设为首页收藏本站language 语言切换
查看: 1735|回复: 0
收起左侧

SANNET—CCIE安全笔试大纲

[复制链接]
发表于 2013-9-6 17:21:13 | 显示全部楼层 |阅读模式
CCIE Security Written Blueprint
1.00Infrastructure, Connectivity, Communications, Network Security
1.1Network Addressing Basics
1.2OSI Layers
1.3TCP/UDP/IP
1.4LAN Switching (e.g. VTP, VLANs, Spanning Tree, Trunking)
1.5Routing Protocols (RIP, EIGRP, OSPF, and BGP)
(a) Basic Functions/Characteristics
(b) Security Features
1.6Tunneling Protocols
(a) GRE
(b) NHRP
(c) v6 Tunnel Types
1.7IP Multicast
(a) PIM
(b) Multi Srvc Disc Protocol [Multiservice Discovery Protocol?]
(c) IGMP/CGMP
(d) Multicast Listener Discovery
1.8Wireless
(a) SSID
(b) Authentication/Authorization
(c) Rogue Apps
(d) Session Establishment
1.9Authentication/Authorization Technologies
(a) Single Sign-On
(b) OTPs
(c)LDAP/AD
(d) Role-Based Access Control (RBAC)
1.10VPNs
(a) Layer 2 versus Layer 3
(b) MPLS/VRFs/Tag switching
1.11Mobile IP Networks
2.00Security Protocols
2.1Rivest, Shamir and Adleman (RSA)
2.2Rivest Cipher 4 (RC4)
2.3Message Digest 5 (MD5)
2.4Secure Hash Algorithm (SHA)
2.5Data Encryption Standard (DES)
2.6Triple DES (3DES)
2.7Advanced Encryption Standard (AES)
2.8IP Security (IPsec)
2.9Internet Security Association and Key Management Protocol (ISAKMP)
2.10Internet Key Exchange IKE/IKEv2
2.11Group Domain of Interpretation (GDOI)
2.12Authentication Header (AH)
2.13Encapsulating Security Payload (ESP)
2.14Certificate Enrollment Protocol (CEP)
2.15Transport Layer Security TLS/DTLS
2.16Secure Sockets Layer (SSL)
2.17Secure Shell (SSH) Protocol
2.18Remote Authentication Dial In User Service (RADIUS)
2.19Terminal Access Controller Access-Control System Plus (TACACS+)
2.20Lightweight Directory Access Protocol (LDAP)
2.21EAP Methods (e.g. EAP-MD5, EAP-TLS, EAP-TTLS, EAP-FAST, PEAP, LEAP)
2.22Public Key Infrastructure (PKI)/PKIX/PKCS
2.23802.1X
2.24WEP/WPA/WPA2
2.25Web Cache Communication Protocol (WCCP)
2.26Secure Group Tagging Exchange Protocol (SXP)
2.27MacSec
2.28DNSSec
3.00Application and Infrastructure Security
3.1Hypertext Transfer Protocol (HTTP)
3.2Hypertext Transfer Protocol Secure (HTTPS)
3.3Simple Mail Transfer Protocol (SMTP)
3.4Dynamic Host Configuration Protocol (DHCP)
3.5Domain Name System (DNS)
3.6File Transfer Protocol (FTP/SFTP)
3.7Trivial File Transfer Protocol (TFTP)
3.8Network Time Protocol (NTP)
3.9Simple Network Management Protocol (SNMP)
3.10Syslog
3.11Netlogon, Netbios, SMB
3.12RPCs
3.13RDP/VNC
3.14PCoIP
3.15OWASP
3.16Basic Unnecessary Services
4.00Threats, Vulnerability Analysis and Mitigation
4.1Recognizing and Mitigating Common Attacks
(a) ICMP Attacks, PING Floods
(b) MITM
(c) Replay
(d) Spoofing
(e) Backdoor
(f) Botnets
(g) Wireless Attacks
(h) DoS/DDoS Attacks
(i) Virus and worm Outbreaks
(j) Header Attacks
(k) Tunneling Attacks
4.2Software/OS Exploits
4.3Security/Attack Tools
4.4Generic Network Intrusion Prevention Concepts
4.5Packet Filtering
4.6Content Filtering/Packet Inspection
4.7Endpoint/Posture Assessment
4.8QoS Marking Attacks
5.00Cisco Security Products, Features, and Management
5.1Cisco Adaptive Security Appliance (ASA)
(a) Firewall Functionality
(b) Routing/Multicast Capabilities
(c )Firewall Modes
(d) NAT - Pre 8.4/Post 8.4
(e) Object Definition/ACLs
(f) MPF functionality (IPS/QoS/Application Awareness)
(g) Context Aware Firewall
(h) Identity Based Services
(g) Failover Options
5.2Cisco IOS Firewalls and NAT
(a) CBAC
(b) Zone-Based Firewall
(c ) Port-to-Application Mapping
(d) Identity Based Firewalling
5.3Cisco Intrusion Prevention Systems (IPSs)
5.4Cisco IOS IPS
5.5Cisco AAA Protocols and Application
(a) RADIUS
(b) TACACS+
(c) Device Admin
(d) Network Access
(e) 802.1X
(f) VSAs
5.6Cisco Identity Services Engine
5.7Cisco Secure ACS Solution Engine
5.8Cisco Network Admission Control (NAC) Appliance Server
5.9Endpoint/Client
(a) Cisco AnyConnect VPN Client
(b) Cisco VPN Client
(c) Cisco Secure Desktop (CSD)
(d) NAC Agent
5.10Secure Access Gateways (Cisco IOS Router/ASA)
(a) IPsec
(b) SSL VPN
(c) PKI
5.11Virtual Security Gateway
5.12Cisco Catalyst 6500 Series Security Services Modules
5.13Scansafe Functionality and Components
5.14IronPort Products
5.15Security Management
(a) Cisco Security Manager
(b) Cisco Adaptive Security Device Manager (ASDM)
(c) Cisco IPS Device Manager (IDM)
(d) Cisco IPS Manager Express (IME)
(e) Cisco Configuration Professional
(f) Cisco Prime
6.00Cisco Security Technologies and Solutions
6.1Router Hardening Features (e.g. CoPP, MPP, uRPF, PBR)
6.2Switch Security Features (e.g. anti-spoofing, port, STP, MacSec , NDAC, NEAT)
6.3NetFlow
6.4Wireless Security
6.5Network Segregation
(a) VRF-aware technologies
(b) VXLAN
6.6VPN Solutions
(a) FlexVPN
(b) Dynamic Multipoint VPN (DMVPN)
(c) Group Encrypted Transport VPN (GETVPN)
(d) EasyVPN
6.7Content and Packet Filtering
6.8QoS application for security
6.9Load Balancing and Failover
7.00Security Policies and Procedures, Best Practices, Standards
7.1Security Policy Elements
7.2Information Security Standards (e.g. ISO/IEC 27001, ISO/IEC 27002)
7.3Standards Bodies (e.g. ISO, IEC, ITU, ISOC, IETF, IAB, IANA, ICANN)
7.4Industry Best Practices (e.g. SOX, PCI DSS)
7.5Common RFC/BCP (e.g. RFC2827/BCP38, RFC3704/BCP84,RFC5735)
7.6Security Audit and Validation
7.7Risk Assessment
7.8Change Management Process
7.9Incident Response Framework
7.10Computer Security Forensics
7.11Desktop Security Risk Assessment/Desktop Security Risk Management



该贴已经同步到 cloudonline的微博
您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-3-7 08:12 , Processed in 0.058593 second(s), 21 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表