CCIE Security v5 Advanced Technologies
What about this course?
The completed series will cover all of the fundamental topics you'll need to know, as well as the technologies, hardware platforms, and software features that have been introduced in the v5 blueprint.

Instructor for this course
Cristian Matei
CCIEx2 #23684
This course is composed by the following modules
Course Overview
Blueprint Updates :: Part 1
Blueprint Updates :: Part 2
Lab Exam Updates :: Part 1
Lab Exam Updates :: Part 2
Q&A
Learning & Preparation Resources :: Part 1
Learning & Preparation Resources :: Part 2
Course Introduction
IOS Router Planes
Access Lists Overview
Standard Access Lists
Extended Access Lists :: Implementation & Considerations
Extended Access Lists :: IPv6 Neighbor Discovery
Time Based Access Lists
Dynamic Access Lists :: Overview
Dynamic Access Lists :: Per-User
Reflexive Access Lists
Access Lists Object-Groups
Access Lists Logging
Access Lists Troubleshooting
DoS & DDoS Attacks :: Overview
DoS & DDoS Attacks :: Cisco's Guide to DDoS Defense
DoS & DDoS Attacks :: Evolution
IP Address Spoofing
Unicast RPF
Strict uRPF
Advanced uRPF
uRPF Troubleshooting
Remotely Triggered Black Hole Filtering (RTBH)
Source Based RTBH
ICMP Attacks :: Overview
ICMP Attacks :: Mitigation
UDP Attacks
TCP Attacks
TCP Intercept :: Overview
TCP Intercept :: Implementation
Fragmentation Attacks :: Overview
Fragmentation Attacks :: Path MTU Discovery
Fragmentation Attack Protection with ACL
Frangment Filtering via ACL
Virtual Fragmentation Reassembly (VFR) :: Overview
Virtual Fragmentation Reassembly (VFR) :: Implementation
ZBFW :: Overview
ZBFW Building Blocks :: Command Syntax
ZBFW Building Blocks :: Layer 3/4 Policy-Maps
ZBFW Basic Policy Implementation :: Overview
ZBFW Basic Policy Implementation :: Configuration
ZBFW Traffic Policing
ZBFW TCP Inspection
ZBFW TCP OoO Packet
ZBFW UDP Inspection
ZBFW ICMP Inspection
Tuning TCP Connection Settings
ZBFW TCP Reset Segment Control
ZBFW TCP Window Scaling
ZBFW Tuning UDP & ICMP Connection Settings
ZBFW with ACL
Course Introduction
Introduction to Cryptography
Hashing
Symmetric Encryption
Asymmetric Encryption
Digital Signatures
Next Generation Encryption
Public Key Infrastructure
Enrollment & Revocation
PKI Architectures
Implementing PKI
ASA & PKI
Course Introduction
DMVPN :: Overview
DMVPN :: Routing
DMVPN :: Phase I
Implementing DMVPN :: Phase I
DMVPN :: Phase II
Implementing DMVPN :: Phase II
DMVPN :: Phase III
Implementing DMVPN :: Phase III
DMVPN & IPv6
Implementing IPv6 DMVPN
DMVPN Dual Hub
Implementing DMVPN Dual Hub
Course Introduction
GETVPN Overview
Implementing GETVPN
GETVPN for IPv6
COOP KS
G-IKEv2
Course Introduction
VPNs, Tunneling & GRE
IPsec Overview
IPsec Tunneling
IPsec on the ASA
Implementing L2L IPsec VPN : IOS-ASA
IOS Advanced IPsec Solutions
IPsec & IPv6
Course Introduction
Securing Switching
Protecting STP
Securing DHCP
Preventing Spoofing
Private VLANs
Port-based Traffic Control
Configuring IP Addressing on ASA
Configuring Nameif & Security Levels on ASA
Configuring Static Routes on ASA
Configuring EIGRP on ASA
Control Plane Authentication in EIGRP
Configuring OSPF on ASA
Control Plane Authentication in OSPF
Management Access to ASA
Configuring Objects, Object-Group & ACL
Configuring Dynamic NAT
Configuring Dynamic PAT
Configuring Static NAT & Static PAT
Configuring Twice NAT
