CCIE Security v5.0 Training- Day1

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
[Music] good morning good afternoon and good evening everyone my name is Natasha MA so today we're gonna see the end-to-end program for CCI security before moving forward let me tell you about something about myself my name is knitted Sharma on the corporate trainer as well as I do the routine training so also I give training on CCI security CCI data center as well as on rolling in switching basically I'll live in Bengaluru I enjoy bike riding soccer road trips a past experiences eleven years in total and last four years I'm working with the organization called as met Patrick my specialization I've actually been working on the products like Cisco be aware storage security as well as Wallace I work on the AC as a product from Cisco power powered next generation power walls eyes VPNs I also worked on the UCS director UCS central UCS platform compute aw is DNA Sdn solutions by Cisco like ACI Nexus WSN whc along with this storage now what is my agenda so this video is all about what we're gonna see in the next two months right about the CCI security I'll give you a brief introduction on each and every aspect what are the things required for CCI security you know talk about what is need to be required to clear the written for security lab how are you gonna do this ready prepare it and we'll close it in there now before moving further it let me discuss you what is part a bill of content so as you can see it over here we are talking about into insecurities now what's so special about end-to-end security how it makes different from other courses let's say for example we have basic courses of CCNA we have the course for ccnp and then we have the ghost CIE there's topic collars and OSPF over here there is a topic collars and OSPF over here and there's a topic OSPF also over here of those people is a topic in CCNA which usually goes for two to three days depending on what trainer is there and one other number of us he is taking so once this is finished let's say for example this entire curriculum is also one and a half to two months after this again the ccnp will start and here though is picked up it comes again usually the people used to say that can we have a brochure before that so what is n to n modulus it's more like here product based reading what I mean by that they'll start with the topic let's say for example and OSPF will start it from this scratch knowing that you don't know anything on that particular topic and we'll finish it in till your CCR level no matter how many days it is going to take it over there so we'll start a topic from this scratch and we'll still will complete it till the cci 11 whatever it is required for that topic to become an expert or now what is my table of content as you can see in though this I have brought you classify this table of content into five modules the module number one is all about the basic security now security when you talk about CCL security we are not directly gonna jump on the four walls of the VPNs of the ice and different other topics we first we we just want to talk about the basic of the security like what is security what are different parameters what are different types of attacks you gonna talk about the assets well mobility and the countermeasures over there on day two we gonna move further it the cryptographic hashing algorithm encryption symmetric as a symmetric PKI as digital signature and this will build your fundamentals for you be pious now the question comes here is how much deep we are going to talk about this over here because the topic is your basic security basic of security you got to talk a little bit right and when we're going to start the VPNs we when you already know the topic over there the terminologies are very much familiar with you you cannot deep dive into this in that particular session day three is all about Copp and truthfully in policing this security a cpu you cannot talk about the routing protocols authentication navigation here is do we need to talk about routing and switching no there is a pre-requisite ease for this curve we are not going to talk any of the routing protocols we are not going to talk about any of the switching right now how to authenticate how we can authenticate those routing protocol like OSPF EIGRP we don't talk on that how to configure that because I'll talk about the NTP syslog DHCP which is pretty much important in all the production with respect to the security parameters and we need to secure NTP as well as GZ moving further at once the basic of security within like three or four days it will be finished we're gonna move to the next module which is nothing but your firewall now it is the power walk far wall is basically we're gonna start from the scratch from the product what are the different old generation power walls because I take a glimpse on that stateless packet filtering stateful packet filtering right the proxy ones you are talk about the SI products different products are there right 5500 series what are what are the products that will be used for the Soho small office home office for the mid-level and big data centers one on different products we gonna talk about the virtual AC power ones because power was budget still comes in two ways it comes as a virtual appliance also as well as the physical appliance you gonna talk a little bit on the UTM as well as the next-generation firewall what's the difference between them and then we gonna talk this is the slider error and this is a ZM we talk about the ATM over there once this is done we gonna talk about them will start and open a particular power wall when you got an idea a little bit of that you're gonna see the CLI you know