Cisco

CCNP Security Technology Course: 300-207 SITCS

  • Regular price $159.99
  • Save


Join our expert instructor, Cristian Matei, with real-world extensive experience for comprehensive CCNP Security Certification Video Series. The current CCNP Security blueprint is divided into four different exams which need to be passed to get CCNP Security certified. There is a huge gap of Security professionals on the market, so Cisco’s current CCNP Security blueprint was built to train engineers on emerging technologies and make them ready for challenging real-life environments. This course will be focusing on the SITCS exam which assesses a network security engineer on advanced firewall architecture and configuration with the Cisco next-generation firewall, utilizing access and identity policies. It covers integration of Intrusion Prevention System (IPS) and context-aware firewall components, as well as Web (Cloud) and Email Security solutions. This course will help candidates to get a better and deeper understanding of perimeter security technologies, which will tremendously help them both for the certification exam and also for real-life deployments. As opposed to Bootcamp courses, being a certification video series, class is a mix of slides, visual explanations of how technologies work and the reasoning behind it, followed by configuration examples to enforce the knowledge. Slides should be used as a reference for the exam, while the examples as a reference for real-life deployments. Lab topologies will be designed, explaining the objective for each design, and then built from scratch by the instructor, nothing being pre-scripted, pre-tested or pre-recorded . During the process, the instructor will intentionally demonstrate the effects of misconfigurations and failures, randomly making learners think how to approach a specific problem, never seen before. Additionally, a focus will also be on building a proper study and learning methodology, which has nothing to do with command or configuration templates memorisation. To get a even better understanding of the technologies and be prepared for the exam as well, it’s highly recommended to also watch the CCNP Security Bootcamp Video Series.
  • Course
    • Introduction
      • Introduction
      • Topology & Equipment
      • CCNP Security Certification
      • Study Materials
      • Exam Topics Review :: Part 1
      • Exam Topics Review :: Part 2
    • Web Security Appliance
      • Web Security Overview
      • What is WSA? :: Part 1
      • What is WSA? :: Part 2
      • WSA Models, Interface & Licensing
      • Explicit Mode Overview
      • PAC File Overview
      • Transparent Mode
      • WSA Identities
      • WSA Acceptable Use Controls
      • WSA Access Policies Overview :: Part 1
      • WSA Access Policies Overview :: Part 2
      • WSA Access Policies Configuration :: Part 1
      • WSA Access Policies Configuration :: Part 2
      • WSA Access Policies Configuration :: Part 3
      • WSA Access Policies Configuration :: Part 4
      • WSA Decryption Policies Overview :: Part 1
      • WSA Decryption Policies Overview :: Part 2
      • WSA Decryption Policies Configuration
      • WSA Outbound Policies
      • WSA Transparent Mode with WCCP :: Part 1
      • WSA Transparent Mode with WCCP :: Part 2
      • WSA User Authentication Overview
      • WSA User Authentication Configuration :: Part 1
      • WSA User Authentication Configuration :: Part 2
      • WSA User Authentication Overview
    • Cloud Web Security
      • CWS Overview
      • CWS Licensing
      • CWS Traffic Redirection :: Part 1
      • CWS Traffic Redirection :: Part 2
      • CWS Traffic Redirection :: Part 3
      • CWS ASA Connector :: Part 1
      • CWS ASA Connector :: Part 2
      • CWS ISR G2 Connector :: Part 1
      • CWS ISR G2 Connector :: Part 2
      • CWS AnyConnect Connector
      • ScanCenter Web Filtering Policy
    • ASA-CX
      • ASA-CX Overview
      • ASA-CX Models & Licensing
      • ASA-CX Deployment Modes
      • ASA-CX Policy Objects
      • ASA-CX Access Policies
      • ASA-CX Decryption Policies
      • ASA-CX Identity Policies
    • Email Security
      • Email Security Overview
      • ESA Overview
      • ESA Modeling & Licensing
Cristian Matei
Cristian Matei — CCIEx2 #23684
This course is also included in a training bundle:
View Training Bundle


17hr 55min
June 2, 2016
Unlimited HD Access

Train anywhere with our web, iOS, Android and Apple TV apps! You'll also have access to any course updates and additions.

Keep Training, Even Offline

Download the entire course in mobile, high and HD(1080p) resolutions.

  • Course
    • Introduction
      • Introduction
      • Topology & Equipment
      • CCNP Security Certification
      • Study Materials
      • Exam Topics Review :: Part 1
      • Exam Topics Review :: Part 2
    • Web Security Appliance
      • Web Security Overview
      • What is WSA? :: Part 1
      • What is WSA? :: Part 2
      • WSA Models, Interface & Licensing
      • Explicit Mode Overview
      • PAC File Overview
      • Transparent Mode
      • WSA Identities
      • WSA Acceptable Use Controls
      • WSA Access Policies Overview :: Part 1
      • WSA Access Policies Overview :: Part 2
      • WSA Access Policies Configuration :: Part 1
      • WSA Access Policies Configuration :: Part 2
      • WSA Access Policies Configuration :: Part 3
      • WSA Access Policies Configuration :: Part 4
      • WSA Decryption Policies Overview :: Part 1
      • WSA Decryption Policies Overview :: Part 2
      • WSA Decryption Policies Configuration
      • WSA Outbound Policies
      • WSA Transparent Mode with WCCP :: Part 1
      • WSA Transparent Mode with WCCP :: Part 2
      • WSA User Authentication Overview
      • WSA User Authentication Configuration :: Part 1
      • WSA User Authentication Configuration :: Part 2
      • WSA User Authentication Overview
    • Cloud Web Security
      • CWS Overview
      • CWS Licensing
      • CWS Traffic Redirection :: Part 1
      • CWS Traffic Redirection :: Part 2
      • CWS Traffic Redirection :: Part 3
      • CWS ASA Connector :: Part 1
      • CWS ASA Connector :: Part 2
      • CWS ISR G2 Connector :: Part 1
      • CWS ISR G2 Connector :: Part 2
      • CWS AnyConnect Connector
      • ScanCenter Web Filtering Policy
    • ASA-CX
      • ASA-CX Overview
      • ASA-CX Models & Licensing
      • ASA-CX Deployment Modes
      • ASA-CX Policy Objects
      • ASA-CX Access Policies
      • ASA-CX Decryption Policies
      • ASA-CX Identity Policies
    • Email Security
      • Email Security Overview
      • ESA Overview
      • ESA Modeling & Licensing