NW
NW NW
Networldz
Networldz
Instant Messengers. Networldz99@yahoo.com Networldz99@hotmail.com Networldz99@gmail.com
NW NW
NW
NW
  HYDERABAD
+91-9000544423
+9140 - 40045060
NW
  BANGALORE
Email : info@networldz.com
nw
CCNA TRAINING INDIA,CCNA TRAINING BANGLORE,CCNA TRAINING HYDERABAD,CCNA TRAINING CHENNAI,CCNA TRAINING BOMBAY,CCNA TRAINING  DELHI,CCNP TRAINING INDIA,CCSP TRAINING INDIA,CCVP TRAINING INDIA,CCVP TRAINING BANGLORE,CCVP TRAINING HYDERABAD,CCVP TRAINING  CHENNAI,CCVP TRAINING  BOMBAY,CCVP TRAINING DELHI,IPCC TRAINING INDIA,IPCC ENTERPRISE TRAINING INDIA,IPCC TRAINING BANGLORE,IPCC TRAINING HYDERABAD.IPCC TRAINING DUBAI,CCVP TRAINING RIYAD,CCVP TRAINING OMAN,CCSP TRAINING OMAN,CCIP TRAINING HYDERABAD,CVPI TRAINING OMAN,CVPI TRAINING BANGLORE,CCNA VOICE TRAINING INDIA,CCNA VOICE TRAINING HYDERABAD,VOICE TRAINING INDIA,VOICE TRAINING BANGLORE,VOICE TRAINING DUBAI,VOICE TRAINING RIYAD,CISCO CERTIFICATION TRAINING,INDIA,VOCIE TRAINING OMANSECURITY TRAINING BANGLORE,SECURITY TRAINING HYDERABAD,SECURITY TRAINING INDIA,CCVP TRAINING  LONDON,CCIE VOCIE TRAINING INDIA,BEST CCIE VOICE TRAINING INDIA,GOOD CCIE VOICE TRAINING INDIA,CCIE SECURITY TRAINING INDIA,CCIE VOICE TRAINING BANGLORE,CCIE VOICE TRAINING HYDERABAD,CISCO ICM TRAINING INDIA,ICM TRAINING BANGLORE,ICM TRAINING HYDERABAD.UNITY TRAINING INDIA,UNITY TRAINING BANGLORE.
 
NW NW NW
NW
NW
NW
 
 
News@ CISCO
 
 
More news
 
 
Examination Info.
 
readmore
 
CISCO Training Course Details
 
 
SSSE v3.0 - Security Solutions for System Engineers
 
Duration:

Description

 

The Security Solutions for System Engineers (SSSE) v3.0 course is recommended for system engineers, network designers, and security professionals designing security solutions in enterprise environments. The course provides an introduction to security design best practices for both host- and network-centric security controls. The course includes a systematic overview of modern threats, controls, and defensive architectures for a variety of common business scenarios, and enables the learner to choose the optimal architecture and Cisco products to satisfy business risk management requirements. The course also includes practice labs, which demonstrate the application of security technologies used in the case studies within the course.

Objectives

  • Recognize modern threats to enterprise business processes
  • Recognize modern security controls
  • Choose appropriate controls for specific threats and environments
  • Apply basic security design guidelines
  • Recognize basic customer requirements and environment limitations, and build an optimal solution based on them
  • Position Cisco security products in basic customer scenarios

Prerequisites

  • Basic network design concepts (can be obtained attending the Designing for Cisco Internetwork Solutions [DESGN] course)
  • Intermediate user-level operating system concepts, especially for Microsoft Windows

Who Should Attend

  • System engineers, network designers, and security professionals designing security solutions in enterprise environments
 
Course Outline
 
  • Module 1: The Threat Landscape and Goals of Security Engineering
    • Lesson 1: General Principles
    • Lesson 2: Physical Attacks
    • Lesson 3: Network Infrastructure Attacks
    • Lesson 4: System and Application Attacks
    • Lesson 5: User Attacks
  • Module 2: Overview of Security Controls
    • Lesson 1: Organizational Controls
    • Lesson 2: Types of Controls
    • Lesson 3: Security Engineering Principles
    • Lesson 4: Distribution of Controls Between Network and Endpoints
    • Lesson 5: Cryptographic Services
    • Lesson 6: Authentication and Identity Management
    • Lesson 7: Network Controls
    • Lesson 8: System Controls
    • Lesson 9: Application Controls
  • Module 3: Network Infrastructure Protection Solutions
    • Lesson 1: Overview of Threats, Controls, and Specific Customer Requirements
    • Lesson 2: Architectures and Design Guidelines
    • Lesson 3: Case Studies
  • Module 4: Enterprise Internet Access Solutions
    • Lesson 1: Overview of Threats, Controls, and Specific Customer Requirements
    • Lesson 2: Architectures and Design Guidelines
    • Lesson 3: Case Studies
  • Module 5: Solutions for Exposed Enterprise Services and Data Centers
    • Lesson 1: Overview of Threats, Controls, and Specific Customer Requirements
    • Lesson 2: Architectures and Design Guidelines
    • Lesson 3: Case Studies
  • Module 6: Unified Communications Protection Solutions
    • Lesson 1: Overview of Threats, Controls, and Specific Customer Requirements
    • Lesson 2: Architectures and Design Guidelines
    • Lesson 3: Case Studies
  • Module 7: Secure WAN Solutions
    • Lesson 1: Overview of Threats, Controls, and Specific Customer Requirements
    • Lesson 2: Architectures and Design Guidelines
    • Lesson 3: Case Studies
  • Module 8: Secure Remote Access Solutions
    • Lesson 1: Overview of Threats, Controls, and Specific Customer Requirements
    • Lesson 2: Architectures and Design Guidelines
    • Lesson 3: Case Studies
  • Module 9: Enterprise Wireless Security Solutions
    • Lesson 1: Overview of Threats, Controls, and Specific Customer Requirements
    • Lesson 2: Architectures and Design Guidelines
    • Lesson 3: Case Studies
  • Module 10: Enterprise Security Management Solutions
    • Lesson 1: Overview of Specific Customer Requirements
    • Lesson 2: Architectures and Design Guidelines
    • Lesson 3: Case Studies
 
 
 
Back Top
NW
NW
NW
NW NW NW
 
NW
NW