Best CCIE Security Courses

Find the best online CCIE Security Courses for you. The courses are sorted based on popularity and user ratings. We do not allow paid placements in any of our rankings. We also have a separate page listing only the Free CCIE Security Courses.

Cisco : CCIE Security Written Certification Exam 2021

best Practice Tests for CCIE Security Written Certification Exam 2021

Created by Zied Zied - Jakhlouti

"]

Students: 4920, Price: $79.99

Students: 4920, Price:  Paid

The  CCIE Security written exam validates experts who have the knowledge and skills to architect, engineer, implement, troubleshoot, and support the full suite of Cisco security technologies and solutions using the latest industry best practices to secure systems and environments against modern security risks, threats, vulnerabilities, and requirements.

Topics include network functionality and security-related concepts and best practices, as well as Cisco network security products, solutions, and technologies in areas such as next generation intrusion prevention, next generation firewalls, identity services, policy management, device hardening, and malware protection.

The Cisco CCIE® Security Written is a 2-hour test with 70–110 questions. This exam tests the skills and competencies of security professionals in terms of describing, implementing, deploying, configuring, maintaining, and troubleshooting Cisco network security solutions and products, as well as current industry best practices and internetworking fundamentals.

Topics include networking fundamentals and security-related concepts and best practices, as well as Cisco network security products and solutions in areas such as VPNs, intrusion prevention, firewalls, identity services, policy management, and device hardening. Content includes both IPv4 and IPv6 concepts and solutions.

1. Perimeter Security and Intrusion Prevention (20%)

1.1 Deployment modes on Cisco ASA and Cisco FTD

1.1.a Routed

1.1.b Transparent

1.1.c Single

1.1.d Multi-Context

1.1.e Multi-Instance

1.2 Firewall features on Cisco ASA and Cisco FTD

1.2.a NAT

1.2.b Application inspection

1.2.c Traffic zones

1.2.d Policy-based routing

1.2.e Traffic redirection to service modules

1.2.f Identity firewall

1.3 Security features on Cisco IOS/IOS-XE

1.3.a Application awareness

1.3.b Zone-Based Firewall (ZBFW)

