CCNP SECURITY

Cisco Certified Network Professional Security (CCNP Security) certification program is aligned specifically to the job role of the Cisco Network Security Engineer responsible for Security in Routers, Switches, Networking devices and appliances, as well as choosing, deploying, supporting and troubleshooting Firewalls, VPNS, and IDS/IPS solutions for their networking environments.

Training

The best way to prepare for this certification is to take the Cisco-approved training:

Implementing Cisco Secure Access Solutions (SISAS)

This five-day course prepares network security engineers with the skills and knowledge needed to deploy the Cisco Identity Services Engine (ISE) and 802.1X secure network access and to implement and manage network access security by using the Cisco ISE appliance product solution.

Implementing Cisco Edge Network Security Solutions (SENSS)

This five-day course prepares network security engineers with the skills and knowledge needed to configure Cisco perimeter edge security solutions utilizing Cisco switches, Cisco routers, and Cisco Adaptive Security Appliance (ASA) firewalls and to implement and manage security on Cisco ASA firewalls, Cisco routers with the firewall feature set, and Cisco switches.

Implementing Cisco Secure Mobility Solutions (SIMOS)

This five-day course prepares network security engineers with the knowledge and skills needed to protect data traversing a public or shared infrastructure such as the Internet by implementing and maintaining Cisco VPN solutions and troubleshooting remote-access and site-to-site VPN solutions, using Cisco ASA adaptive security appliances and Cisco IOS routers.

Implementing Cisco Threat Control Solutions (SITCS)

This five-day course prepares network security engineers with the knowledge and skills to implement Ciscos FirePOWER Next-Generation IPS, AMP, as well as Web Security, Email Security and Cloud Web Security. You will gain hands-on experience with configuring various advance Cisco security solutions for mitigating outside threats and securing traffic traversing the firewall.

TOP