CCIE SECURITY TRACK-Written Exam Blueprint v2.0

王朝other·作者佚名  2008-05-31
宽屏版  字体: |||超大  

Written Exam Blueprint v2.0

The Security written exam (350-018) has 100 multiple-choice questions and is two hours in duration. The topic areas listed are general guidelines for the type of content that is likely to appear on the exam effective January 2, 2007. Please note, however, that other relevant or related topic areas may also appear. Candidates prior to January 2 should continue using the prior blueprints (now known as v1.0).

General Networking

Networking Basics

OSI Layers

TCP/IP Protocols

Switching (VTP, VLANs, Spanning Tree, Trunking, etc.)

Routing Protocols (RIP, EIGRP, OSPF, and BGP)

IP Multicast

Security Protocols, Ciphers and Hash Algorithms

RADIUS

TACACS+

Ciphers RSA, DSS, RC4

Message Digest 5 (MD5)

Secure Hash Algorithm (SHA)

EAP PEAP TKIP TLS

Data Encryption Standard (DES)

Triple DES (3DES)

Advanced Encryption Standard (AES)

IP Security (IPSec)

Authentication Header (AH)

Encapsulating Security Payload (ESP)

Internet Key Exchange (IKE)

Certificate Enrollment Protocol (CEP)

Transport Layer Security (TLS)

Secure Socket Layer (SSL)

Point to Point Tunneling Protocol (PPTP)

Layer 2 Tunneling Protocol (L2TP)

Generic Route Encapsulation (GRE)

Secure Shell (SSH)

Pretty Good Privacy (PGP)

Application Protocols

Hypertext Transfer Protocol (HTTP)

Simple Mail Transfer Protocol (SMTP)

File Transfer Protocol (FTP)

Domain Name System (DNS)

Trivial File Transfer Protocol (TFTP)

Network Time Protocol (NTP)

Lightweight Directory Access Protocol (LDAP)

Syslog

Security Technologies

Packet Filtering

Content Filtering

URL Filtering

Authentication Technologies

Authorization technologies

Proxy Authentication

Public Key InfrastrUCture (PKI)

IPSec VPN

SSL VPN

Network Intrusion Prevention Systems

Host Intrusion Prevention Systems

Event Correlation

Adaptive Threat Defense (ATD)

Network Admission Control (NAC)

802.1x

Endpoint Security

Network Address Translation

Cisco Security Appliances and Applications

Cisco Secure PIX Firewall

Cisco Intrusion Prevention System (IPS)

Cisco VPN 3000 Series Concentrators

Cisco EzVPN Software and Hardware Clients

Cisco Adaptive Security Appliance (ASA) Firewall

Cisco Security Monitoring, Analysis and Response System (MARS)

Cisco IOS Firewall

Cisco IOS Intrusion Prevention System

Cisco IOS IPSec VPN

Cisco IOS Trust and Identity

Cisco Secure ACS for Windows

Cisco Secure ACS Solution Engine

Cisco Traffic Anomaly Detectors

Cisco Guard DDoS Mitigation Appliance

Cisco Catalyst 6500 Series Security Modules (FWSM, IDSM, VPNSM, WebVPN, SSL modules)

Cisco Traffic Anomaly Detector Module & Cisco Guard Service Module

Cisco Security Management

Cisco Adaptive Security Device Manager (ASDM)

Cisco Router & Security Device Manager (SDM)

Cisco Security Manager (CSM)

Cisco Security General

IOS Specifics

Routing and Switching Security Features: IP & MAC Spoofing, MAC Address Controls, Port Security, DHCP Snoop, DNS Spoof.

NetFlow

Layer 2 Security Features

Layer 3 Security Features

Wireless Security

IPv6 Security

Security Solutions

Network Attack Mitigation

Virus and Worms Outbreaks

Theft of Information

DoS/DDoS Attacks

Web Server & Web Application Security

Security General

Policies - Security Policy Best Practices

Information Security Standards (ISO 17799, ISO 27001, BS7799)

Standards Bodies

Common RFCs (e.g. RFC1918, RFC2827, RFC2401)

BCP 38

Attacks, Vulnerabilities and Common EXPloits - recon, scan, priv escalation, penetration, cleanup, backdoor

Security Audit & Validation

Risk Assessment

Change Management Process

Incident Response Framework

Computer Security Forensics

 
 
 
免责声明:本文为网络用户发布,其观点仅代表作者个人观点,与本站无关,本站仅提供信息存储服务。文中陈述内容未经本站证实,其真实性、完整性、及时性本站不作任何保证或承诺,请读者仅作参考,并请自行核实相关内容。
© 2005- 王朝网络 版权所有