1.3.c NAT

1.4 Cisco Firepower Management Center (FMC) features

1.4.a Alerting

1.4.b Logging

1.4.c Reporting

1.5 NGIPS deployment modes

1.5.a In-Line

1.5.b Passive

1.5.c TAP

1.6 Next Generation Firewall (NGFW) features

1.6.a SSL inspection

1.6.b user identity

1.6.c geolocation

1.6.d AVC

1.7 Detect, and mitigate common types of attacks

1.7.a DoS/DDoS

1.7.b Evasion Techniques

1.7.c Spoofing

1.7.d Man-In-The-Middle

1.7.e Botnet

1.8 Clustering/HA features on Cisco ASA and Cisco FTD

1.9 Policies and rules for traffic control on Cisco ASA and Cisco FTD

1.10 Routing protocols security on Cisco IOS, Cisco ASA and Cisco FTD

1.11 Network connectivity through Cisco ASA and Cisco FTD

1.12 Correlation and remediation rules on Cisco FMC

2. Secure Connectivity and Segmentation (20%)

2.1 AnyConnect client-based remote access VPN technologies on Cisco ASA, Cisco FTD, and Cisco Routers.

2.2 Cisco IOS CA for VPN authentication

2.3 FlexVPN, DMVPN, and IPsec L2L Tunnels

2.4 Uplink and downlink MACsec (802.1AE)

2.5 VPN high availability using

2.5.a Cisco ASA VPN clustering

2.5.b Dual-Hub DMVPN deployments

2.6 Infrastructure segmentation methods

2.6.a VLAN

2.6.b PVLAN

2.6.c GRE

2.6.d VRF-Lite

2.7 Micro-segmentation with Cisco TrustSec using SGT and SXP

3. Infrastructure Security (15%)

3.1 Device hardening techniques and control plane protection methods

3.1.a CoPP

3.1.b IP Source routing

3.1.c iACLs

3.2 Management plane protection techniques

3.2.a CPU

3.2.b Memory thresholding

3.2.c Securing device access

3.3 Data plane protection techniques

3.3.a uRPF

3.3.b QoS

3.3.c RTBH

3.4 Layer 2 security techniques

3.4.a DAI

3.4.b IPDT

3.4.c STP security

3.4.d Port security

3.4.e DHCP snooping

3.4.f RA Guard

3.4.g VACL

3.5 Wireless security technologies

3.5.a WPA

3.5.b WPA2

3.5.c WPA3

3.5.d TKIP

3.5.e AES

3.6 Monitoring protocols

3.6.a NetFlow/IPFIX/NSEL

3.6.b SNMP

3.6.c SYSLOG

3.6.d RMON

3.6.e eStreamer

3.7 Security features to comply with organizational security policies, procedures, and standards BCP 38

3.7.a ISO 27001

3.7.b RFC 2827

3.7.c PCI-DSS

3.8 Cisco SAFE model to validate network security design and to identify threats to different Places in the Network (PINs)

3.9 Interaction with network devices through APIs using basic Python scripts

3.9.a REST API requests and responses

3.9.a i HTTP action verbs, error codes, cookies, headers

3.9.a ii JSON or XML payload

3.9.a iii Authentication

3.9.b Data encoding formats

3.9.b I JSON

3.9.b ii XML

3.9.b iii YAML

3.10 Cisco DNAC Northbound APIs use cases

3.10.a. Authentication/Authorization

3.10.b. Network Discovery

3.10.c. Network Device

3.10.d. Network Host

4. Identity Management, Information Exchange, and Access Control (25%)

4.1 ISE scalability using multiple nodes and personas.

4.2 Cisco switches and Cisco Wireless LAN Controllers for network access AAA with ISE.

4.3 Cisco devices for administrative access with ISE

4.4 AAA for network access with 802.1X and MAB using ISE.

4.5 Guest lifecycle management using ISE and Cisco Wireless LAN controllers

4.6 BYOD on-boarding and network access flows

4.7 ISE integration with external identity sources

4.7.a LDAP

4.7.b AD

4.7.c External RADIUS

4.8 Provisioning of AnyConnect with ISE and ASA

4.9 Posture assessment with ISE

4.10 Endpoint profiling using ISE and Cisco network infrastructure including device sensor

4.11 Integration of MDM with ISE

4.12 Certificate-based authentication using ISE

4.13 Authentication methods

4.13.a EAP Chaining

4.13.b Machine Access Restriction (MAR)

4.14 Identity mapping on ASA, ISE, WSA, and FTD

4.15 pxGrid integration between security devices WSA, ISE, and Cisco FMC

4.16 Integration of ISE with multi-factor authentication

4.17 Access control and single sign-on using Cisco DUO security technology

5. Advanced Threat Protection and Content Security (20%)

5.1 AMP for networks, AMP for endpoints, and AMP for content security (ESA, and WSA)

5.2 Detect, analyze, and mitigate malware incidents

5.3 Perform packet capture and analysis using Wireshark, tcpdump, SPAN, ERSPAN, and RSPAN

5.4 DNS layer security, intelligent proxy, and user identification using Cisco Umbrella

5.5 Web filtering, user identification, and Application Visibility and

CCIE Security v5 by Khawar Butt

CCIE Security Lab Bootcamp

Created by Khawar Butt - Hexa CCIE #12353 ,CCDE #20110020

"]

Students: 4072, Price: $119.99

Students: 4072, Price:  Paid

The CCIE Security v5 Bootcamp is an in depth course covering all the technologies required for the CCIE Security Lab Exam. The topics covered are:

1. VPNs

     - Basic LAN - To - LAN VPNs [IPSEC (Crypto Maps), GRE, GRE Over IPSec, S-VTI]

