CITY
30/01/2017- 11/03/2017 Regular Batch(Mon-Fri) Classroom Pune ENROLL NOW
13/02/2017-25/03/2017 Regular Batch(Mon-Fri) Classroom Pune ENROLL NOW
13/03/2017-22/04/2017 Regular Batch(Mon-Fri) Classroom Pune ENROLL NOW
27/03/2017-06/05/2017 Regular Batch(Mon-Fri) Classroom Pune ENROLL NOW
24/04/2017-03/06/2017 Regular Batch(Mon-Fri) Classroom Pune ENROLL NOW

Can’t find desired training? Request for a training
.

Overview

CCNP Security Training Course Institute in Pune

CCNP Security Training course in Pune is for mainly for those candidates who have the desire to build their career in Network Security Domain. I-Medita’s CCNP Security Training is an industry oriented training program with hands on practical’s on Real-time Cisco Security Devices. This Training prepares you for Cisco CCNP Security Global Certification.

CCNP (Cisco Certified Network Professional) Security Certification is also known as CCSP (Cisco Certified Security Professional). This is the combination of four different modules Implementing Cisco Edge Network Security Solutions, Threat Control Solutions, Secure Access Solutions and Secure Mobility Solutions. After successful completion of CCNP Security Training, the student is aligned specifically to the job role of the Cisco Network Security Engineer responsible for Security in Routers, Switches, Networking devices, and appliances.

During the CCNP Security certification Training program trainees will have to perform practical’s on Real-time Cisco Routers, Switches, firewalls, IPS etc. At I-Medita, we have 24*7 Cisco Labs wherein students can come anytime and perform practicals under the supervision of experts.

Before you get yourself Trained on CCNP Security you should have knowledge about CCNA Routing & Switching  and CCNA Security.

Devices to be used During CCNP Security Training:-

  • Routers: Cisco 1841 (Version 15.x), 2610, 2611, 2611xm, 2811
  • Switches: Cisco 2950, 3560 POE, 3750 (Version 12.x)
  • Firewall: Cisco 5510 (Version 8.x & 9.x)
  • Cisco IPS: 4255 (Version 7.x)
  • Cisco WSA: Virtual (Version 8.x & 9.x)
  • Cisco ESA: Virtual (Version 9.x)
  • Cisco ISE: Virtual (Version 1.x & 2.x)
  • Cisco WLC: Virtual (Version 8.x)
  • Cisco AP: 1242

Why I-Medita CCNP Security Training?

  • 24*7 Lab Access to make you skillful in CCNP Security.
  • Course Revision – By enrolling once you can avail classes for same training up to 3 times.
  • Project Based Learning Methodology.
  • Latest Series of Firewalls, Routers, IPS etc.
  • Dedicated Racks/Devices for hands on Practicals.
  • Training delivered by Certified Experts Trainers.
  • Study Material i.e Books, Tutorials, Video Lectures, Interview Questions etc
  • Authorized Training Certificate from I-Medita.
  • Placement Support and Guidance.
  • Unique Resume Writing classes.

Course Outline

CCNP Security Training Course Outline:-

CCNP Certification consists of four certifications. During your CCNP Training below mentioned course structure will be followed.

  1. CCNP_Security 300-206 SENSS
  2. CCNP_Security 300-207 SITCS
  3. CCNP_Security 300-208 SISAS
  4. CCNP_Security 300-209 SIMOS

CCNP_Security 300-206 SENSS

Introduction of Firewall

  • Packet Filtering,Proxy Server, StateFul Firewall, Transparent Firewall

Introduction of ASA

  • ASA Features, Proprietary Operating System (P), StateFul Firewall, User-Based Authentication
  • Protocols & Application Inspection, Modular Policy Frame Work
  • Virtual Private Network, Virtual Firewall
  • Web Based Management
  • Transparent Firewall
  • Stateful Failover (P)
  • IPv6, Clustering, VPN Load Balancing (P)

ASA Basics

  • How to set Hostname, How to set enable password, How to assign IP address to interface
  • How to assign security-level, How to enable Telnet
  • How to enable SSH, How to enable HTTP, How to take Backup of ASA, How to Upgrade ASA
  • How to recover ASA password
  • Labs

Introduction of Access-list

  • Introduction of Access-list & Types, Standards Access-list, Extended Access-list, Time Base Access-list
  • Botnet Traffic Filtering , Object Group & Types, Network Object, Protocol Object, Service Object, ICMP Object
  • IPv6 Access-list
  • Lab

Introduction of NAT on ASA OS 9.x

  • Static NAT, Dynamic NAT, Port Address Translation, Static PAT, Identity NAT, Twice NAT
  • Lab

