CCIE Security Written Exam Blueprint

Table I-1 lists the CCIE Security written exam blueprint topics and the corresponding chapters where you can find the material covered in this book. As you can see, the blueprint places the objectives into eight categories. The book covers all of these topics. This blueprint is a guideline for the type of content that is likely to appear on the exam. You can also find it at http://www.cisco.com/en/US/learning/le3/ccie/secu-rity/wr_exam_blueprint.html.

ID

Topic Area

Chapter Covering the Topic

I. Security Protocols

A.

Remote Authentication Dial-In User Service (RADIUS)

Chapter 4

B.

Terminal Access Controller Access Control System Plus (TACACS+)

Chapter 4

C.

AES

Chapter 4

D.

EAP, PEAP, TKIP, TLS

Chapter 4

E.

Data Encryption Standard (DES)

Chapter 4

F.

Triple DES (DES3)

Chapter 4

G.

IP Secure (IPSec)

Chapter 4

H.

Internet Key Exchange (IKE)

Chapter 4

I.

Certificate Enrollment Protocol (CEP)

Chapter 4

ID

Topic Area

Chapter Covering the Topic

J.

Point-to-Point Tunneling Protocol (PPTP)

Chapter 4

K.

Layer 2 Tunneling Protocol (L2TP)

Chapter 4

II. Application Protocols

A.

Domain Name System (DNS)

Chapter 2

B.

Trivial File Transfer Protocol (TFTP)

Chapter 2

C.

File Transfer Protocol (FTP)

Chapter 2

D.

Hypertext Transfer Protocol (HTTP)

Chapter 2

E.

Secure Sockets Layer (SSL)

Chapter 2

F.

Simple Mail Transfer Protocol (SMTP)

Chapter 2

G.

Network Time Protocol (NTP)

Chapter 2

H.

IOS SSH

Chapter 2

I.

Lightweight Directory Access Protocol (LDAP)

Chapter 2

J.

Active Directory

Chapter 2

K.

Remote Data Exchange Protocol (RDEP)

Chapter 2

III. General Networking

A.

Networking Basics

Chapter 1

B.

TCP/IP

Chapter 1

C.

Switching and Bridging (including: VLANs, Spanning Tree, etc.)

Chapter 1

ID

Topic Area

Chapter Covering the Topic

D.

Routed Protocols

Chapter 1

E.

Routing Protocols (including: RIP, EIGRP, OSPF, BGP)

Chapter 1

F.

Point-to-Point Protocol (PPP)

Chapter 1

G.

IP Multicast

Chapter 1

H.

Integrated Services Digital Network (ISDN)

Chapter 1

I.

Async

Chapter 1

J.

Access Devices (for example, Cisco AS 5300 series)

Chapter 1

K.

Telephony Best Practices

Chapter 1

L.

Wireless Best Practices

Chapter 1

IV. Security Technologies

A.

Concepts - Security Best Practices

Chapter 6

B.

Packet Filtering

Chapter 6

C.

PIX and IOS Authentication Proxies

Chapter 6

D.

Port Address Translation (PAT)

Chapter 6

E.

Network Address Translation (NAT)

Chapter 6

F.

Firewalls

Chapter 6

G.

Content Filters

Chapter 6

H.

Public Key Infrastructure (PKI)

Chapter 6

I.

Authentication Technologies

Chapter 6

J.

Authorization Technologies

Chapter 6

K.

Virtual Private Networks (VPNs)

Chapter 6

L.

Network IDS: Anomaly, Signature, Passive, Inline

Chapter 6

M.

Host Intrusion Prevention

Chapter 6

N.

Cisco Threat Response

Chapter 6

V. Cisco Security Applications

A.

Cisco Secure NT

Chapter 5

B.

Cisco Secure PIX Firewall

Chapter 6

C.

VMS

Chapter 5

D.

Cisco Secure Intrusion Detection System (formerly NetRanger)

Chapter 5

ID

Topic Area

Chapter Covering the Topic

E.

IOS Firewall Feature Set

Chapter 6

F.

VPN 3000

Chapter 5

G.

Client-Side VPN

Chapter 5

H.

CAT Service Modules

Chapter 5

I.

IOS IDS (in line)

Chapter 5

J.

Cisco Secure ACS

Chapter 5

K.

Security Information Monitoring System (event correlation, basic forensics)

Chapter 5

VI. Security General

A.

Policies - Security Policy Best Practices

Chapter 7

B.

Standards Bodies - IETF

Chapter 7

C.

Vulnerability Discussions

Chapter 7

D.

Attacks and Common Exploits - recon, priv escalation, penetration, cleanup, backdoor

Chapter 7

VII. Cisco General

A.

IOS specifics

Chapter 3

B.

Routing and Switching Security Features: IE MAC Address Controls, Port Security, DHCP Snoop

Chapter 3

C.

Security Policy Best Practices

Chapter 3

*Note from Cisco.com: The Security written exam (350-018) went into production in all testing locations on June 1, 2004. The exam has 100 multiple-choice questions and is two hours in duration. The topic areas listed are general guidelines for the type of content that is likely to appear on the exam. Please note, however, that other relevant or related topic areas may also appear. Italicized bold type indicates topic areas changed from the previous Security exam (prior to June 1, 2004) and strengthens coverage of highly-secure enterprise networks.

0 0

Post a comment