     - M-GRE

     - DMVPN

     - GET VPN

     - IKEv2 VPNs

     - Flex VPN

     - VRF Aware VPNs

     - Certificate Based VPNs

     - ASA Based VPNs (LAN-2-LAN, VPNs thru the ASA, Remote Access VPNs (WebVPN, AnyConnect)

2. Firewall

    - ASA Firewall (Basic Initialization, Routing, NAT, Redundancy, Virtualization)

    - Zone-Based Firewall (ZBF)

    - FTD (Basic Initialization, Routing, NAT, ACP, IPS)

3. Content Filtering

    - WSA (Basic Initialization - CLI, Basic Initialization - GUI, WCCP Relationship with Router, Access Policies)

    - ESA  (E-Mail Flow Overview, Basic Initialization - CLI, Basic Initialization - GUI, SMTP Relay Configuration, E-Mail Policies)

4. Wireless Networking

    - Overview of Wireless Networking (Controlled Based Wireless)

    - Networking configuration required for Wireless

    - Basic Initialization of the WLC

    - Basic Wireless LAN Setup

5. ISE Configuration

    - Overview of ISE

    - Wireless ISE (Dot1x Authentication)

    - Wired ISE (Dot1x Authentication, MAB)

    - Device Administration using ISE

CCIE Security – ISE 2.1.0 Deep Dive: Labs

Master Cisco Identity Services Engine (ISE). Learn About Cisco ISE version 2.1.0 in An Easy Way...

Created by Baldev Singh - Trainer & Consultant - Cisco Network Security

"]

Students: 1393, Price: $89.99

Students: 1393, Price:  Paid

The Cisco® Identity Services Engine (ISE) is your one-stop solution to streamline security policy management and reduce operating costs. With ISE, you can see users and devices controlling access across wired, wireless, and VPN connections to the corporate network.

This Course helps you learn and master Cisco Identity Services Engine (ISE). This course focuses towards CCIE Security - ISE 2.1.0 Deep Dive: Labs.

CCIE Security - ISE 2.1.0 Deep Dive: Labs Course  Contents in brief: 