Introduction of IPSec

  • Confidentiality, Integrity, Data Origin Authentication, Anti-Replay, IPSec Protocols
  • IKE, ESP, AH, IKE Mode, Main Mode, Aggressive Mode, Quick Mode, IKE Phases
  • Phase 1, Phase 1.5, Phase 2, IPSec Mode, Transport Mode, Tunnel Mode
  • Security Association, Security Association Components, Security Association Database
  • Security Policy Database, NAT-T, NAT-T Steps, NAT-T Support, NAT-T Detection, NAT-T Decision, ISAKMP
  • Microsoft Server 2003, 2008, 2012, 2016 Certificate Authority installation.
  • Labs

Introduction of Site-Site VPN

  • Introduction
  • Site-Site VPN Working
  • Lab

Introduction of Remote Access VPN

  • Client Mode, Network Extension Mode, Network Extension Plus
  • Remote Access VPN Working
  • Lab

Introduction of VPN Load balancing

  • Supported Protocols
  • Cluster, Master, Member, Load balancing
  • Virtual Cluster Agent
  • Lab

Introduction of SSL VPN

  • SSL Mode, Clientless, Thin-client, Thick-client, Requirements
  • Working
  • Lab

Introduction of Transparent Firewall

  • ASA Mode Route ,ASA Mode Transparent
  • Transparent Firewall Limitation
  • Lab

Introduction of Context

  • System Area, Admin Context, Context Channing
  • Mac-Address Auto, Context Requirements
  • Context Limitations, Advantages of Context.
  • Lab

Introduction of Failover

  • Failover Requirements, Failover Hardware Requirements, Failover Software Requirements
  • Failover Types, Stateless Failover, Hardware Failover, State Full Failover, Failover Implementation Types
  • Active-Standby,Active-Active
  • Lab

Introduction of Modular Policy Framework

  • MPF Features, Inspection of Connection, Connection Restriction
  • Traffic Prioritization, Traffic Policing, MPF Components
  • Class-map, Policy-map, Service-policy
  • Default-inspected Protocols and applications
  • DCE, SUN RPC, ILS, NetBIOS, XDMCP
  • IPSec-Pass-Through, ICMP, FTP, SMTP, DNS, TFTP, HTTP
  • RSH, SQL.NET, SIP, SCCP, CTIQBE, MGCP
  • Lab

Introduction of Clustering

  • Clustering Terminology
  • Interface Types
  • Load balancing in Clustering, Cluster Monitoring, Limitation of Clustering
  • Supported Features of Clustering
  • Labs

Management of ASA

  • ASA as DHCP, ASA as DHCP Relay-Agent, Fragmentation
  • uRPF, Ether Channel, Redundant Interface
  • Labs

Introduction  of Layer 2 Security

  • CAM Table Overflow , Rough DHCP Attack, DHCP Starvation
  • Port Security, DHCP Snooping, DHCP Attack Prevention via ACL
  • IP Spoofing, IP Source Binding , Protected Port
  • VLAN ACL, Switch Spoofing, DAI & Layer 2 ACL, Man-in-Middle-Attack
  • MAB, Dot1x, Dynamic VLAN, Private VLAN, Proxy Attack, Proxy Attack Solution
  • VLAN Hopping , MAC Spoofing , STP Vulnerabilities, Storm Control, MACSec
  • STP Protection Root Guard, STP Protection Loop Guard, STP Protection BPDU Guard
  • STP Protection BPDU Filter, STP Protection UDLD Lab, STP Protection Port Fast
  • STP Protection Uplink Fast, STP Protection Back Bone Fast
  • Labs

Introduction of Secure Access

  • NetFlow Configuration, SSH, HTTPS, SNMPv3, NTP
  • Packet Tracer
  • Packet Capture

Cisco Security Manager and Prime Introduction

  • Cisco Security Manager Installation
  • Cisco Prime Infrastructure Introduction
  • Cisco Prime Infrastructure Installation
  • Cisco ASDM
  • Data Center Security Components
  • Virtualization
  • Cloud Security
  • ASA UC Inspection
  • Labs

Device Hardening

  • Cisco Switch
  • Cisco Router
  • Cisco ASA
  • Labs

CCNP_Security 300-208 SISAS

Introduction of AAA

  • TACACS+, RADIUS, Active Directory ,LDAP ,PKI,OTP, AAA Products.
  • Smart Card, local

Identity Service Engine

  • ISE Personas, Admin Persona, Policy Service Persona, Management Persona
  • ISE Installation, ISE Up gradation, ISE Patch Installation

EAP types

  • 802.1X Phases, 802.1X Modes (monitor mode, low impact, closed mode)
  • MAB ,MAB Process, MAB Implementation, MAB Verification