check the SDM with the help of the GUI graphical user interface with the ASTM how to do a factory default setting of that particular power wall and working on some of the car files over there you can't talk about the physical interfaces how to configure the VLANs name if security levels how to assign an IP all this figure a talk and once you know and get an idea will deep dive and start talking about the routing so there how to do the routing on tawa again I am repeating we are not going to talk about the routing protocols but how to imply on how to secure this routing protocol you can talk on that once these all topics like ssh telnet configuring the ntp syslog everything on the AC power was being done will move to the next day and we got talked about the two very very important topic on the AC power all that you call as the nut as well as easier now how how important is these two topics these are very important and their behavior and got changed from the version 8.8 to the nine dot x once we gonna finish you're not all the types of not object not twice not everything we gonna talk of it over here easy else inside ACL outside AC else object-oriented a since everything we got rocket over here so this gonna take a day on the not as well as easier maybe two also once this is done we gonna talk on the AC modes as well as the virtualization on the AC power which nothing but call as context over there so we do have an admin context had been dual system context user context on how to deploy with respect to the production we need to talk on that also in the last but not the least we don't talk about the hea high availability with the AC power so we have active standby mode we have active active mode you can talk on the clustering how the payload operation happens how the pocket life of a packet on the firewall when you are deployed a che over there so you gonna talk some of the industry standards we gonna talk to how usually on the production the a say i'm gonna be deployed we gonna see certain designs mock labs are already prepared with that so we gonna talk on those particular things once the AC power wall is being finished we have done all the labs on those particular topics that we have seen the other upstream we gonna move to the next module double ported ppm now in the VPN generally people are scared of the VPN that it's quite difficult so many different types of VPNs are there I'll trust I'll trust me guys we've been is very simple if you know the terminologies that we have already discussed on write like your crypt analysis encryption if you know the three days and all hashing algorithm empty pipes are if you have an idea on that these a VPNs terminal a VPN will be easy for you just need to have understanding of a particular flow why we require of you to secure it over an unsecured Network so that's why we're gonna talk on the fundamentals of VP and I gotta spend two days just to make sure that you got their fundamentals of the VPN so we can't talk about the VPN types IPSec features CIA which is your confidentiality integrity and availability we can talk on the IPSec protocol like Ikey SPAH authentication header I quotes I phases not travel so security Association and component somehow to power bi use with us here now is it important case it is important with respect to the VPN is it important to configure the CA on the windows 2012 yes it is important you should know how to configure this here on now while I'm taking only 2012 because it's more or less you'll easily find to those in Trello they in the production it is running 2016 with the license version yes you can do it on that also but it's more or less the same thing saying this once you got an idea what is the VPN what our different segments and the security associations playing over there we kind of move to all these different types of the VPNs that we do have we gotta talk on the site to site VPN side to side to GRU GRU or IPSec site to site VPN labs once done we gonna go towards our a VPN we have SSL client class as well as SSL client which is nothing but your any connect to be going to talk on those also we're gonna talk about the labs how to open the labs for all this we gonna talk about SSL much more in detail we got talk on this itself much more because it's a perfect ball which you will be seen in most of the terminologies and most of the security parameters which is with very important with respect to the interviews also so SSL VPN before Isis starting with SSL VPN we gonna talk for SSL because I see the packet handshake between server and why all those things and then we gotta move towards and we'll call this as a cell for your VPS so SSL VPN modes client less and the thing that I've already said moving further and we gonna talk about the different types of VPN more or less which is very important one of the common one which is tmv peer we're going to talk about the terminologies overview and HRP next on the resolution protocol name GRE how the DMA dmvpn work its phases and advantages once done we gonna do the lab on the very same thing next is get VPN all the terminologies gdy as a protocol get sleep in terminologies what is key server kek key encryption key traffic encryption key leaking process over there group members - protocol and so and so forth similarly in the last figure I talked about the plague sweep here now playing sweeping is more or less with I qui - so you can see that in my this PDF you haven't seen the ike b2 there why because i qui to mostly gonna take over there so previous all the VPNs will be work on i qui one as well as i could be to but place VPN is purely on the IP 2 so we gonna talk about it-- we do over here in the text between much more that's why I've given two days over there once it