BGP Through ASA
Bridging Vlans using Transparent ASA
Creating Virtual Firewalls
Active/Standby & Active/Active
Spanned Mode Vs Individual mode
Course Introduction
Routing Protocol Authentication
Securing EIGRP
Securing OSPF
Securing BGP
Course Introduction
Packet Flow :: Overview
Installing a Cisco Firepower Managent Center (FMC) :: Part 1
Installing a Cisco Firepower Managent Center (FMC) :: Part 2
System Configuration
Health Policies & Health Alerts
Installing FTD on a Cisco 5500-x :: Part 1
Installing FTD on a Cisco 5500-x :: Part 2
FXOS & Chassis Manager
Firepower/FTD Objects :: Part 1
Firepower/FTD Objects :: Part 2
FTD Interface Configuration :: Part 1
FTD Interface Configuration :: Part 2
FTD Routing Configuration
FTD Platform Settings
Access Control Policy :: Part 1
Access Control Policy :: Part 2
Access Control Policy :: Part 3
FTD PreFilter
Network Address Translation (NAT)
Malware & File Policy
IPS Policy :: Part 1
IPS Policy :: Part 2
Firepower Network Discovery
Reporting & Task Management
Network Analysis :: Part 1
Network Analysis :: Part 2
Network Analysis :: Part 3
User Account Managment
Identity Policy
Course Introduction
Securing Administrative Access :: Part 1
Securing Administrative Access :: Part 2
Role-Based CLI Access
Logging
Securing SNMP
Securing NTP
Course Introduction
Introduction to the Web Security Appliance
System Setup Wizard
Web Cache Communication Protocol (WCCP)
Blocking Global URL Categories
Blocking Custom URL's
Blocking Custom Browsers
Blocking Applications
Blocking Custom Objects
WSA CLI
Failover
Web Reputation
Advanced Web Security
PxGrid
Course Conclusion
Course Introduction
SMTP
ESA Overview
ESA Initialization :: Part 1
ESA Initialization :: Part 2
Email Pipeline
Access Tables :: Part 1
Access Tables :: Part 2
Introduction to Policies
ESA Policies :: Part 1
ESA Policies :: Part 2
Message Filters
The HTTP Protocol
Introduction to Cisco Web Security Appliance (WSA)
Initializing WSA
WSA Modes
Identification Profiles
Access Policies
Decryption Policies
The SMTP Protocol
Introduction to Cisco Email Security Appliance (ESA)
ESA Command Line
The Listener
ESA Operations
ESA Policies Overview
Implementing ESA Policies
Introduction to Firepower Systems
Managing FTD
The Registration
Troubleshooting FTD
FTD Objects
Deployment Modes
FTD Initialization & Routing
FTD Policies Overview
Access Control Policy (ACP)
Special Policies
Security Intelligence (SI)
URL Filtering
Network Discovery
File Policy
SSL Policy
Introduction to Next Generation IPS (NGIPS)
Snort Variables & Rules
Implementing NGIPS
Authentication, Authorization & Accounting (AAA) Overview
AAA Components & Configuration
Introduction to Cisco Access Control Server (ACS)
Introduction to Cisco Identity Services Engine (ISE)
AD Integration
ISE Policies
Administrative Access : ISE
Administrative Access : ACS
Introduction to Profiling
Change of Authorization (CoA)
Profiling Probes
Enabling Profiling
Introduction to IEEE 802.1x
802.1x Authentication : Deployment Modes
Implementing Wired 802.1x Authentication
Implementing Wireless 802.1x Authentication
Guest Services
Distributed ISE
Deploying ISE Multinode
Cryptography Basics
Public Key Infrastructure (PKI)
PKI Configuration
Virtual Private Network (VPN) & IPsec
IPsec on the ASA
IPsec VPN : L2L IOS-ASA
IPsec VPN : L2L Digital Certificates
ASA Certificate Maps
