• If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below.
Xin chào ! Nếu đây là lần đầu tiên bạn đến với diễn đàn, xin vui lòng danh ra một phút bấm vào đây để đăng kí và tham gia thảo luận cùng VnPro.

Announcement

Collapse
No announcement yet.

Thay đổi lớn trong CCIE Security

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Thay đổi lớn trong CCIE Security

    Ngày 31/5, Cisco đã ra thông báo về việc đưa ra nội dung thi mới cho cả kỳ thi CCIE Security Written và Lab. Phiên bản mới này (phiên bản 2.0) sẽ có hiệu lực kể từ ngày 2 tháng 1 năm 2007.

    Nguồn:http://www.cisco.com/web/learning/le...itychanges2006

    Written Exam Blueprint v2.0

    The Security written exam (350-018) has 100 multiple-choice questions and is two hours in duration. The topic areas listed are general guidelines for the type of content that is likely to appear on the exam effective January 2, 2007. Please note, however, that other relevant or related topic areas may also appear. Candidates prior to January 2 should continue using the prior blueprints (now known as v1.0).

    General Networking
    Networking Basics
    OSI Layers
    TCP/IP Protocols
    Switching (VTP, VLANs, Spanning Tree, Trunking, etc.)
    Routing Protocols (RIP, EIGRP, OSPF, and BGP)
    IP Multicast


    Security Protocols, Ciphers and Hash Algorithms

    RADIUS
    TACACS+
    Ciphers RSA, DSS, RC4
    Message Digest 5 (MD5)
    Secure Hash Algorithm (SHA)
    EAP PEAP TKIP TLS
    Data Encryption Standard (DES)
    Triple DES (3DES)
    Advanced Encryption Standard (AES)
    IP Security (IPSec)
    Authentication Header (AH)
    Encapsulating Security Payload (ESP)
    Internet Key Exchange (IKE)
    Certificate Enrollment Protocol (CEP)
    Transport Layer Security (TLS)
    Secure Socket Layer (SSL)
    Point to Point Tunneling Protocol (PPTP)
    Layer 2 Tunneling Protocol (L2TP)
    Generic Route Encapsulation (GRE)
    Secure Shell (SSH)
    Pretty Good Privacy (PGP)


    Application Protocols
    Hypertext Transfer Protocol (HTTP)
    Simple Mail Transfer Protocol (SMTP)
    File Transfer Protocol (FTP)
    Domain Name System (DNS)
    Trivial File Transfer Protocol (TFTP)
    Network Time Protocol (NTP)
    Lightweight Directory Access Protocol (LDAP)
    Syslog


    Security Technologies
    Packet Filtering
    Content Filtering
    URL Filtering
    Authentication Technologies
    Authorization technologies
    Proxy Authentication
    Public Key Infrastructure (PKI)
    IPSec VPN
    SSL VPN
    Network Intrusion Prevention Systems
    Host Intrusion Prevention Systems
    Event Correlation
    Adaptive Threat Defense (ATD)
    Network Admission Control (NAC)
    802.1x
    Endpoint Security
    Network Address Translation


    Cisco Security Appliances and Applications
    Cisco Secure PIX Firewall
    Cisco Intrusion Prevention System (IPS)
    Cisco VPN 3000 Series Concentrators
    Cisco EzVPN Software and Hardware Clients
    Cisco Adaptive Security Appliance (ASA) Firewall
    Cisco Security Monitoring, Analysis and Response System (MARS)
    Cisco IOS Firewall
    Cisco IOS Intrusion Prevention System
    Cisco IOS IPSec VPN
    Cisco IOS Trust and Identity
    Cisco Secure ACS for Windows
    Cisco Secure ACS Solution Engine
    Cisco Traffic Anomaly Detectors
    Cisco Guard DDoS Mitigation Appliance
    Cisco Catalyst 6500 Series Security Modules (FWSM, IDSM, VPNSM, WebVPN, SSL modules)
    Cisco Traffic Anomaly Detector Module & Cisco Guard Service Module


    Cisco Security Management
    Cisco Adaptive Security Device Manager (ASDM)
    Cisco Router & Security Device Manager (SDM)
    Cisco Security Manager (CSM)


    Cisco Security General
    IOS Specifics
    Routing and Switching Security Features: IP & MAC Spoofing, MAC Address Controls, Port Security, DHCP Snoop, DNS Spoof.
    NetFlow
    Layer 2 Security Features
    Layer 3 Security Features
    Wireless Security
    IPv6 Security


    Security Solutions
    Network Attack Mitigation
    Virus and Worms Outbreaks
    Theft of Information
    DoS/DDoS Attacks
    Web Server & Web Application Security


