Cisco CCNP Security Training – CCNP Security Course
Overview
CCNP Security, or Cisco Certified Network Professional Security, is a comprehensive training program designed to equip IT professionals with the knowledge and skills required to secure Cisco networks effectively. This training covers a wide range of topics, including VPNs, firewalls, intrusion prevention systems, and more, making it an invaluable asset for anyone looking to advance their career in the field of cybersecurity.
Cisco Certified Network Professional (CCNP) Security is a specialized certification that validates the skills and knowledge required to secure Cisco networks. It goes beyond the basics, delving into the intricate aspects of network security and positioning individuals as experts in the field.
Investing in CCNP Security Training opens doors to a multitude of career opportunities. Employers across industries recognize the value of Cisco certifications, and CCNP Security is no exception. By completing this training, you position yourself as a competent and sought-after professional capable of addressing the ever-growing challenges posed by cyber threats.
I-Medita’s CCNP Security Training program covers the following topics/modules:
- Implementing and Operating Cisco Security Core Technologies (SCOR)
- Securing Networks with Cisco Firepower Next Generation Firewall
- Securing Networks with Cisco Firepower Next-Generation IPS
- Implementing and Configuring Cisco Identity Services Engine
- Securing Email with Cisco Email Security Appliance
- Securing the Web with Cisco Web Security Appliance
- Implementing Secure Solutions with Virtual Private Networks
Whether you’re a seasoned IT professional or a newcomer to the world of cybersecurity, CCNP Security Training caters to various skill levels. The program is structured in a way that accommodates both beginners and experienced individuals, offering a gradual learning curve that builds a strong foundation and progressively delves into advanced concepts.
Who should take CCNP Security Training – CCNP Security Course
The Cisco CCNP Security Training can be taken up by:
- Network Security Engineer
- Security Technician
- Network Security Support Engineer
- Network Security Professionals
- System Administrators
- Network Engineers
- IT Managers and Consultants
- Cybersecurity Enthusiasts
- Cisco Networking Professionals
- IT Professionals Seeking Career Advancement
- Anyone Interested in Network Security
- TAC Engineers
Pre-Requisites for CCNP Security Training – CCNP Security Course
No formal prerequisites are required. However, a solid understanding of Network Infrastructures, Enterprise Networking, and Routing-Switching is recommended. Basic experience in network security is an added advantage.
Training Details – CCNP Security Training
Join our CCNP Security Training Course at I-Medita, where personalized learning is a priority. With small batch sizes limited to 20 students, you are guaranteed individual attention. Classes are conveniently scheduled on weekdays (Monday to Thursday) and weekends (Saturday-Sunday). Choose between Classroom and Live Online Training Options to suit your learning preferences. Elevate your skills in a supportive and interactive environment with I-Medita’s CCNP Security Training.
Training Name | CCNP Security Training |
Training Type | Instructor Led Training (Classroom/Online) |
Batches Available | Regular (Mon-Thu) and (Sat-Sun) |
Training Duration | 200+ Hours Approx |
Daily Training Hours | 2/3 hours per day |
Training Cost | INR |
Payment Mode | All Payment Options Accepted |
Recorded Video Lectures | 06 months same classes video recording access |
Lab Access | Yes Provided |
Study Material | Workbooks, Notes Handouts, Exam Prep Material, Interview Prep Material |
Learning Portal | World-class learning system (Web portal, iOS Application, Android Application) |
What will you learn in CCNP Security Training – CCNP Security Course
- Configure Network Settings and NAT on Cisco ASA
- Configure Cisco ASA Access Control Policies
- Configure Cisco Firepower NGFW NAT
- Configure Cisco Firepower NGFW Access Control Policy
- Configure Cisco Firepower NGFW Discovery and IPS Policy
- Configure Cisco NGFW Malware and File Policy
- Configure Listener, Host Access Table (HAT), and Recipient Access Table (RAT) on Cisco Email Security Appliance (ESA)
