CCIE security written exam blueprint

General Networking
Networking Basics
OSI Layers
TCP/IP Protocols
Switching (VTP, VLANs, Spanning Tree, Trunking, etc.)
Routing Protocols (RIP, EIGRP, OSPF, and BGP)
IP Multicast

Security Protocols, Ciphers and Hash Algorithms
RADIUS
TACACS+
Ciphers RSA, DSS, RC4
Message Digest 5 (MD5)
Secure Hash Algorithm (SHA)
EAP PEAP TKIP TLS
Data Encryption Standard (DES)
Triple DES (3DES)
Advanced Encryption Standard (AES)
IP Security (IPSec)
Authentication Header (AH)
Encapsulating Security Payload (ESP)
Internet Key Exchange (IKE)
Certificate Enrollment Protocol (CEP)
Transport Layer Security (TLS)
Secure Socket Layer (SSL)
Point to Point Tunneling Protocol (PPTP)
Layer 2 Tunneling Protocol (L2TP)
Generic Route Encapsulation (GRE)
Secure Shell (SSH)
Pretty Good Privacy (PGP)

Application Protocols
Hypertext Transfer Protocol (HTTP)
Simple Mail Transfer Protocol (SMTP)
File Transfer Protocol (FTP)
Domain Name System (DNS)
Trivial File Transfer Protocol (TFTP)
Network Time Protocol (NTP)
Lightweight Directory Access Protocol (LDAP)
Syslog

Security Technologies
Packet Filtering
Content Filtering
URL Filtering
Authentication Technologies
Authorization technologies
Proxy Authentication
Public Key Infrastructure (PKI)
IPSec VPN
SSL VPN
Network Intrusion Prevention Systems
Host Intrusion Prevention Systems
Event Correlation
Adaptive Threat Defense (ATD)
Network Admission Control (NAC)
802.1x
Endpoint Security
Network Address Translation

Cisco Security Appliances and Applications
Cisco Secure PIX Firewall
Cisco Intrusion Prevention System (IPS)
Cisco VPN 3000 Series Concentrators
Cisco EzVPN Software and Hardware Clients
Cisco Adaptive Security Appliance (ASA) Firewall
Cisco Security Monitoring, Analysis and Response System (MARS)
Cisco IOS Firewall
Cisco IOS Intrusion Prevention System
Cisco IOS IPSec VPN
Cisco IOS Trust and Identity
Cisco Secure ACS for Windows
Cisco Secure ACS Solution Engine
Cisco Traffic Anomaly Detectors
Cisco Guard DDoS Mitigation Appliance
Cisco Catalyst 6500 Series Security Modules (FWSM, IDSM, VPNSM, WebVPN, SSL modules)
Cisco Traffic Anomaly Detector Module & Cisco Guard Service Module

Cisco Security Management
Cisco Adaptive Security Device Manager (ASDM)
Cisco Router & Security Device Manager (SDM)
Cisco Security Manager (CSM)

Cisco Security General
IOS Specifics
Routing and Switching Security Features: IP & MAC Spoofing, MAC Address Controls, Port Security, DHCP Snoop, DNS Spoof.
NetFlow
Layer 2 Security Features
Layer 3 Security Features
Wireless Security
IPv6 Security

Security Solutions
Network Attack Mitigation
Virus and Worms Outbreaks
Theft of Information
DoS/DDoS Attacks
Web Server & Web Application Security

Security General
Policies – Security Policy Best Practices
Information Security Standards (ISO 17799, ISO 27001, BS7799)
Standards Bodies
Common RFCs (e.g. RFC1918, RFC2827, RFC2401)
BCP 38
Attacks, Vulnerabilities and Common Exploits – recon, scan, priv escalation, penetration, cleanup, backdoor
Security Audit & Validation
Risk Assessment
Change Management Process
Incident Response Framework
Computer Security Forensics

Leave a Reply