802.1X Implementation

  • 802.1X Verification
  • 802.1X Dynamic VLAN Implementation
  • 802.1X Dynamic VLAN Verification

Downloadable Access List

  • DACL Implementation
  • DACL Verification

Downloadable Access List VLAN Verification

Introduction  of Local Web Authentication

  • Local Web Authentication Implementation
  • Local Web Authentication Verification

Introduction  of Central Web Authentication

  • Central Web Authentication Implementation
  • Central Web Authentication Verification
  • Sponsor portals
  • Guest portals

Introduction  of Profiling

  • Profiling Implementation
  • Profiling Verification

Introduction  of Posture

  • Posture Implementation
  • Posture Verification

Introduction of SGA/SGT

  • SGA/SGT Implementation
  • SGA/SGT Verification
  • Network probes
  • Introduction of BYOD access
  • BYOD Implementation
  • BYOD Verification

Introduction of TrustSec Architecture

  • SGT Classification – dynamic/static
  • SGT Transport – inline tagging and SXP
  • SGT Enforcement – SGACL and SGFW
  • MACSec

Troubleshooting,

  • MAB, 802.1X, Dynamic VLAN, Downloadable Access-list, Local Web Authentication
  • Central Web Authentication, Profiling, Posture

CCNP_Security 300-209 SIMOS

Introduction to IPSec Terminology

  • VPN, What is IPSec VPN and Why ?,VPN Types, Site-Site, Remote Access
  • DMVPN, GET VPN, SSL VPN, Flex VPN
  • IPSec Features, Confidentiality, Integrity, Data Origin Authentication
  • Anti-Reply, IPSec Protocols, IKE, ESP, AH, IKE Modes, Main Mode, Aggressive Mode, Quick Mode
  • IKE Phases, Phase 1, Phase 1.5, Phase 2
  • ISAKMP
  • IPSec Mode,Transport Mode and Header Structure. Tunnel Mode and Header Structure
  • NAT-T, Why NAT-T, NAT-T Steps, NAT-T Support, NAT-T Detection, NAT-T Decision
  • Security Association and Components, SAD Security Association Database, SPD Security Policy Database,
  • Detail Explanation of Authentication Header (AH)
  • Detail Explanation of Encapsulating Security Payload (ESP)
  • Elliptic Curve Cryptography (ECC), Compare and contrast SSL, DTLS, and TLS

Introduction of Site-Site VPN

  • What is Site-Site VPN, Working of Site-Site
  • Site-Site VPN Labs

Introduction of Remote Access Introduction

  • Remote Access Modes, Remote Access Client Mode Software, Remote Access Client Mode Hardware
  • Remote Access Network-Extension Mode, Remote Access Network Extension Plus Mode
  • Remote Access With DVTI, Remote Access Working
  • Split-Tunnel
  • Remote Access VPN Labs

Introduction of SSL VPN Introduction

  • SSL VPN Modes, Clientless, Thin Client, Thick Client, SSL VPN Requirements
  • SSL VPN Working
  • SSL VPN Labs

Introduction of DMVPN

  • DMVPN Terminologies, NHRP, MGRE, DMVPN Working, DMVPN Limitation
  • DMVPN Advantages, DMVPN Phases, DMVPN Phase 1, DMVPN Phase 2, DMVPN Phase 3
  • DMVPN Labs

Introduction of GET VPN

  • GET VPN Terminologies, GDOI, Key Server (KS)
  • Key Encryption Key (KEK), Traffic Encryption Key (TEK)
  • Rekey Process, Unicast Rekey Process, Multicast Rekey Process
  • Group Member (GM), Tunnel Header Preservation
  • TBAR, COOPs, GET VPN Working
  • GET VPN Labs

Introduction of IOS Flex VPN

  • IKEv2 Introduction
  • Flex VPN Labs

Learning Schedule

ccnp security training

 

Batch Details

CCNP Security : 210 Hours Training
Track Regular (Mon-Fri) Weekend ( Sat-Sun)
Duration 5 Months 6 Months
Hours 2 Hours a Day 3 Hours a Day
Fee INR 58,000 INR 58,000

At I-Medita, Regular Batches Starts on Every First and Third Monday and  Weekend Batches Starts on Every First and Third Saturday.

Upcoming Batches
Regular Batch (Mon-Fri) Weekend Batch (Sat-Sun)
30-Jan-17 Call : 8750004411
13-Feb-17 Call : 8750004411
13-Mar-17 Call : 8750004411
27-Mar-17 Call : 8750004411
24-Apr-17

Group Discount

  • In a Group of 2 discount will be 5% per head
  • In a Group of 3 discount will be 10% per head
  • In a Group of 4 discount will be 15% per head

Free Videos

Comments

comments