1.0 Perimeter Security and Intrusion Prevention
1.1 Deployment modes on Cisco ASA and Cisco FTD
1.2 Firewall features on Cisco ASA and FTD
1.3 Security features on Cisco IOS/IOS XE
1.5 Cisco NGIPS deployment modes
1.6 Cisco NGFW features
1.7 Detect and mitigate common types of attacks
1.8 Clustering and high availability features on Cisco ASA and Cisco FTD
1.9 Policies and rules for traffic control on Cisco ASA and Cisco FTD
1.10 Routing protocols security on Cisco IOS, Cisco ASA, and Cisco FTD
1.11 Network connectivity through Cisco ASA and Cisco FTD
1.12 Correlation and remediation rules on Cisco FMC
2.0 Secure Connectivity and Segmentation
2.2 Cisco IOS CA for VPN authentication
2.3 FlexVPN, DMVPN, and IPsec L2L tunnels
2.4 VPN high availability methods
2.5 Infrastructure segmentation methods
2.6 Microsegmentation with Cisco TrustSec using SFT and SXP
3.0 Security Infrastructure
3.1 Device hardening techniques and control plane protection methods
3.2 Management plane protection techniques
3.3 Data plane protection techniques
3.4 Layer 2 security techniques
3.5 Wireless security technologies
3.6 Monitoring protocols
3.7 Security features to comply with organizational security policies, procedures, and
standards BCP 38
3.8 Cisco SAFE model to validate network security design and to identify threats to different
PINs
3.9 Interaction with network devices through APIs using basic Python scripts
3.10 Cisco DNAC Northbound APIs use cases
4.0 Identity Management, Information Exchange, and Access Control
省略(項目数多すぎ)
5.0 Advanced Threat Protection and Content Security
省略(項目数多すぎ)