IOS Advanced IPsec Solutions
IPsec for IPv6
VRF-Aware IPsec
IKE Version 2 Overview
Cisco FlexVPN
IKEv2 IPsec VPN : L2L IOS-ASA
Cisco FlexVPN : Client-Server
The SSL & TLS Protocols
Remote Access VPN : SSL-TLS
Cisco AnyConnect
ASA Clientless SSL VPN
ASA AnyConnect SSL VPN
IOS SSL VPN
Introduction to DMVPN
Implementing DMVPN
DMVPN for IPv6
DMVPN : Dual Hub
Introduction to GETVPN
Implementing GETVPN
GETVPN for IPv6
GETVPN : G-IKEv2
Instructor Introduction
Network Device Architecture
Routing Protocol Authentication
Implementing Routing Protocol Authentication
Route Filtering
Control Plane Policing
Control Plane Protection
Implementing Control Plane Protection
Basic CPU Protection Mechanisms
Basic Memory Protection Mechanisms 2017
Secure Network Management
Management Plane Protection
SNMP, NTP & Logging
The DHCP Protocol
DHCPv6
The DNS Protocol
IP Spoofing Attacks
Mitigation Tools ACLs
Mitigation Tools URPF
DoS Attacks
Mitigation Tools : TCP Intercept
Mitigation Tools : Policing
Mitigation Tools : RTBH
IP Options & Security
IP Options : Attack Mitigation
IP Fragmentation
IP Fragmentation : Attack Mitigation
NBAR & NBAR2
IPv6 Extension Headers
Extension Headers Processing & Security
Extension Headers : Attacks Mitigation
IPv6 Fragmentation
IPv6 Fragmentation Attacks Mitigation
Neighbor Discovery
Neighbor Discovery Messages
Secure Neighbor Discovery (SEND) Introduction
SEND Operations
SEND Configuration
Discovery Protocols
VLANs & Trunking
Spanning Tree Protocol (STP)
STP Security Features : Part I
STP Security Features : Part II
Layer 2 Security : Part I
Layer 2 Security : Part II
Private VLANs & Protected Ports
Storm Control
Wireless Basics
Wireless Security
Device Hardening : ASA
Device Hardening : IOS
Cisco SAFE
Instructor Introduction
Firewall Technologies
Access Lists
Zone-Based Firewall (ZFW)
Implementing ZFW
IOS Network Address Translation (NAT)
NAT for IPv6
Cisco ASA Firewall Fundamentals
Redundant Interfaces
EtherChannels
ASA Routing Overview
ASA Routing : EIGRP
ASA Routing : OSPF
ASA Routing : BGP
ASA Management
Implementing Management Access
Traffic Filtering & Control
Implementing Traffic Filtering
ASA Network Address Translation (NAT)
Implementing ASA NAT
ASA Modes of Operations
Implementing Transparent ASA
Implementing Security Contexts
Modular Policy Framework (MPF) Overview
Implementing MPF
ASA High Availability : Failover
Failover : Active Standby
Failover : Active Active
Clustering Overview
Clustering : Basic Operations
Clustering : Deployment Modes
Implementing L3 Clustering
Implementing L2 Clustering
Course Introduction
Introduction to Advanced Malware Protection
AMP Components & Operations
AMP on FTD
AMP on WSA
AMP on ESA
Introduction to Stealthwatch
Basic Stealthwatch System Installation :: Part 1
Basic Stealthwatch System Installation :: Part 2
SMC Configuration
Host Groups and User Management
Classification of Customer Environment
Detecting Indicators of Compromise (IoC) :: Part 1
Detecting Indicators of Compromise (IoC) :: Part 2
SNMP, Storage, Backup & Upgrade
Common Course Questions
If you have a question you don’t see on this list, please visit our Frequently Asked Questions page by clicking the button below.
If you’d prefer getting in touch with one of our experts, we encourage you to call one of the numbers above or fill out our contact form.
Do you offer training for all student levels?