Cisco

CCNP Security Technology Course: 300-206 SENSS

  • Regular price $159.99
  • Save


Join our expert instructor, Cristian Matei, with real-world extensive experience for comprehensive CCNP Security Certification Video Series. The current CCNP Security blueprint is divided into four different exams which need to be passed to get CCNP Security certified. There is a huge gap of Security professionals on the market, so Cisco’s current CCNP Security blueprint was built to train engineers on emerging technologies and make them ready for challenging real-life environments. This course will be focusing on the SENSS exam which assesses knowledge of a network security engineer to configure and implement security on Cisco network perimeter edge devices such as a Cisco switch, Cisco router, and Cisco ASA firewall. It focuses on the technologies used to strengthen security of a network perimeter such as Network Address Translation (NAT), ASA policy and application inspect, and a zone-based firewall on Cisco routers. This course will help candidates to get a better and deeper understanding of perimeter security technologies, which will tremendously help them both for the certification exam and also for real-life deployments. As opposed to Bootcamp courses, being a certification video series, class is a mix of slides, visual explanations of how technologies work and the reasoning behind it, followed by configuration examples to enforce the knowledge. Slides should be used as a reference for the exam, while the examples as a reference for real-life deployments. Lab topologies will be designed, explaining the objective for each design, and then built from scratch by the instructor, nothing being pre-scripted, pre-tested or pre-recorded . During the process, the instructor will intentionally demonstrate the effects of misconfigurations and failures, randomly making learners think how to approach a specific problem, never seen before. Additionally, a focus will also be on building a proper study and learning methodology, which has nothing to do with command or configuration templates memorisation. To get a even better understanding of the technologies and be prepared for the exam as well, it’s highly recommended to also watch the CCNP Security Bootcamp Video Series.
  • Course
    • Introduction
      • Course Introduction
      • Course Topology & Equipment
      • Certification & Exam Preparation :: Part 1
      • Certification & Exam Preparation :: Part 2
    • Control Plane Security
      • Network Device Planes of Operation
      • Control Plane Policing :: Part 1
      • Control Plane Policing :: Part 2
      • Control Plane Protection
      • Routing Protocol Security
    • Management Plane Security
      • Management Plane Protection
      • Secure Device Management
      • SNMP Overview
      • SNMP Configuration :: Part 1
      • SNMP Configuration :: Part 2
      • NTP Overview :: Part 1
      • NTP Overview :: Part 2
      • NTP Configuration
      • Network Event Logging :: Part 1
      • Network Event Logging :: Part 2
      • Netflow :: Part 1
      • Netflow :: Part 2
      • AAA Overview :: Part 1
      • AAA Overview :: Part 2
      • IOS AAA Configuration :: Part 1
      • IOS AAA Configuration :: Part 2
      • ASA AAA Configuration :: Part 1
      • ASA AAA Configuration :: Part 2
      • ASA AAA Configuration :: Part 3
    • Data-Plane Security
      • Port Security
      • DHCP Snooping Overview :: Part 1
      • DHCP Snooping Overview :: Part 2
      • DHCP Snooping Configuration
      • Dynamic ARP Inspection Overview
      • Dynamic ARP Inspection Configuration
      • IP Spoofing Overview
      • IP Spoofing Configuration
      • STP Security Toolkit
      • Storm Control
      • Private VLAN Overview
      • Private VLAN Configuration
    • IOS Firewall Threat Defense
      • NAT Overview :: Part 1
      • NAT Overview :: Part 2
      • Static NAT Configuration
      • Dynamic NAT Configuration
      • Policy NAT Configuration :: Part 1
      • Policy NAT Configuration :: Part 2
      • Zone Based Policy Firewall Overview
      • Two Zone Firewall Configuration :: Part 1
      • Two Zone Firewall Configuration :: Part 2
      • Two Zone with NAT Firewall Configuration
      • Three Zone Firewall Configuration :: Part 1
      • Three Zone Firewall Configuration :: Part 2
      • Zone Based Policy Firewall Tuning Overview
      • Zone Based Policy Firewall Tuning Configuration
      • Zone Based Policy Firewall Application Inspection :: Part 1
      • Zone Based Policy Firewall Application Inspection :: Part 2
      • Zone Based Policy Firewall Self Zone :: Part 1
      • Zone Based Policy Firewall Self Zone :: Part 2
    • ASA Firewall Threat Defense
      • ASA Firewall Overview :: Part 1
      • ASA Firewall Overview :: Part 2
      • ASA Firewall ACL Overview :: Part 1
      • ASA Firewall ACL Overview :: Part 2
      • ASA Firewall ACL Configuration :: Part 1
      • ASA Firewall ACL Configuration :: Part 2
      • ASA Firewall Object Groups
      • ASA Identity Firewall Overview :: Part 1
      • ASA Identity Firewall Overview :: Part 2
      • ASA Firewall Modular Policy Framework Overview :: Part 1
      • ASA Firewall Modular Policy Framework Overview :: Part 2
      • ASA Firewall MPF Advanced Inspections :: Part 1
      • ASA Firewall MPF Advanced Inspections :: Part 2
      • ASA Firewall MPF Dynamic Protocol Inspection :: Part 1
      • ASA Firewall MPF Dynamic Protocol Inspection :: Part 2
      • ASA Firewall MPF Application Inspection
      • ASA Firewall NAT Overview
      • ASA Firewall Object NAT Configuration
      • ASA Firewall Twice NAT Configuration :: Part 1
      • ASA Firewall Twice NAT Configuration :: Part 2
Cristian Matei
Cristian Matei — CCIEx2 #23684
This course is also included in a training bundle:
View Training Bundle


