Cisco

CCNP Security Technology Course: 300-209 SIMOS

  • Regular price $159.99
  • Save


Join our expert instructor, Cristian Matei, with real-world extensive experience for comprehensive CCNP Security Certification Video Series. The current CCNP Security blueprint is divided into four different exams which need to be passed to get CCNP Security certified. There is a huge gap of Security professionals on the market, so Cisco’s current CCNP Security blueprint was built to train engineers on emerging technologies and make them ready for challenging real-life environments. This course will be focusing on the SIMOS exam which assesses knowledge on the variety of Virtual Private Network (VPN) solutions that Cisco has available on the Cisco ASA firewall and Cisco IOS software platforms, such as remote access SSL VPN and site-to-site VPN (DMVPN, FlexVPN). This course will help candidates to get a better and deeper understanding of VPN architecture and deployment options, which will tremendously help them both for the certification exam and also for real-life deployments. As opposed to Bootcamp courses, being a certification video series, class is a mix of slides, visual explanations of how technologies work and the reasoning behind it, followed by configuration examples to enforce the knowledge. Slides should be used as a reference for the exam, while the examples as a reference for real-life deployments. Lab topologies will be designed, explaining the objective for each design, and then built from scratch by the instructor, nothing being pre-scripted, pre-tested or pre-recorded . During the process, the instructor will intentionally demonstrate the effects of misconfigurations and failures, randomly making learners think how to approach a specific problem, never seen before. Additionally, a focus will also be on building a proper study and learning methodology, which has nothing to do with command or configuration templates memorization. To get a even better understanding of the technologies and be prepared for the exam as well, it’s highly recommended to also watch the CCNP Security Bootcamp Video Series
  • Course
    • Introduction
      • Introduction
      • Course Outline
      • Topology & Equipment
      • CCNP Security Certification & Goals
      • CCNP Security Exam Information
      • CCNP Exam Walkthrough
      • About SIMOS
      • Network Design Myths & DMVPN
      • Study Material & Recommended Books
      • Learning Methodology
      • Recommended Learning Approach
    • VPN Concepts
      • Virtual Private Network (VPN)
      • Secure VPN
      • VPN Fundamentals
      • Cryptographic Hashing Algorithms
      • Digital Signatures
      • Next-Generation Cryptography/Encryption
      • VPN Logical Topologies
    • IKEv1 IPsec VPN
      • IKEv1 Overview
      • IKEv1 Phase 1
      • IKEv1 Phase 2
      • IKEv1 IPsec Control-Plane & Data-Plane
      • IKEv1 IPsec VPN Types
      • IOS Steps
      • ASA Steps
      • IKEv1 IPsec Crypto-Map Configuration :: Part 1
      • IKEv1 IPsec Crypto-Map Configuration :: Part 2
      • IKEv1 IPsec Verification & Troubleshooting :: Part 1
      • IKEv1 IPsec Verification & Troubleshooting :: Part 2
      • IKEv1 IPsec Verification & Troubleshooting :: Part 3
      • IKEv1 IPsec Verification & Troubleshooting :: Part 4
