Cisco CCIE CCNP
CCIE Assessor Lab Now Offers More Value
CCIE SECURITY TRACK
Written Exam Blueprint v1.0
The Security written exam (350-018) has 100 multiple-choice questions and is two hours in duration. The topic areas listed are general guidelines for the type of content that is likely to appear on the exam. Please note, however, that other relevant or related topic areas may also appear.
1. Security Protocols
1. Remote Authentication Dial In User Service (RADIUS)
2. Terminal Access Controller Access Control System Plus (TACACS+)
3. AES
4. EAP peap tkip tls
5. Data Encryption Standard (DES)
6. Triple DES (3DES)
7. IP Secure (IPSec)
8. Internet Key Exchange (IKE)
9. Certificate Enrollment Protocol (CEP)
10. Point to Point Tunneling Protocol (PPTP)
11. Layer 2 Tunneling Protocol (L2TP)
CCNP training courses - exchange : BCMSN (Building Cisco Multilayer Switched Net works) prior knowledge of Cisco courses BCMSN2.2 latest version BCMSN courses. Learn how to use appropriate technology to the construction of multi-storey exchange network, to create enterprise LAN as well as the techniques involved are basic debugging capabilities. Cisco Multilayer Switch use end-user services or server. Improve the flow of data, transmission reliability, redundancy, in the park and service provider network linking between. Asked the students to have the following : l basic routing configuration l basic configuration of switches l l basic VLAN STP basic configuration l basic configuration l standard configuration Trunk Access Control List configuration l ICND courses knowledge courses points l enterprise network compound network on the basis of the model based on the use of the park model configuration and extended enterprise network l definition of the park to separate VLAN network traffic network management and control of the use of the STP-storey accelerate network convergence l against STP for debugging. identify enhanced STP Technology : RSTP and MST l VLAN to deal with the volume of data exchange l implementation of the multi-layer routing redundancy, intergovernmental improve end-to-end visit to the high-availability models in the park foundation raise the safety switch, prevent data theft and loss l services in an integrated network, and network switches park configuration to optimize voice, video and data applications flow, the company arranged training courses Tangboke company launched the latest BCMSN 2.2 courses only this one country, a total of the first day of the four-day courses to design a network definition VLAN Spanning Tree Protocol to achieve the following day, enhance the realization of the third day of Spanning Tree Protocol routing redundancy level, the fourth day of multiple exchange to achieve two-story network security protection, Campus Network configuration switches supporting voice, and video services CCNP training courses - Remote Access : BCRAN (Building Cisco Remote Access Networks) BCRAN2.2 prior knowledge of Cisco courses latest version BCRAN courses. Introduces WAN remote access technology and solutions. Focus on one or more effective WAN link or fixed dial-up technology enterprises and branches of remote access. Include the use of auxiliary port modem connection achieve substituting outside management, the PPP LCP characteristics, in cable modems and Asymmetric Digital line users to use network address translation, the use of IPsec VPN encryption technologies and IKE key management. ISDN basic rate interface and clustering rate interface, dial-on-demand routing, and Frame Relay Interface-plastic flow, Dial Backup, and the use of compression queue improving the quality of services, authentication and authorization statistics. Asked the students to have. L INTRO and ICND courses knowledge l simple network experience l simple product knowledge courses points l widely identified area network technology and the formation of PPP l configuration characteristics (CHAP, MLP, Callback) l described the generosity of technology, the allocation of DSL and NAT l described VPN, IPsec configuration l traditional DDR configuration optimization of the use of ISDN dial l l interface configuration Lo flow entire relay Dial l-shaped building prototype for dial-up backup l DDR definition of QoS and WAN configuration border cohort l expand the use of AAA Access Control development company training courses, the company launched the latest Tangboke BCRAN 2.2 courses only this one country, a total of the first day of the four-day courses WAN technology and its components, PPP day configuration characteristics of broadband access technology. IPsec VPN trial use of ISDN and third DDR Enhanced remote network connectivity, Frame-relay fourth day link configuration backup, network QOS Park, AAA Properties CCNP training courses - debugging : CIT (Cisco Internetwork Troubleshooting) preparing know l build consensus baseline, topology, configuration produced icon form 1 or definition files debugging strategies solve this problem l Internet orders or use IOS software to solve the physical layer and link layer figure failure. In the network to determine the baseline figure even layer Lo Packaging, and the risk of errors l orders or use IOS software solution network layer failure. In the network baseline to determine the three-tier connectivity and routing table Accessibility issues. L solve the transport layer and application layer failure. In the network to determine baseline data transmission throughput, delay and jitter. Key facts l determine WAN technologies and the formation of PPP l configuration characteristics (CHAP, MLP, Callback) l described the generosity of technology, the allocation of DSL and NAT l described VPN, IPsec configuration l traditional DDR configuration optimization of the use of ISDN dial l l interface configuration Lo flow entire relay Dial l-shaped building prototype for dial-up backup l DDR definition of QoS and WAN configuration border cohort l expand the use of AAA Access Control development company training courses, the company launched the latest Tangboke CIT 2.2 courses, a country alone, A total of the first two-day course curriculum, the creation of network configuration files, host configuration file, the network application level model, common debugging steps and flow charts, the choice debugging smell it the next day to determine network, the physical layer, data link layer, network layer, transport layer and application layer FAQ
|