  • ISE-2.1.0 Installation using ISO

  • ISE-2.1.0 Installation using OVF

  • ISE-2.1.0 Snapshot

  • ISE-2.1.0 Web Portal Introduction

  • ISE-2.1.0 Active Directory Integration and Identity Source Sequence

  • ISE-2.1.0 LDAP Integration and Identity Source Sequence

  • ISE-2.1.0 Registration  Self-signed Certificate

  • ISE-2.1.0 Registration  Microsoft Certificate Authority

  • ISE-2.1.0 Backup Using CLI

  • ISE-2.1.0 Restore Using CLI

  • ISE-2.1.0 Patch Installation Using CLI

  • ISE-2.1.0 Patch Rollback Using CLI

  • ISE-2.1.0 Up-gradation Using CLI

  • ISE-2.1.0 Backup Using GUI

  • ISE-2.1.0 Restore Using GUI

  • ISE-2.1.0 Patch Installation Using GUI

  • ISE-2.1.0 Patch Rollback Using GUI

  • ISE-2.1.0 Up-gradation Using GUI

  • ISE-2.1.0 Lab Initial Configuration

  • ISE-2.1.0 MAC Authentication Bypass Configuration

  • ISE-2.1.0 MAC Authentication Bypass Verification

  • ISE-2.1.0 Dot1x Configuration with MD5

  • ISE-2.1.0 Dot1x Verification with MD5

  • ISE-2.1.0 Dynamic VLAN Configuration with MD5

  • ISE-2.1.0 Dynamic VLAN Verification with MD5

  • ISE-2.1.0 Dynamic VLAN and DACL  Configuration with MD5

  • ISE-2.1.0 Dynamic VLAN and DACL  Verification with MD5

  • ISE-2.1.0 Dot1x Configuration with PEAP

  • ISE-2.1.0 Dot1x Verification with PEAP

  • ISE-2.1.0 Dot1x Configuration with PEAP and AD

  • ISE-2.1.0 Dot1x Verification with PEAP and AD

  • ISE-2.1.0 Dynamic VLAN  Configuration  PEAP

  • ISE-2.1.0 Dynamic VLAN  Verification PEAP

  • ISE-2.1.0 Dynamic VLAN and DACL Configuration with PEAP

  • ISE-2.1.0 Dynamic VLAN and DACL Verification with PEAP

  • ISE-2.1.0 Wired Local Web Authentication Configuration

  • ISE-2.1.0 Wired Local Web Authentication Verification

  • ISE-2.1.0 Wired Central Web Authentication Configuration

  • ISE-2.1.0 Wired Central Web Authentication Verification

Cisco ISE 2.2.0 Labs Contents in brief: (Update in Progress)

  • ISE-2.2.0 Installation using ISO

  • ISE-2.2.0 Installation using OVF

  • ISE-2.2.0 Snapshot

  • ISE-2.2.0 Web Portal Introduction

  • ISE-2.2.0 Active Directory Integration and Identity Source Sequence

  • ISE-2.2.0 LDAP Integration and Identity Source Sequence

  • ISE-2.2.0 Registration  Self-signed Certificate

  • ISE-2.2.0 Registration  Microsoft Certificate Authority

  • ISE-2.2.0 Backup Using CLI

  • ISE-2.2.0 Restore Using CLI

  • ISE-2.2.0 Patch Installation Using CLI

  • ISE-2.2.0 Patch Rollback Using CLI

  • ISE-2.2.0 Up-gradation Using CLI

  • ISE-2.2.0 Backup Using GUI

  • ISE-2.2.0 Restore Using GUI

  • ISE-2.2.0 Patch Installation Using GUI

  • ISE-2.2.0 Patch Rollback Using GUI

  • ISE-2.2.0 Up-gradation Using GUI

  • ISE-2.2.0 Lab Initial Configuration

  • ISE-2.2.0 MAC Authentication Bypass Configuration

  • ISE-2.2.0 MAC Authentication Bypass Verification

  • ISE-2.2.0 Dot1x Configuration with MD5

  • ISE-2.2.0 Dot1x Verification with MD5

  • ISE-2.2.0 Dynamic VLAN Configuration with MD5

  • ISE-2.2.0 Dynamic VLAN Verification with MD5

  • ISE-2.2.0 Dynamic VLAN and DACL  Configuration with MD5

  • ISE-2.2.0 Dynamic VLAN and DACL  Verification with MD5

  • ISE-2.2.0 Dot1x Configuration with PEAP

  • ISE-2.2.0 Dot1x Verification with PEAP

  • ISE-2.2.0 Dot1x Configuration with PEAP and AD

  • ISE-2.2.0 Dot1x Verification with PEAP and AD

  • ISE-2.2.0 Dynamic VLAN  Configuration  PEAP

  • ISE-2.2.0 Dynamic VLAN  Verification PEAP

  • ISE-2.2.0 Dynamic VLAN and DACL Configuration with PEAP

  • ISE-2.2.0 Dynamic VLAN and DACL Verification with PEAP

  • ISE-2.2.0 Wired Local Web Authentication Configuration

  • ISE-2.2.0 Wired Local Web Authentication Verification

  • ISE-2.2.0 Wired Central Web Authentication Configuration

  • ISE-2.2.0 Wired Central Web Authentication Verification

CCIE Security – IOS VPN Deep Dive: Labs

Cisco IOS VPNs like (Site-Site, Remote Access, SSL,DMVPN,GETVPN,Flex Site-Site,Flex RA with IOS Version 15.X

Created by Baldev Singh - Trainer & Consultant - Cisco Network Security

"]

Students: 1278, Price: $89.99

Students: 1278, Price:  Paid

This course will help you learn and master Cisco IOS VPNs like (Site-Site, Remote Access, SSL,DMVPN,GETVPN,Flex Site-Site,Flex RA with IOS Version 15.X.

