Cisco

CCIE Security V5.0 Lab Exam Review

Rohit Pardasani
Rohit Pardasani
CCIEx5 #21282, CCNA/CCNP R&S, CCNA/CCNP Security, CCSI #34999, JNCIA, MCSE, CCSA, CEH

This course is included in our All Access Pass! Get unlimited streaming access to 12,000+ videos, workbooks, and practice exams by starting your free 7-day trial of the All Access Pass subscription!
Start Your FREE Trial!


Course Description
Our CCIE Security Lab Exam course is 20+ hours of intensive, hands-on, instructor-led training. The instructor will alternate between presenting material and guiding viewers through hands-on, real-world exercises. Not only will you refine your skills and expand your knowledge of the blueprint technologies, you will also learn to change the way you think about problems and how to derive solutions. In addition to helping you pass your exam, this course gives you real-world practical knowledge to carry you past the CCIE lab and into everyday applications that you'll use as a CCIE in the field.
  • Course
    • Course Introduction
      • VLANs & IP Addressing
    • ASA
      • Configuring OSPF on ASA
      • Configuring Access-List
      • Configuring Access-List Using Objects & Object Groups :: Part 1
      • Configuring Access-List Using Objects & Object Groups :: Part 2
      • Administrative Access & ICMP Traffic Protection
      • Manual Dynamic NAT & PAT :: Part 1
      • Manual Dynamic NAT & PAT :: Part 2
      • Dynamic Policy NAT & Policy PAT
      • Auto Dynamic NAT & PAT
      • Static NAT, Static Policy NAT & Static PAT :: Part 1
      • Static NAT, Static Policy NAT & Static PAT :: Part 2
      • Advanced Routing
      • Twice NAT
      • Transparent Firewall :: Part 1
      • Transparent Firewall :: Part 2
      • ARP Inspection
    • FTD & NGIPS
      • Active & ActiveFailover
      • Configuring Access Rules on FTD :: Part 1
      • Configuring Access Rules on FTD :: Part 2
      • Configuring Access Rules on FTD :: Part 3
      • Configuring NAT on FTD
      • Security Intelligence :: Part 1
      • Security Intelligence :: Part 2
      • Security Intelligence :: Part 3
      • Creating Malware Policies
      • FTD in Transparent Mode :: Part 1
      • FTD in Transparent Mode :: Part 2
      • FTD in Transparent Mode :: Part 3
    • VPN
      • Legacy LAN-to-LAN VPN between IOS Routers Using IKEv1 :: Part 1
      • Legacy LAN-to-LAN VPN between IOS Routers Using IKEv1 :: Part 2
      • Legacy LAN-to-LAN VPN between IOS Routers Using IKEv1 :: Part 3
      • Legacy LAN-to-LAN VPN between IOS Routers Using IKEv1 :: Part 4
      • Legacy LAN-to-LAN VPN between ASA Firewalls Using IKEv1
      • Legacy LAN-to-LAN VPN between IOS Routers Using IKEv2
      • Legacy LAN-to-LAN VPN between ASA Firewalls Using IKEv2
      • LAN-to-LAN VPN with IKEv1 between IOS & IOS Using SVTI :: Part 1
      • LAN-to-LAN VPN with IKEv1 between IOS & IOS Using SVTI :: Part 2
    • WSA & AMP
      • DMVPN Phase 1 with IKEv2 :: Part 1
      • DMVPN Phase 1 with IKEv2 :: Part 2
      • DMVPN Phase 1 with IKEv2 :: Part 3
      • DMVPN Phase 2 with IKEv2
      • DMVPN Phase 3 with IKEv2
      • Dual Hub Single Cloud DMVPN Phase 3 with IKEv2
      • GET VPN :: Part 1
      • GET VPN :: Part 2
      • FlexVPN
      • FlexVPN Hardware Client
    • ISE
      • Clientless SSL VPN :: Part 1
      • Clientless SSL VPN :: Part 2
      • Clientless SSL VPN :: Part 3
      • Anyconnect IKEv2 :: Part 1
      • Anyconnect IKEv2 :: Part 2
      • Anyconnect IKEv2 :: Part 3
      • Anyconnect IKEv2 :: Part 4
      • Anyconnect IKEv2 :: Part 5
      • Admin User Creation :: Part 1
      • Admin User Creation :: Part 2
      • Admin User Creation :: Part 3