- Configure Mail Policies
- Configure Proxy Services, Authentication, and HTTPS Decryption
- Enforce Acceptable Use Control and Malware Protection
- Examine the Umbrella Dashboard
- Examine Cisco Umbrella Investigate
- Explore DNS Ransomware Protection by Cisco Umbrella
- Configure Static VTI Point-to-Point IPsec IKEv2 Tunnel
- Configure Point-to-Point VPN between the Cisco ASA and Cisco Firepower NGFW
- Configure Remote Access VPN on the Cisco Firepower NGFW
- Explore Cisco AMP for Endpoints
- Perform Endpoint Analysis Using AMP for Endpoints Console
- Explore File Ransomware Protection by Cisco AMP for Endpoints Console
- Explore Cisco Stealthwatch Enterprise v6.9.3
- Explore Cognitive Threat Analytics (CTA) in Stealthwatch Enterprise v7.0
- Explore the Cisco Cloudlock Dashboard and User Security
- Explore Cisco Cloudlock Application and Data Security
- Explore Cisco Stealthwatch Cloud
- Explore Stealthwatch Cloud Alert Settings, Watchlists, and Sensors
- Configure Initial Cisco ISE Setup and System Certificate Usage
- Integrate Cisco ISE with Active Directory
- Configure Cisco ISE Policy for MAC Authentication Bypass (MAB)
- Configure Cisco ISE Policy for 802.1X
- Configure Guest Access
- Configure Hotspot and Self-Registered Guest Access
- Configure Sponsor-Approved and Fully Sponsored Guest Access
- Create Guest Reports
- Configure Profiling
- Customize the Cisco ISE Profiling Configuration
- Create Cisco ISE Profiling Reports
- Configure BYOD
- Manage a Lost or Stolen BYOD Device
- Configure Cisco ISE Compliance Services
- Configure Client Provisioning
- Configure Posture Policies
- Test and Monitor Compliance-Based Access
- Configure Cisco ISE for Basic Device Administration
- Configure Cisco ISE Command Authorization
- Configure Cisco TrustSec
- Verify and Test Cisco ESA Configuration
- Perform Basic Administration
- Advanced Malware in Attachments (Macro Detection)
- Protect Against Malicious or Undesirable URLs Beneath Shortened URLs
- Protect Against Malicious or Undesirable URLs Inside Attachments
- Intelligently Handle Unscannable Messages
- Leverage AMP Cloud Intelligence Via Pre-Classification Enhancement
- Integrate Cisco ESA with AMP Console
- Prevent Threats with Anti-Virus Protection
- Applying Content and Outbreak Filters
- Configure Attachment Scanning
- Configure Outbound Data Loss Prevention
- Integrate Cisco ESA with LDAP and Enable the LDAP Accept Query
- Domain Keys Identified Mail (DKIM)
- Sender Policy Framework (SPF)
- Forged Email Detection
- Configure the Cisco SMA for Tracking and Reporting
- Configure the Cisco Web Security Appliance
- Deploy Proxy Services
- Configure Proxy Authentication
- Configure HTTPS Inspection
- Create and Enforce a Time/Date-Based Acceptable Use Policy
- Configure Advanced Malware Protection
- Configure Referrer Header Exceptions
- Utilize Third-Party Security Feeds and MS Office 365 External Feed
- Validate an Intermediate Certificate
- View Reporting Services and Web Tracking
- Perform Centralized Cisco AsyncOS Software Upgrade Using Cisco SMA
- Explore IPsec Technologies
- Implement and Verify Cisco IOS Point-to-Point VPN
- Implement and Verify Cisco Adaptive Security Appliance (ASA) Point-to-Point VPN
- Implement and Verify Cisco IOS Virtual Tunnel Interface (VTI) VPN
- Implement and Verify Dynamic Multipoint VPN (DMVPN)
- Troubleshoot DMVPN
- Implement and Verify FlexVPN with Smart Defaults
- Implement and Verify Point-to-Point FlexVPN
- Implement and Verify Hub and Spoke FlexVPN
- Implement and Verify Spoke-to-Spoke FlexVPN
- Troubleshoot Cisco IOS FlexVPN
- Implement and Verify AnyConnect Transport Layer Security (TLS) VPN on ASA
- Implement and Verify Advanced Authentication, Authorization, and Accounting (AAA) on Cisco AnyConnect VPN
- Implement and Verify Clientless VPN on ASA
- Perform Initial Device Setup FTD
- Configure High Availability
- Configure Network Address Translation
- Configure Network Discovery
- Configure Prefilter and Access Control Policy
- Configure Security Intelligence
- Implement File Control and Advanced Malware Protection
- Configure Cisco Secure IPS
- Detailed Analysis Using the Firewall Management Center
- Manage Cisco Secure Firewall Threat Defense System
- Secure Firewall Troubleshooting Fundamentals
- Configure Managed Devices Using Cisco Secure Firewall Device Manager