自拍偷在线精品自拍偷,亚洲欧美中文日韩v在线观看不卡

思科認證CCIE安全實驗考試大綱變動情況

企業(yè)動態(tài)
2009年4月開始實行了新的思科認證CCIE安全實驗考試大綱,新思科認證CCIE安全實驗考綱在具體硬件、軟件版本和考綱上做了一些改變。

新的第三版思科認證CCIE安全實驗的大綱已經發(fā)布,并于2009年4月開始實行,硬件上沒有太多的改變,具體思科認證CCIE安全實驗考試硬件,軟件版本和考綱如下,斜體部分是新內容。

第三版思科認證CCIE安全實驗大綱硬件部分:

Hardware

A. Cisco 3800 Series Integrated Services Routers (ISR)

B. Cisco 1800 Series Integrated Services Routers (ISR)

C. Cisco Catalyst 3560 Series Switches

D. Cisco ASA 5500 Series Adaptive Security Appliances

E. Cisco IPS Series 4200 Intrusion Prevention System sensors

F. Cisco Secure Access Control Server for Windows

第三版思科認證CCIE安全實驗大綱軟件部分:

Software

A. Cisco ISR Series running IOS Software Version 12.4T Advanced Enterprise Services feature set is used on all routers

B. Cisco Catalyst 3560 Series Switches running Cisco IOS Software Release 12.2(44)SE or above

C. Cisco ASA 5500 Series Adaptive Security Appliances OS Software Version 8.x

D. Cisco IPS Software Release 6.1.x

E. Cisco VPN Client Software for Windows, Release 5.x

F. Cisco Secure ACS for Windows Version 4.1

V3 Blueprint

I.Implement secure networks using Cisco ASA Firewalls

A. Perform basic firewall Initialization

B. Configure device management

C. Configure address translation (nat, global, static)

D. Configure ACLs

E. Configure IP routing

F. Configure object groups

G. Configure VLANs

H. Configure filtering

I. Configure failover

J. Configure Layer 2 Transparent Firewall

K. Configure security contexts (virtual firewall)

L. Configure Modular Policy Framework

M. Configure Application-Aware Inspection

N. Configure high availability solutions

O. Configure QoS policies

II.Implement secure networks using Cisco IOS Firewalls

A. Configure CBAC

B. Configure Zone-Based Firewall

C. Configure Audit

D. Configure Auth Proxy

E. Configure PAM

F. Configure access control

G. Configure performance tuning

H. Configure advanced IOS Firewall features

III.Implement secure networks using Cisco VPN solutions

A. Configure IPsec LAN-to-LAN (IOS/ASA)

B. Configure SSL VPN (IOS/ASA)

C. Configure Dynamic Multipoint VPN (DMVPN)

D. Configure Group Encrypted Transport (GET) VPN

E. Configure Easy VPN (IOS/ASA)

F. Configure CA (PKI)

G. Configure Remote Access VPN

H. Configure Cisco Unity Client

I. Configure Clientless WebVPN

J. Configure AnyConnect VPN

K. Configure XAuth, Split-Tunnel, RRI, NAT-T

L. Configure High Availability

M. Configure QoS for VPN

N. Configure GRE, mGRE

O. Configure L2TP

P. Configure advanced Cisco VPN features

IV.Configure Cisco IPS to mitigate network threats

A. Configure IPS 4200 Series Sensor Appliance

B. Initialize the Sensor Appliance

C. Configure Sensor Appliance management

D. Configure virtual Sensors on the Sensor Appliance

E. Configure security policies

F. Configure promiscuous and inline monitoring on the Sensor Appliance

G. Configure and tune signatures on the Sensor Appliance

H. Configure custom signatures on the Sensor Appliance

I. Configure blocking on the Sensor Appliance

J. Configure TCP resets on the Sensor Appliance

K. Configure rate limiting on the Sensor Appliance

L. Configure signature engines on the Sensor Appliance

M. Use IDM to configure the Sensor Appliance

N. Configure event action on the Sensor Appliance

O. Configure event monitoring on the Sensor Appliance

P. Configure advanced features on the Sensor Appliance

Q. Configure and tune Cisco IOS IPS

R. Configure SPAN & RSPAN on Cisco switches

S. jfdk

V.Implement Identity Management

A. Configure RADIUS and TACACS+ security protocols