      • DPD & IKEv1 DPD
      • IPsec Peer Availability Check
      • IKEv1 DPD on IOS
      • DPD Verification :: Part 1
      • DPD Verification :: Part 2
      • DPD Verification :: Part 3
      • NAT-T Overview
      • NAT-T Example
      • GRE with IPsec Option A & B, IPsec Profile
      • GRE with IPsec Example :: Part 1
      • GRE with IPsec Example :: Part 2
      • IPsec with SVTI :: Part 1
      • IPsec with SVTI :: Part 2
      • DMVPN Fundamentals
      • NHRP & Important Messages
      • DMVPN Routing, Spoke to Hub, & Spoke to Spoke
      • DMVPN Phase 1 (Now obsolete) :: Part 1
      • DMVPN Phase 1 (Now obsolete) :: Part 2
      • DMVPN Phase 1 (Now obsolete) :: Part 3
      • DMVPN Phase 2 ( Now Obsolete) :: Part 1
      • DMVPN Phase 2 ( Now Obsolete) :: Part 2
      • DMVPN Phase 3 Mandatory Configuration
      • DMVPN & IKEv1sec, DMVPN & Crypto IPsec Profiles
      • IPsec tunnels :: Part 1
      • IPsec tunnels :: Part 2
      • GETVPN
      • GETVPN Control-Plane Phases
      • GDOI TEK Rekey
      • GETVPN Logical Topology, Routing, & Connectivity Requirements
    • IKEv2 IPsec VPN
      • IKEv2 Fundamentals
      • IKEv2 Configuration Exchange
      • FlexVPN & FlexVPN Building Blocks
      • IKEv2 FlexVPN SVTI with PSK
      • IKEv2 FlexVPN SVTI with PSK (Con't)
      • Public Key Infrastructure Overview
      • IKEv2 Flex VPN Configuration :: Part 1
      • IKEv2 Flex VPN Configuration :: Part 2
      • IKEv2 Flex VPN Configuration :: Part 3
      • IKEv2 Flex VPN Configuration :: Part 4
      • IKEv2 FlexVPN Hub-and-Spoke :: Part 1
      • IKEv2 FlexVPN Hub-and-Spoke :: Part 2
      • IKEv2 FlexVPN Hub-and-Spoke :: Part 3
      • IKEv2 FlexVPN Authorization Policy
      • FlexVPN Hub-Spoke Routing Challenge :: Part 1
      • FlexVPN Hub-Spoke Routing Challenge :: Part 2
      • FlexVPN Spoke-to Spoke Part 1
      • FlexVPN Spoke-to Spoke Part 2
      • FlexVPN Spoke-to Spoke Part 3
    • SSL VPN
      • SSL VPN Fundamentals :: Part 1
      • SSL VPN Fundamentals :: Part 2
      • AnyConnect Fundamentals
      • ASA VPN Building Blocks
      • Cisco ASA VPN Building Blocks
      • SSL VPN Tunnel-Group Matching
      • ASA Clientless SSL VPN Overview
      • ASA Configuration Steps
      • ASA Verification & Troubleshooting Steps :: Part 1
      • ASA Verification & Troubleshooting Steps :: Part 2
      • ASA Verification & Troubleshooting Steps :: Part 3
      • ASA Verification & Troubleshooting Steps :: Part 4
      • ASA Clientless SSL VPN Certificate Authentication
      • CA Options & ASA Configuration Steps :: Part 1
      • CA Options & ASA Configuration Steps :: Part 2
      • CA Options & ASA Configuration Steps :: Part 3
      • ASA Clientless SSL VPN Multiple Authentication :: Part 1
      • ASA Clientless SSL VPN Multiple Authentication :: Part 2
      • AnyConnect SSL VPN on ASA :: Part 1
      • AnyConnect SSL VPN on ASA :: Part 2
      • Additional ASA Verification & Troubleshooting
      • SSL VPN Authorization Options
      • ISE Configuration Steps :: Part 1
      • ISE Configuration Steps :: Part 2
      • ISE Configuration Steps :: Part 3
      • AnyConnect IKEv2 IPsec :: Part 1
      • AnyConnect IKEv2 IPsec :: Part 2
Cristian Matei
Cristian Matei — CCIEx2 #23684
This course is also included in a training bundle:
View Training Bundle