is done we gonna move further and we gonna talk about the ice which is the most important topic with respect to CCI as well as with respect to the power so you may or may not have the Cisco products different products like your next-generation firewall or their Sdn solutions on dn and so and so forth but it is a high possibility that this is for ice will be there in your power which is lying around it's the best according to the Gartner report it is the best product as it now by the Cisco for the Triple Aim so that's why we're gonna spend much more time over there on the ice so we're gonna start with what is a nice probe we're gonna start what are the identity what do you mean by a word for us an identity ice transpired into the service engine what are the services that has been provided by the engine of the ice we got talk on that so if you don't have any idea on the ice you don't have to worry about it because I'm going to take a week or week and a half only on the eyes just to make sure that you've got a better idea you got a better production view how to deploy an eyes and so and so forth so once you got an idea introduction has been given to an architecture and the deployment process of the eyes we're gonna move further into the design perspective like what are the personas there are basically four personas of the eyes we have band which is administrative one we have PSM which is service one monitoring and troubleshooting and the last with the license we got a pig scrape once this is done we going to talk about the licensing what are the different ways to get on our licensure what are the different types of licenses are there and which license gives you the what kind of a service if you can't talk on that maybe we do gonna deploy this as infrastructure component whether you want to deploy ice as a VM or you wanted to pause this ice as a physical component we got a talk on this particular platform on day 24 we can't talk about the fundamentals of triple my because eyes to understand you should have a fundamental knowledge of your triple-a like majorly protocols like a radius tacacs+ period AVP a change of authorization keep protocol keep you fast beep md5 all these protocols we gonna talk about really building eyes a network policy when you talk about ice is all about two things ice policies and ice authentication authorization policies on your profile so we gonna merge the policies all the types of policies we gonna talk about like ice authorization rules which will be defined in the network access policies you're going to talk about the device security policy which comes with your profiling thread centric NAG using the device process in the authorization rule we going to talk about the auditing and accounting of policies on the eyes we talked about the audit log collections how to do that user ice user accounting we're gonna talk about the auditing as well as the counting as I said then next we gonna move further and talk about the bootstrap of the NAT devices what are the NAT devices there are three terminologies which you need to be get familiar with the ice one is something an Authenticator which is nothing but you're not a little place ever so what are the complication needs to be done on your switches catalyst switches they can be catalyst which it can be a WLC controller it could be a firewall also so whatever the NAT device you are takin what needs to be done on that particular device we have to do the configuration for the scene and we can undo that bootstrap for that once we have done being honored in the last see much more in detail fashion how to apply those authentication authorization policy into the profiles that you cannot be associated with over there now last but not the least we gonna troubleshoot the eyes which is very important with respect to the troubleshooting part of the CCI lab also last is your module called as a wasa WLC access point on this you see in this we gotta talk about our wasa as well as email security and their secret we wanna see what W works hard on how esa works at how to implement is how to implement them as a BM how the protocol like WCCB works over there how the proxies happen over there how you got to protect your layers of an application over there everything we're going to work over it from deployment to the troubleshooting to the configuration all the policies over there access policies with the WACS and ESS then we do have certain miscellaneous topics over there like register to the Cisco IP phone by the COC and now the question comes here is that it's how much detail we are going to talk about this IP phone and CUC and the answer is just a basic level you should know a basic level or how to integrate an IP phone with the sea use here and how to pretend that we are not deep diving into the sea UCM like call parking and all this different stuff over there why because this is attack than the respect to the security not a CCI collaboration in a very same way if I talk about how much detail we gonna talk about the WLC wireless controller with respect to the API only the registration part how a WLC is going to detect on get register with an access point or why so no saw how access point going to be good register with the WLC controller and then if any client lists Wireless Titleist PC is coming over there how to protect that particular PC or laptop or bring your own device device over there so just a basic of these two right not in detail but how to secure it that we gonna talk in much more in detail about once this miscellaneous topics are done we gonna talk about the module 6 which is your your C CLR preparation over there you have 22 8 hour session depending on how much mode package you have taken from the net metric depending