43, Mohamed Sakr Khafaga ST, from Abbas El-Akkad, Cairo

Trainings

CCNA Security

  • Chapter 1. Networking Security Concepts
  • Chapter 2. Common Security Threats
  • Chapter 3. Implementing AAA in Cisco IOS
  • Chapter 4. Bring Your Own Device (BYOD)
  • Chapter 5. Fundamentals of VPN Technology and Cryptography
  • Chapter 6. Fundamentals of IP Security
  • Chapter 7. Implementing IPsec Site-to-Site VPNs
  • Chapter 8. Implementing SSL VPNs Using Cisco ASA
  • Chapter 9. Securing Layer 2 Technologies
  • Chapter 10. Network Foundation Protection
  • Chapter 11. Securing the Management Plane on Cisco IOS devices
  • Chapter 12. Securing the Data Plane in IPv6
  • Chapter 13. Securing Routing Protocols and the Control Plane
  • Chapter 14. Understanding Firewall Fundamentals
  • Chapter 15. Implementing Cisco IOS Zone-Based Firewalls
  • Chapter 16. Configuring Basic Firewall Policies on Cisco ASA
  • Chapter 17. Cisco IDS/IPS Fundamentals
  • Chapter 18. Mitigation Technologies for E-mail-Based and Web-Based Threats
  • Chapter 19. Mitigation Technologies for Endpoint Threats

CCNP Security

SENSS 300-206 (Implementing Cisco Edge Network Security Solutions)

Cisco Secure Design Principles

  • Network Security Zoning
  • Cisco Module Network Architecture
  • Cisco SecureX Architecture
  • Cisco TrustSec Solutions

Implement Network Infrastructure Protection

  • Introducing Cisco Network Infrastructure Architecture
  • Deploying Cisco IOS Control Plane Security Controls
  • Deploying Cisco IOS Management Plane Security Controls
  • Deploying Cisco ASA Management Plane Security Controls
  • Deploying Cisco Traffic Telemetry Methods
  • Deploying Cisco IOS Layer 2 Data Plane Security Controls
  • Deploying Cisco IOS Layer 3 Data Plane Security Controls

Deploying NAT on Cisco IOS and Cisco Adaptive Security Appliance

  • Introducing Network Address Translation
  • Deploying Cisco ASA Network Address Translation
  • Deploying Cisco IOS Software Network Address Translation

Deploying Threat Controls on Cisco ASA

  • Introducing Cisco Threat Controls
  • Deploying Cisco ASA Basic Access Controls
  • Deploying Cisco ASA Application Inspection Policies
  • Deploying Cisco ASA Botnet Traffic Filtering
  • Deploying Cisco ASA Identity Based Firewall

Deploying Threat Controls on Cisco IOS Software

  • Deploying Cisco IOS Software with Basic Zone-Based Firewall Policies
  • Deploying Cisco IOS Software Zone-Based Firewall with Application Inspection Policies

SITCS 300-210 (Implementing Cisco Threat Control Systems).

Cisco Web Security Appliance

  • Describing The Cisco Web Security Appliance (WSA) Solutions
  • Integrating the Cisco Web Security Appliance
  • Configuring Cisco Web Security Appliance Identities and User
  • Authentication Controls
  • Configuring Cisco Web Security Appliance Acceptable Use Control
  • Configuring Cisco Web Security Appliance Anti-Malware Controls
  • Configuring Cisco Web Security Appliance Decryption
  • Configuring Cisco Web Security Appliance Data Security Controls

Cisco Cloud Web Security

  • Describing the Cisco Cloud Web Security Solutions
  • Configuring Cisco Cloud Web Security Connectors
  • Describing the Web Filtering Policy in Cisco ScanCenter

Cisco Email Security Appliance

Advanced Malware Protection for Endpoints

Cisco FirePOWER Next-Generation IPS

Cisco ASA FirePOWER Services Module

Installing Cisco ASA 5500-X Series FirePOWER Services (SFR) Module

SISAS 300-208 (Implementing Cisco Secure Access Solutions)

Threat Mitigation Through Identity Services

Cisco Identity Services Engine (ISE) Fundamentals

Advanced Access Control

Web Authentication and Guest Access

Endpoint Access Control Enhancements

Troubleshooting Network Access Control

SIMOS 300-209 (Implementing Cisco Secure Mobility).