    • Lab Strategy
      • Device Authorization Using Radius Protocol
      • DOT1x for pcA :: Part 1
      • DOT1x for pcA :: Part 2
      • MAB for IP Phone
      • Profiling for IP Phone & pcA
      • PxGrid with WSA
      • Central WebAuth, Employee BYOD, Self & Sponsored Guests :: Part 1
      • Central WebAuth, Employee BYOD, Self & Sponsored Guests :: Part 2
      • Central WebAuth, Employee BYOD, Self & Sponsored Guests :: Part 3
Course Outline:
  • Course
    • Course Introduction
      • VLANs & IP Addressing
    • ASA
      • Configuring OSPF on ASA
      • Configuring Access-List
      • Configuring Access-List Using Objects & Object Groups :: Part 1
      • Configuring Access-List Using Objects & Object Groups :: Part 2
      • Administrative Access & ICMP Traffic Protection
      • Manual Dynamic NAT & PAT :: Part 1
      • Manual Dynamic NAT & PAT :: Part 2
      • Dynamic Policy NAT & Policy PAT
      • Auto Dynamic NAT & PAT
      • Static NAT, Static Policy NAT & Static PAT :: Part 1
      • Static NAT, Static Policy NAT & Static PAT :: Part 2
      • Advanced Routing
      • Twice NAT
      • Transparent Firewall :: Part 1
      • Transparent Firewall :: Part 2
      • ARP Inspection
    • FTD & NGIPS
      • Active & ActiveFailover
      • Configuring Access Rules on FTD :: Part 1
      • Configuring Access Rules on FTD :: Part 2
      • Configuring Access Rules on FTD :: Part 3
      • Configuring NAT on FTD
      • Security Intelligence :: Part 1
      • Security Intelligence :: Part 2
      • Security Intelligence :: Part 3
      • Creating Malware Policies
      • FTD in Transparent Mode :: Part 1
      • FTD in Transparent Mode :: Part 2
      • FTD in Transparent Mode :: Part 3
    • VPN
      • Legacy LAN-to-LAN VPN between IOS Routers Using IKEv1 :: Part 1
      • Legacy LAN-to-LAN VPN between IOS Routers Using IKEv1 :: Part 2
      • Legacy LAN-to-LAN VPN between IOS Routers Using IKEv1 :: Part 3
      • Legacy LAN-to-LAN VPN between IOS Routers Using IKEv1 :: Part 4
      • Legacy LAN-to-LAN VPN between ASA Firewalls Using IKEv1
      • Legacy LAN-to-LAN VPN between IOS Routers Using IKEv2
      • Legacy LAN-to-LAN VPN between ASA Firewalls Using IKEv2
      • LAN-to-LAN VPN with IKEv1 between IOS & IOS Using SVTI :: Part 1
      • LAN-to-LAN VPN with IKEv1 between IOS & IOS Using SVTI :: Part 2
    • WSA & AMP
      • DMVPN Phase 1 with IKEv2 :: Part 1
      • DMVPN Phase 1 with IKEv2 :: Part 2
      • DMVPN Phase 1 with IKEv2 :: Part 3
      • DMVPN Phase 2 with IKEv2
      • DMVPN Phase 3 with IKEv2
      • Dual Hub Single Cloud DMVPN Phase 3 with IKEv2
      • GET VPN :: Part 1
      • GET VPN :: Part 2
      • FlexVPN
      • FlexVPN Hardware Client
    • ISE
      • Clientless SSL VPN :: Part 1
      • Clientless SSL VPN :: Part 2
      • Clientless SSL VPN :: Part 3
      • Anyconnect IKEv2 :: Part 1
      • Anyconnect IKEv2 :: Part 2
      • Anyconnect IKEv2 :: Part 3
      • Anyconnect IKEv2 :: Part 4
      • Anyconnect IKEv2 :: Part 5
      • Admin User Creation :: Part 1
      • Admin User Creation :: Part 2
      • Admin User Creation :: Part 3
    • Lab Strategy
      • Device Authorization Using Radius Protocol
      • DOT1x for pcA :: Part 1
      • DOT1x for pcA :: Part 2
      • MAB for IP Phone
      • Profiling for IP Phone & pcA
      • PxGrid with WSA
      • Central WebAuth, Employee BYOD, Self & Sponsored Guests :: Part 1
      • Central WebAuth, Employee BYOD, Self & Sponsored Guests :: Part 2
      • Central WebAuth, Employee BYOD, Self & Sponsored Guests :: Part 3

If you would like more information on how to purchase this course individually, contact a Training Specialist.