on the number of sessions will be given to you you can do the simultaneously the multiple more clubs that we have designed there are certain technology labs are there we're gonna make you prepare for your troubleshooting and then we gonna create yourself and in this issue what is the self analysis sheet we're gonna talk much more in detail in the future lectures so once your table of content is done if I will move further it and go and talk about this what I generally say that if I meant in that particular thing is your name generation firewall so methods what we going to talk about the name generation firewall so we gonna start a glimpse from five dot X and then six dot X which is there with respect to the CCI laughs once these two models has been done we gonna move further it right and we gonna talk about the manager which is called as FM see different terminologies I'll say and write it over here different terminologies we gotta top it about here right maybe have the sensors are there with respect to the next-generation firewall what are the different senses like ng IPs we have FTD and we have a sa with x-series fire-pot services over there so we gonna talk about all the senses we cannot talk about the manager much more in detail which is nothing but giving us the GUI a centralized management platform from where you can configure different different devices more or less nothing but we call them as a sensor once being registered and configured from this managing tool we are going to push the policies on these particular senses so we going to talk about all this once this registration process has been done we're going to move further ed and we talk when you talk about the FMC GUI and makes the nation firewall it's all about the policies so we gonna see a different different policies like access policies yes we gonna talk on that which is very important we gonna talk about SSL policies we're going to talk about the intrusion prevention policies Prevention's policies we gonna talk about after that here security intelligence how to protect your layer seven over there right whatever the different kind of policies are there creation of the objects rules how to prepare the rules over there different kinds of rules how to deploy them and in the last life of a bucket when I say life pocket one I mean mother life of packet means whenever and so we can't talk about life of a packet for a year ASA firewall as well as your next-generation firewall so what I mean by that if a firewall is present like your AC power wall is there if ingress interface and there is a night egress interface if a packet gets here to this spiral what the AC power wall engine is going to do with that particular packet so that comes basically in the Lightfoot pack like first it is going to hit the Nats then after not after the translation we are going to hit to the ACS that blah blah rules the routing and then in a very same way what happens if a next-generation firewall is there if any packet comes inside that firewall next generation firewall what are the policies it is going to it what are the snot rules that is going to be hit over there you're gonna talk on all this so in this generally gonna take one B so in this wake the total curriculum goes for two weeks plus - I'll take five days can be completed early also if the number of questions are less I can't be taken five days more than that so this is all about your theory I'll try to lecture you on all the aspects from the participant poverty of the security I'll try to tell you what are the blocks that we need to read it over here and so in so put saying this you have taken a Cisco certification cause on the course that we are opted over here is CCI security I've already told you one thing that we are not going to bore in a fashion of like CCNA security and then ccnp security and the CCI we have actually taken what the end-to-end module so I've already told you end-to-end modulus more or like your product base training so first week is basic security I've already told you right and then you're gonna talk about the firewalls then we're gonna talked about the VPNs then we're gonna talk about what the eyes and the last the basic modules over there the miscellaneous topics that I've already told how do you get your CCI certification over there it's a there are two Holden's over there first orderly I join recall as a return examination right you can give and write your written examination any of the fierson location will be present in your city you just need to google it out right basically the exam is for you to us depending on the day you can get your ninth equations of 310 or maybe hundreds depending so there is a variation on top of this no documentation is not an open book examination right and you cannot go back once you have submitted your answers your scorecard will be given to you immediately and within 18 months if you get past you will move towards for the practical exams which is nothing but you laugh there are certain selected Cisco location which is prism world white there's a particular slide I can tell you over there what are the different locations offers it is basically a TAS lab in which the three sections are their configuration troubleshooting as well as diagnostic it is an open book examination documents are there you can open it right so it's not like you have a basic of a book you can get into the lab and you can open it no it's not like that it is a way there is a way to open that particular document and score depends sometimes comes in four or sometimes is usually takes 48 hours also once you crack both the hurdles both that exams written as well as practical exam you can expect your five digit magical number which is nothing but your C's