Network Security Technologies
Cisco Secure Firewall ASA Deployment
Cisco Secure Firewall Threat Defense Basics
Cisco Cisco Secure Firewall Threat Defense IPS, Malware and File Policies
Cisco Secure Email Gateway Basics
Cisco Secure Email Policy Configuration
Cisco Secure Web Appliance Deployment
VPN Technologies and Cryptography Concepts
Cisco Secure Site-to-Site VPN Solutions
Cisco IOS VTI-Based Point-to-Point IPsec VPNs
Point-to-Point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
Cisco Secure Remote Access VPN Solutions
Remote Access SSL VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
Describing Information Security Concepts (Self-Study)
Describe Common TCP/IP Attacks (Self-Study)
Describe Common Network Application Attacks (Self-Study)
Common Endpoint Attacks (Self-Study)
Cisco Umbrella Deployment (Self-Study)
Endpoint Security Technologies (Self-Study)
Cisco Secure Endpoint (Self-study)
Cisco Secure Network Access Solutions (Self-study)
Describing 802.1X Authentication (Self-study)
Configuring 802.1X Authentication (Self-study)
Network Infrastructure Protection (Self-Study)
Control Plane Security Controls (Self-Study)
Layer 2 Data Plane Security Controls (Self-Study)
Layer 3 Data Plane Security Controls (Self-Study)
Management Plane Security Controls (Self-Study)
Traffic Telemetry Methods (Self-Study)
Cisco Secure Network Analytics Deployment (Self-Study)
Cloud Computing and Cloud Security (Self-Study)
Cloud Security (Self-Study)
Cisco Secure Cloud Analytics Deployment (Self-Study)
Software-Defined Networking (Self-Study)
Labs