29hr 44min
April 27, 2016
Unlimited HD Access

Train anywhere with our web, iOS, Android and Apple TV apps! You'll also have access to any course updates and additions.

Keep Training, Even Offline

Download the entire course in mobile, high and HD(1080p) resolutions.

  • Course
    • Introduction
      • Introduction
      • Course Outline
      • Topology & Equipment
      • CCNP Security Certification & Goals
      • CCNP Security Exam Information
      • CCNP Exam Walkthrough
      • About SIMOS
      • Network Design Myths & DMVPN
      • Study Material & Recommended Books
      • Learning Methodology
      • Recommended Learning Approach
    • VPN Concepts
      • Virtual Private Network (VPN)
      • Secure VPN
      • VPN Fundamentals
      • Cryptographic Hashing Algorithms
      • Digital Signatures
      • Next-Generation Cryptography/Encryption
      • VPN Logical Topologies
    • IKEv1 IPsec VPN
      • IKEv1 Overview
      • IKEv1 Phase 1
      • IKEv1 Phase 2
      • IKEv1 IPsec Control-Plane & Data-Plane
      • IKEv1 IPsec VPN Types
      • IOS Steps
      • ASA Steps
      • IKEv1 IPsec Crypto-Map Configuration :: Part 1
      • IKEv1 IPsec Crypto-Map Configuration :: Part 2
      • IKEv1 IPsec Verification & Troubleshooting :: Part 1
      • IKEv1 IPsec Verification & Troubleshooting :: Part 2
      • IKEv1 IPsec Verification & Troubleshooting :: Part 3
      • IKEv1 IPsec Verification & Troubleshooting :: Part 4
      • DPD & IKEv1 DPD
      • IPsec Peer Availability Check
      • IKEv1 DPD on IOS
      • DPD Verification :: Part 1
      • DPD Verification :: Part 2
      • DPD Verification :: Part 3
      • NAT-T Overview
      • NAT-T Example
      • GRE with IPsec Option A & B, IPsec Profile
      • GRE with IPsec Example :: Part 1
      • GRE with IPsec Example :: Part 2
      • IPsec with SVTI :: Part 1
      • IPsec with SVTI :: Part 2
      • DMVPN Fundamentals
      • NHRP & Important Messages
      • DMVPN Routing, Spoke to Hub, & Spoke to Spoke
      • DMVPN Phase 1 (Now obsolete) :: Part 1
      • DMVPN Phase 1 (Now obsolete) :: Part 2
      • DMVPN Phase 1 (Now obsolete) :: Part 3
      • DMVPN Phase 2 ( Now Obsolete) :: Part 1
      • DMVPN Phase 2 ( Now Obsolete) :: Part 2
      • DMVPN Phase 3 Mandatory Configuration
      • DMVPN & IKEv1sec, DMVPN & Crypto IPsec Profiles
      • IPsec tunnels :: Part 1
      • IPsec tunnels :: Part 2
      • GETVPN
      • GETVPN Control-Plane Phases
      • GDOI TEK Rekey
      • GETVPN Logical Topology, Routing, & Connectivity Requirements
    • IKEv2 IPsec VPN
      • IKEv2 Fundamentals
      • IKEv2 Configuration Exchange
      • FlexVPN & FlexVPN Building Blocks
      • IKEv2 FlexVPN SVTI with PSK
      • IKEv2 FlexVPN SVTI with PSK (Con't)
      • Public Key Infrastructure Overview
      • IKEv2 Flex VPN Configuration :: Part 1
      • IKEv2 Flex VPN Configuration :: Part 2
      • IKEv2 Flex VPN Configuration :: Part 3
      • IKEv2 Flex VPN Configuration :: Part 4
      • IKEv2 FlexVPN Hub-and-Spoke :: Part 1
      • IKEv2 FlexVPN Hub-and-Spoke :: Part 2
      • IKEv2 FlexVPN Hub-and-Spoke :: Part 3
      • IKEv2 FlexVPN Authorization Policy
      • FlexVPN Hub-Spoke Routing Challenge :: Part 1
      • FlexVPN Hub-Spoke Routing Challenge :: Part 2
      • FlexVPN Spoke-to Spoke Part 1
      • FlexVPN Spoke-to Spoke Part 2
      • FlexVPN Spoke-to Spoke Part 3
    • SSL VPN
      • SSL VPN Fundamentals :: Part 1
      • SSL VPN Fundamentals :: Part 2
      • AnyConnect Fundamentals
      • ASA VPN Building Blocks
      • Cisco ASA VPN Building Blocks
      • SSL VPN Tunnel-Group Matching
      • ASA Clientless SSL VPN Overview
      • ASA Configuration Steps
      • ASA Verification & Troubleshooting Steps :: Part 1
      • ASA Verification & Troubleshooting Steps :: Part 2
      • ASA Verification & Troubleshooting Steps :: Part 3
      • ASA Verification & Troubleshooting Steps :: Part 4
      • ASA Clientless SSL VPN Certificate Authentication
      • CA Options & ASA Configuration Steps :: Part 1
      • CA Options & ASA Configuration Steps :: Part 2
      • CA Options & ASA Configuration Steps :: Part 3
      • ASA Clientless SSL VPN Multiple Authentication :: Part 1
      • ASA Clientless SSL VPN Multiple Authentication :: Part 2
      • AnyConnect SSL VPN on ASA :: Part 1
      • AnyConnect SSL VPN on ASA :: Part 2
      • Additional ASA Verification & Troubleshooting
      • SSL VPN Authorization Options
      • ISE Configuration Steps :: Part 1
      • ISE Configuration Steps :: Part 2
      • ISE Configuration Steps :: Part 3
      • AnyConnect IKEv2 IPsec :: Part 1
      • AnyConnect IKEv2 IPsec :: Part 2