here and the very same thing is with respect to the CCD also that's why we rotate this particular slide now giving an in overview on the written examination so I've already told it's available at any of the Pearson VUE testing facility the cost may vary due to the GST as well as bath if you are from India you have a broad depending on your rates it can move further away it's a two hours exam with multiple choice questions we generally call MCQs no outside references there pacified result is immediately candidate who passed the CCI return must go for the lab within 180 days you can't skip the question functionality on top of that the goal of the secure security return in the exam is to test concept and the theoretical knowledge of your security CCA blueprint now awareness of the industry standard best practice start reading the standard bodies read the RFC and the blogs over there you can directly go to the wwe.com for the training events and the training certification examples over there from where you can easily check out what are the things and the materials that we need to eat are talking about CCS security lab I said that the lab is basically divided into three major portions one is called so as soon as you gonna hit to the lab you are going to hit what the troubleshooting now troubleshooting is basically all about your virtual devices there I can see that none of the devices over there and the troubleshooting is the physical device all the devices are you virtual devices over there when I say about the virtual devices what I mean by that you get the concern none of the devices the physical one and this troubleshooting is for you to us if you buy any XYZ reason couldn't make that and to us you can borrow your time from the contribution see the total is to us for the troubleshooting one our is the diagnostic and fires for your configuration so total is is equals to e times but if you're not able to finish your troubleshooting in to us you can borrow your maximum 30 minutes from your configuration you can't do anything with the diagnostic so you can borrows a certain like max for max 30 minutes so the remaining time now here left is for us 30 minutes and here we got with what towards 30 minutes if you do the total still their answer is a dot on the vice versa if I finish to be below like before to us what I gonna do that if you finish in one and a half hour let's say for example then that 30 minutes will be added over here so it becomes fires 30 minutes over there so more or less it's still a task so you need to prepare yourself in such a way first you for the troubleshooting the basic tips that we generally give is do as much as configuration you can read all the documents read all the troubleshooting guides which is available for all the products that we have we do have in this particular character we have CCI lob locations over there you can see that Brussels Dubai bangaluru Hong Kong Beijing Tokyo Sydney San Jose and RT depending on where you are staying geolocation you can choose your own centers and the pre popping is very highly going on right now with respect to the CCI security so whatever the location you choose choose it wisely now for the tips that I can give before starting study in preparation tips let's understand that be ready for this I've seen most of the time in my career that the people start Paul CCI and they are very happy but down the line moving towards the CCI level at gonna go like this and generally I say one more thing over there in my four years of an experience I have seen that whenever the students are the candidates who are appearing for the seats yeah they are very excited in first week and this turdy graph goes like this with respect to the arts back in the day they are reading for eight hours or ten dollars continue continuously inside of this and then keep on reading keep on reading and then gradually this graphs goes like this also I've seen that most of the candidate what I generally say this to everyone is don't I don't want you to study for like eight hours in a day make a constant line less number of us but make it constant I generally say that go for a one our maximum in your daily basis whatever we are going to read whatever the video is you'll get it whatever those online lectures that you gotta take it over here one hour is more than enough for that you don't have to give more than one hour because you must be working over there you have your own family you have everything with you don't overburden in the start gradually increase the pace gradually increase the pace don't directly go from here to on the peak level take your time Saturdays and this you can read like three to four us not more than that start exploring the things start reading the new things so be ready for this get support from the family which is very important aspect also most of you will be working professional right for next two to three months or four months I'll say that these don't attend any of the meeting of marriages of the meetings the marriages try to skip your work all not your tools and the travels so that you can save your time and most important get support your family because it's not an easy go right I've been into this business for quite a long time I itself got quite off the cci numbers you need use family support trust me don't trust the rumours the only blonde single point of contact should be in the ditch Sharma me or a team over there in the net Patrick because there are so many other candidates who spread the numbers so don't trust on the rumors until unless it is coming from our end don't make it official over there GPS is your success carry of the lab exam goals create the goals planet and user achievement success now generally we have seen over