    Security General
    Policies - Security Policy Best Practices
    Information Security Standards (ISO 17799, ISO 27001, BS7799)
    Standards Bodies
    Common RFCs (e.g. RFC1918, RFC2827, RFC2401)
    BCP 38
    Attacks, Vulnerabilities and Common Exploits - recon, scan, priv escalation, penetration, cleanup, backdoor
    Security Audit & Validation
    Risk Assessment
    Change Management Process
    Incident Response Framework
    Computer Security Forensics

    và thay đổi lớn về mặt thiết bị:

    Troubleshooting techniques will now be integrated into the lab exam. In addition, the following changes--shown in the posted blueprint--will be introduced in the lab effective January 2, 2007:

    Upgrade of Cisco PIX Firewall Appliance to Software Version 7.x.
    Addition of two ASA-5510 Firewall Appliances running v7.x.
    Upgrade of Cisco Intrusion Prevention System to Software Release 5.x.
    Upgrade of Cisco VPN3000 Concentrator Series to Software Release 4.7.x.
    Upgrade of Cisco Catalyst 3550 switches to Software Release 12.2SEE.
    Upgrade of CiscoSecure ACS to Software Version 4.0.
    Addition of PC to test Remote Access VPN, admission control, packet capturing and various other applications.
    Eliminate preconfigured ACS and require candidates to configure.


    LAB BLUEPRINT version 2.0:

    Firewall
    PIX and ASA Firewall
    Basic initialization
    Access Management
    Address translation
    ACLs
    IP Routing
    Object groups
    VLANs
    AAA
    VPNs
    Filtering
    Failover
    Layer 2 Transparent Firewall
    Security Contexts (Virtual Firewall)
    Modular Policy Framework
    Application-Aware Inspection
    High Availability Scenarios
    QoS Policies
    Other advanced features

    IOS Firewall
    CBAC
    Audit
    Auth Proxy
    PAM
    Access control
    Performance tuning
    Advanced features


    VPN
    IPSec LAN-to-LAN
    SSL VPN
    DMVPN
    CA (PKI)
    Remote access VPN
    VPN3000 Concentrator
    VPN3000 IP Routing
    Unity client
    WebVPN
    EzVPN Hardware Client
    XAuth, Split-tunnel, RRI, NAT-T
    High Availability
    QoS for VPN
    GRE, mGRE
    L2TP
    PPTP
    Advanced VPN features


    Intrusion Prevention System (IPS)

    IPS 4200 Series Sensor Appliance
    Basic initialization
    Sensor configuration
    Sensor Management
    Promiscuous and Inline Monitoring
    Signature Tuning
    Custom Signatures
    Blocking
    TCP Resets
    Rate Limiting
    Signature Engines
    IDM
    Event Action
    Event Monitoring
    IOS IPS
    PIX IDS
    SPAN, RSPAN
    Advanced Features


    Identity Management
    Security Protocols (Radius, Tacacs+)
    Cisco Secure ACS Configuration
    Access Management (Telnet, SSH, Pwds, Priv Levels)
    Proxy Authentication
    Service Authentication (FTP, Telnet, HTTP, other)
    Network Admission Control (NAC Framework solution)
    802.1x
    Advanced features


    Advanced Security
    Mitigation techniques
    Packet marking techniques
    Security RFCs (RFC1918, RFC2827, RFC2401)
    Service Provider Security
    Black Holes, Sink Holes
    RTBH Filtering (Remote Triggered Black Hole)
    Traffic Filtering using Access-lists
    NAT
    TCP Intercept
    uRPF
    CAR
    NBAR
    NetFlow
    Flooding
    Spoofing
    Policing
    Fragmentation
    Sniffer Traces
    Catalyst Management and Security
    Traffic Control and Congestion Management
    Catalyst Features and Advanced configuration
    IOS Security Features


    Network Attacks
    Network Reconnaissance
    IP Spoofing Attacks
    MAC Spoofing Attacks
    ARP Spoofing Attacks
    Denial of Service (DoS)
    Distributed Denial of Service (DDoS)
    Man-in-the-Middle (MiM) Attacks
    Port Redirection Attacks
    DHCP Attacks
    DNS Attacks
    Fragment Attacks
    Smurf attacks
    SYN Attacks
    MAC Attacks
    VLAN Hoping Attacks
    Other Layer2 and Layer3 Attacks
    Email : vnpro@vnpro.org
    ---------------------------------------------------------------------------------------------------------------
Trung Tâm Tin Học VnPro
149/1D Ung Văn Khiêm P25 Q.Bình thạnh TPHCM
Tel : (08) 35124257 (5 lines)
Fax: (08) 35124314

Home page: http://www.vnpro.vn
Support Forum: http://www.vnpro.org
- Chuyên đào tạo quản trị mạng và hạ tầng Internet
- Phát hành sách chuyên môn
- Tư vấn và tuyển dụng nhân sự IT
- Tư vấn thiết kế và hỗ trợ kỹ thuật hệ thống mạng

Network channel: http://www.dancisco.com
Blog: http://www.vnpro.org/blog
Working...
X