30hr 15min
April 27, 2016
Unlimited HD Access

Train anywhere with our web, iOS, Android and Apple TV apps! You'll also have access to any course updates and additions.

Keep Training, Even Offline

Download the entire course in mobile, high and HD(1080p) resolutions.

  • Course
    • Introduction
      • Course Introduction
      • Course Topology & Equipment
      • Certification & Exam Preparation :: Part 1
      • Certification & Exam Preparation :: Part 2
    • Control Plane Security
      • Network Device Planes of Operation
      • Control Plane Policing :: Part 1
      • Control Plane Policing :: Part 2
      • Control Plane Protection
      • Routing Protocol Security
    • Management Plane Security
      • Management Plane Protection
      • Secure Device Management
      • SNMP Overview
      • SNMP Configuration :: Part 1
      • SNMP Configuration :: Part 2
      • NTP Overview :: Part 1
      • NTP Overview :: Part 2
      • NTP Configuration
      • Network Event Logging :: Part 1
      • Network Event Logging :: Part 2
      • Netflow :: Part 1
      • Netflow :: Part 2
      • AAA Overview :: Part 1
      • AAA Overview :: Part 2
      • IOS AAA Configuration :: Part 1
      • IOS AAA Configuration :: Part 2
      • ASA AAA Configuration :: Part 1
      • ASA AAA Configuration :: Part 2
      • ASA AAA Configuration :: Part 3
    • Data-Plane Security
      • Port Security
      • DHCP Snooping Overview :: Part 1
      • DHCP Snooping Overview :: Part 2
      • DHCP Snooping Configuration
      • Dynamic ARP Inspection Overview
      • Dynamic ARP Inspection Configuration
      • IP Spoofing Overview
      • IP Spoofing Configuration
      • STP Security Toolkit
      • Storm Control
      • Private VLAN Overview
      • Private VLAN Configuration
    • IOS Firewall Threat Defense
      • NAT Overview :: Part 1
      • NAT Overview :: Part 2
      • Static NAT Configuration
      • Dynamic NAT Configuration
      • Policy NAT Configuration :: Part 1
      • Policy NAT Configuration :: Part 2
      • Zone Based Policy Firewall Overview
      • Two Zone Firewall Configuration :: Part 1
      • Two Zone Firewall Configuration :: Part 2
      • Two Zone with NAT Firewall Configuration
      • Three Zone Firewall Configuration :: Part 1
      • Three Zone Firewall Configuration :: Part 2
      • Zone Based Policy Firewall Tuning Overview
      • Zone Based Policy Firewall Tuning Configuration
      • Zone Based Policy Firewall Application Inspection :: Part 1
      • Zone Based Policy Firewall Application Inspection :: Part 2
      • Zone Based Policy Firewall Self Zone :: Part 1
      • Zone Based Policy Firewall Self Zone :: Part 2
    • ASA Firewall Threat Defense
      • ASA Firewall Overview :: Part 1
      • ASA Firewall Overview :: Part 2
      • ASA Firewall ACL Overview :: Part 1
      • ASA Firewall ACL Overview :: Part 2
      • ASA Firewall ACL Configuration :: Part 1
      • ASA Firewall ACL Configuration :: Part 2
      • ASA Firewall Object Groups
      • ASA Identity Firewall Overview :: Part 1
      • ASA Identity Firewall Overview :: Part 2
      • ASA Firewall Modular Policy Framework Overview :: Part 1
      • ASA Firewall Modular Policy Framework Overview :: Part 2
      • ASA Firewall MPF Advanced Inspections :: Part 1
      • ASA Firewall MPF Advanced Inspections :: Part 2
      • ASA Firewall MPF Dynamic Protocol Inspection :: Part 1
      • ASA Firewall MPF Dynamic Protocol Inspection :: Part 2
      • ASA Firewall MPF Application Inspection
      • ASA Firewall NAT Overview
      • ASA Firewall Object NAT Configuration
      • ASA Firewall Twice NAT Configuration :: Part 1
      • ASA Firewall Twice NAT Configuration :: Part 2