here when you have any candidate or the person is preparing for the CCI they comes with the long term plans I'll suggest you instead of going for the long term plans go for a short term make your short-term plans first like for Abby what we are going to see let's say for example for first week I am going to talk about layer 7 all right let me read about the layers or like the protocols called as an HTTPS or HTTP dns dhcp different protocols on it lets me let me become habitual and and familiar with the layer 7 protocols why I'm saying about the layers and protocol there is a quite a reason Paula nowadays all the attackers they are not coming from layer 3 or layer four it is very secure most of the hackers which is coming in your production and doing attacks over there or man and module attacks most from the thing is usually going to happen with respect to your layer itself so do make sure that whenever you are preparing for the interview slay seven is very important aspect with respect to the security as well as with respect to your origin so many protocols be generally overrule them right we most of the time keep on focusing your tcp/ip or like routing protocols which is running at layer 3 but be generally but we don't get that interest on the layer 7 but I'll say that now please come to the layer 7 protocol which is very important with respect to the interviews nowadays start saving your time it's up to you guys how you save your time those who are travelling of daily basis you can save your time you can use your smart phones right you can download your PDF over there whenever you've got the time you are there in the cafeterias try to read it relax your brain also I'm not saying that continuously keep on reading but as much as you can save your time it will be better for you because you have opted for a certification which is is level in the IT certification find a best-practice lab the labs are there with us you can prepare that the labs over here nobody's into that or what I'm generally trying to say that I've seen that most of the time whenever they stood under the expirence opted for the CCIE any of the CCI they try to take the laptops like huge one like 16gb ROM 2tb hard disks and blah blah blah and they invest were around about some few dollars on the trophies over there instead of that I'll suggest I usually suggest that and people are doing that in a very low cost you can hire or rent a server right and on top of that particular server you can deploy the virtual machines now to be very honest the lab or the CCI is this time with version 5 you're 80% lab can be done on the VM sits as a VM and you could apply everything on your servers so instead of buying a brand-new laptop only with the 16gb you can go till 128 GB of RAM server you can go with 2 TB of hard disks you can go with one or two NIC adapter over there as well as you can go with that like CPU whatever the xeon xeon processor is the good one this is what I'm having so you can rent it also they know where it's right because it is going to save a lot of money because you don't have to do the practice for a month or two or three so in the last when you are preparing for CCI also you want to do certain R&D you want to make your own designs your own topology most welcome go ahead buy instead of buying do the rental because over here we have already have our own more claps different more clouds are there so here you can't do your armies for your are entities I generally say that deploy on by our sorry Trent a particular server all that understanding is the key what I mean by that don't try to mark any of the thing over here in security because security when we talk about is the CCI security or any of the security certification people have hope from you or people generally talk about ok boss this is the security specialist so if you have marked in your life it is not going to give you a poly for the same please try to understand each and every concept try to learn the packet flow of the topics try to learn the things don't try to mug the things and understanding is the very important once you are there in the lab what needs to be done it's a eight hour lab don't try to stress yourself because it's your biggest enemy see in my career I've attempted so many times for the CCI I'll be very honest if tomorrow also if I'll go for my CCI lab if a normal four channel is not coming up still my hands will start shipping it's not about the money yes it's due for most of us but it's it's the matter of how many months you have invested in this particular track everything comes around in your front of your head and you start getting panicking you get into a stress mode so it's okay if something is not hitting in the lab in one shot it's okay give five minutes troubleshooting if still it doesn't work over there I generally give out the recommendation to everyone please move further and do rest of the questions whatever you get it over there come back to the very same question which you have left over there with the fresh mind you might possible you can get a solution for the very same thing be confident in your knowledge whatever the you have learnt it try to do try to deploy that try to implement whatever you have learnt in next three or four months in you with respect to your preparation right don't do rnd there that is my point over here you are not there to make your friends focus what you got so you'll get two monitors over there one monitor to see or whatever the questions will be there and whatever the topology will be there and another one you will get it to do the configuration I'm telling this I have already opted position once it is being done you are not there to help others don't try to help others over there you are