Fundamentals of VPN Technologies and Cryptography

Deploying Secure Site-to-Site Connectivity Solutions

Deploying Cisco IOS Site-to-Site FlexVPN Solutions

Deploying Clientless SSL VPN

Deploying Cisco AnyConnect VPNs

Deploying Endpoint Security and Dynamic Access Policies

  • Describe the Cisco Email Security Solutions
  • Describing the Cisco Email Security Appliance Basic Setup Components
  • Configuring Cisco Email Security Appliance Basic Incoming and Outgoing
  • Mail Policies
    • AMP for Endpoints Overview and Architecture
    • Customizing Detection and AMP Policy
    • IOCs and IOC Scanning
    • Deploying AMP Connectors
    • AMP Analysis Tools
    • Describing the Cisco FireSIGHT System
    • Configuring and Managing Cisco FirePOWER Devices
    • Implementing an Access Control Policy
    • Understanding Discovery Technology
    • Configuring File-Type and Network Malware Detection
    • Managing SSL Traffic with Cisco FireSIGHT
    • Describing IPS Policy and Configuration Concepts
    • Describing the Network Analysis Policy
    • Creating Reports
    • Describing Correlation Rules and Policies
    • Understanding Basic Rule Syntax and Usage
    • Identity Services
    • 802.1X and EAP
    • Identity System Quick Start
    • Cisco ISE Overview
    • Cisco ISE with PKI
    • Cisco ISE Authentication
    • Configuring Cisco ISE for External Authentication
    • Certificate-based User Authentication
    • Authorization
    • Security Group Access (SGA) and MACsec Implementation
    • Describe the Cisco Email Security Solutions
    • Guest Access Services
    • Posture
    • Profiler
    • BYOD
    • The Role of VPNs in Network Security
    • VPNs and Cryptography
    • Introducing Cisco Secure Site-to-Site Connectivity Solutions
    • Deploying Point-to-Point IPsec VPNs on the Cisco ASA
    • Deploying Cisco IOS VTI-Based Point-to-Point IPsec VPNs
    • Deploying Cisco IOS DMVPNs
    • Introducing Cisco FlexVPN Solution
    • Deploying Point-to-Point IPsec VPNs Using Cisco IOS FlexVPN
    • Deploying Hub-and-Spoke IPsec VPNs Using Cisco IOS FlexVPN
    • Deploying Spoke-to-Spoke IPsec VPNs Using Cisco IOS FlexVPN
    • Clientless SSL VPN Overview
    • Deploying Basic Cisco Clientless SSL VPN
    • Deploying Application Access in Clientless SSL VPN
    • Deploying Advanced Authentication in Clientless SSL VPN
    • Overview of Cisco AnyConnect VPNs
    • Deploying Basic Cisco AnyConnect SSL VPN on Cisco ASA
    • Deploying Advanced Cisco AnyConnect SSL VPN on Cisco ASA
    • Deploying Cisco AnyConnect IPsec/IKEv2 VPNs
    • Deploying Advanced Authentication, Authorization, and Accounting in Cisco AnyConnect VPNs
    • Implementing Host Scan
    • Implementing DAP for SSL VPNs

CCIE Security V5 (400-251)

  • 1.0  Perimeter Security and Intrusion Prevention
  • 2.0  Advanced Threat Protection and Content Security 
  • 3.0  Secure Connectivity and Segmentation
  • 4.0  Identity Management, Information Exchange, and Access Control
  • 5.0  Infrastructure Security, Virtualization, and Automation
  • 6.0  Evolving Technologies v1.1

   

CCNA Cyber Ops

210-250 SECFND Exam:

  • 1.0  Network Concepts
  • 2.0  Security Concepts
  • 3.0  Cryptography
  • 4.0  Host-Based Analysis
  • 5.0  Security Monitoring
  • 6.0  Attack Methods

210-255 SECOPS Exam:

  • 1.0  Endpoint Threat Analysis and Computer Forensics
  • 2.0  Network Intrusion Analysis
  • 3.0  Incident Response
  • 4.0  Data and Event Analysis
  • 5.0  Incident Handling