B. Configure LDAP

C. Configure Cisco Secure ACS

D. Configure certificate-based authentication

E. Configure proxy authentication

F. Configure 802.1x

G. Configure advanced identity management features

H. Configure Cisco NAC Framework

VI.Implement Control Plane and Management Plane Security

A. Implement routing plane security features (protocol authentication, route filtering)

B. Configure Control Plane Policing

C. Configure CP protection and management protection

D. Configure broadcast control and switchport security

E. Configure additional CPU protection mechanisms (options drop, logging interval)

F. Disable unnecessary services

G. Control device access (Telnet, HTTP, SSH, Privilege levels)

H. Configure SNMP, Syslog, AAA, NTP

I. Configure service authentication (FTP, Telnet, HTTP, other)

J. Configure RADIUS and TACACS+ security protocols

K. Configure device management and security

VII.Configure Advanced Security

A. Configure mitigation techniques to respond to network attacks

B. Configure packet marking techniques

C. Implement security RFCs (RFC1918/3330, RFC2827/3704)

D. Configure Black Hole and Sink Hole solutions

E. Configure RTBH filtering (Remote Triggered Black Hole)

F. Configure Traffic Filtering using Access-Lists

G. Configure IOS NAT

H. Configure TCP Intercept

I. Configure uRPF

J. Configure CAR

K. Configure NBAR

L. Configure NetFlow

M. Configure Anti-Spoofing solutions

N. Configure Policing

O. Capture and utilize packet captures

P. Configure Transit Traffic Control and Congestion Management

Q. Configure Cisco Catalyst advanced security features

VIII.Identify and Mitigate Network Attacks

A. Identify and protect against fragmentation attacks

B. Identify and protect against malicious IP option usage

C. Identify and protect against network reconnaissance attacks

D. Identify and protect against IP spoofing attacks

E. Identify and protect against MAC spoofing attacks

F. Identify and protect against ARP spoofing attacks

G. Identify and protect against Denial of Service (DoS) attacks

H. Identify and protect against Distributed Denial of Service (DDoS) attacks

I. Identify and protect against Man-in-the-Middle (MiM) attacks

J. Identify and protect against port redirection attacks

K. Identify and protect against DHCP attacks

L. Identify and protect against DNS attacks

M. Identify and protect against Smurf attacks

N. Identify and protect against SYN attacks

O. Identify and protect against MAC Flooding attacks

P. Identify and protect against VLAN hoping attacks

Q. Identify and protect against various Layer2 and Layer3 attacks

以上為第三版思科認證CCIE安全實驗考試大綱變動情況。

【編輯推薦】

  1. 5月15日CCIE350-001新題+變種題
  2. CCIE安全(Security)考試增加面試
  3. 最新CCIE 路由交換實驗考試大綱v4.0
責任編輯:落葉 來源: IT認證考試資源網(wǎng)
相關推薦

2009-09-03 09:39:42

思科CCIE認證考試心得

2009-09-09 09:18:55

思科認證CCIE實驗考試面試

2009-09-01 13:28:17

思科CCIE認證考試攻略

2009-08-27 08:35:08

思科認證CCIE思科認證CCIE考試介

2009-08-27 08:30:05

思科認證CCIE介紹考試費用

2009-08-25 16:55:17

思科認證CCIE

2009-09-21 11:45:36

CCIE實驗室考試

2010-05-10 10:27:57

CCIE SP Ope

2009-08-31 09:14:31

思科認證思科CCIE認證思科認證高級認證

2009-09-01 16:41:00

思科認證CCIEEdify

2009-08-25 16:28:37

思科認證CCIE

2009-08-25 10:00:18

思科認證CCNA思科認證

2009-09-08 08:57:29

思科認證CCIE考試規(guī)CCIE

2010-03-30 10:17:32

CCIE RS4.0

2010-11-15 11:14:17

CCIE

2009-04-16 11:09:16

思科CCIE閱讀

2009-05-12 18:23:29

CCIE考試大綱路由交換

2009-09-09 09:25:24

思科認證CCIE StCCIE Storag思科認證

2009-06-24 09:31:50

CCIE安全實驗考試

2009-08-25 15:27:34

思科認證CCIE
點贊
收藏

51CTO技術棧公眾號