not there to make a friends over there guys just be concentrate on your the lab is huge right so CCI lab is not a easy ones it's not piece of cake you have to invest your time over there eight are sitting on the same bench rights concentration is very you don't have to see here and then help your friends out there use your lunch wisely right there will be around about 15 to 20 minutes of break depending on which Center you have taken over there and when you are using your lunch we try to calm yourself with that particular moment of time don't oh burden at the time of heating that's what my what I call that suggestion will be there for you guys after that understand the questions please understand the question don't be in the hurry tuitions are very important for us because you need to give an answer for that question only right so be don't be in hurry understand what's this who is trying to ask you with respected occasion don't be in a hurry slow is better than fast now why I meant but this most of the time in my career I've seen that the people are in hurry to finish the lab right don't don't do that Holle it matters right because if you are trying to finish a lab in seminars and I let's say for example Bob is there who is completing is lab in seminars and over here nothing is taking they exactly at as time over there both are going to give get a five-digit CCI number but the person who is trying to do it very very fast over there right there is my chance as a human human errors can offer over there you take your precise time you check each and every question so once the equation and the ticket you have solved it try to go and check with each and every show commands because the show commands are the only things by which you can save your lab to be very honest take your time you don't be in that hurry don't be that too slow also but you take your time choose your time wisely over there and then move further so this is the introduction this is how to prepare your labs and each and everything once this introduction is finished we're going to start with the CCA security contact one of the content that we have already discussed so this has been five domains there are different different things this is from the Cisco's blueprint you can see that this is all about your AC power was the first thing perimeter security and intrusion prevention that's consists of a next-generation firewalls also advanced in its production and contented the content security this is all about your email security web security as the lives your advanced malware protections and so and so forth this is all about the VPN the third section your secure connectivity and the segmentation fourth one is all about the ice one fifth one is all about like your NTP ease your DHCP is your DNS your HTTP your admission related things over there your our bags your W LCC is as well as you say SLOC servers your net flow net con for everything will be done it over here in domain number five these are the virtual machine this is what I told early we have certain devices and the version I have written it over there so when you have taken or taken a rental for your already so this rental of the service which I'm trying to say is it's not mandatory we have the full fledge four or five acts with us you can work on that Mach labs are there everything is designed for every aspect we have two or three different more clubs that we have already designed still if you want to do rnd there are certain guys are they who want to make their production look similar kind of a thing on the new type of a topology they want to merge different products all together then at that particular movement this is an option for you it's sweet simple one so we do have ice with 2.1 version over here you can see about that right we do have your acs also there WL say these are the current versions and the products and these all are what the virtual machines clearly see Doria these all are the virtual machines which is present overhead so WLC email security web security eyes your FM see your ng IPS FTD's your eyes virtual layer 2 layer 3 CS are out a thousand v we have a say B over there you have Windows PC test this is also be an Active Directory Windows Server 2008 cisco epic enterprise model they have included it also over here unified see you cm for the registration of the IP Phone fire ramp and the ID correct there are certain devices which is with respect to your hardware you have 3850 with the oil in 16.2 you have the AC firewall with 15 dot X now what happens is this particular model is already end of life as well as end of say so the replacement if you are trying to build your own tracks or something like this you can eventually go with 55 15 X its operated one which is easily available in the market no difference eventually this is the better than 12 eggs over there so he can go on off this trying to have it your wireless control errors this is your access point and you have 79-65 what you call that IP phone with the merchant minder true so this is all about your CCI security journey right what are the topics table of contents how we gonna prepare what are the lab preparation tips are given what are the devices we do have so in the next video we're gonna start our journey with respect to the CCI security I hope you enjoyed this video thank you very much they will see in the next video [Music]
Info
Channel: Netmetric Solutions
Views: 9,600
Rating: 4.8933334 out of 5
Keywords: CCIE Security, CCIE, CCIE Security Training, Cisco Training, Cisco CCIE training, Cisco CCIE, CCIE Certification, CCIE Security v5
Id: HuSFNwA-SRM
Channel Id: undefined
Length: 40min 37sec (2437 seconds)
Published: Fri Jun 22 2018
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.