CCIE Security - IOS VPN Deep Dive: Labs  Contents in brief: 

  • Fundamentals of IPSec and Cryptography

  • Fundamentals and Implementation of Site-Site VPN on Cisco IOS

  • Fundamentals and Implementation of Remote Access VPN on Cisco IOS

  • Fundamentals and Implementation of Secure Socket Layer VPN on Cisco IOS

  • Fundamentals and Implementation of DMVPN on Cisco IOS

  • Fundamentals and Implementation of GETVPN on Cisco IOS

  • Fundamentals and Implementation of Flex VPN on Cisco IOS

  • Implementation of IOS VPN Using Microsoft Server 2016

  • Troubleshooting Labs

CCNP,CCIE Security SCOR (350-701) Training Part-1/2

Implementing and Operating Cisco Security Core Technologies (SCOR 350-701) with Step by Step Lab Workbook

Created by Ahmad Ali - Network and Security Engineer

"]

Students: 1174, Price: $49.99

Students: 1174, Price:  Paid

Security Concepts, Explain common threats against on-premises and cloud environments, Configure and verify network infrastructure security methods, Configure AAA for device and network access, Configure secure network management of perimeter security, Configure and verify site-to-site VPN and remote access VPN , Describe identity management and secure network access, Network security solutions that provide intrusion prevention and firewall, Network Security, Securing the Cloud, Content Security, Endpoint Protection and Detection , Secure Network Access, Visibility, and Enforcement, Secure network access, SDN and Network Automation Concepts, Describe the components, capabilities, and benefits of Cisco Umbrella, Endpoint Protection and Detection, Secure Network Access, Visibility, and Enforcement, Describe the benefits of network telemetry, Implement traffic redirection and capture methods, Describe the concept of DevSecOps, Identify security solutions for cloud environments, Compare the customer vs. provider security responsibility, Configure AAA for device and network access, Implement segmentation, access control policies, AVC, Explain North Bound and South Bound APIs in the SDN architecture, Describe security intelligence authoring, sharing, and consumption, Describe security intelligence authoring, sharing, and consumption, Interpret basic Python scripts used to call Cisco Security appliances APIs, Cloud service models: SaaS, PaaS, IaaS, Security assessment in the cloud, Patch management in the cloud, Describe the benefits of device compliance and application control

CCNP,CCIE Security SCOR (350-701) Training Part-2/2

Implementing and Operating Cisco Security Core Technologies (SCOR 350-701) with Step by Step Lab Workbook

Created by Ahmad Ali - Network and Security Engineer

"]

Students: 629, Price: $49.99

Students: 629, Price:  Paid

Security Concepts, Explain common threats against on-premises and cloud environments, Configure and verify network infrastructure security methods, Configure AAA for device and network access, Configure secure network management of perimeter security, Configure and verify site-to-site VPN and remote access VPN , Describe identity management and secure network access, Network security solutions that provide intrusion prevention and firewall, Network Security, Securing the Cloud, Content Security, Endpoint Protection and Detection , Secure Network Access, Visibility, and Enforcement, Secure network access, SDN and Network Automation Concepts, Describe the components, capabilities, and benefits of Cisco Umbrella, Endpoint Protection and Detection, Secure Network Access, Visibility, and Enforcement, Describe the benefits of network telemetry, Implement traffic redirection and capture methods, Describe the concept of DevSecOps, Identify security solutions for cloud environments, Compare the customer vs. provider security responsibility, Configure AAA for device and network access, Implement segmentation, access control policies, AVC, Explain North Bound and South Bound APIs in the SDN architecture, Describe security intelligence authoring, sharing, and consumption, Describe security intelligence authoring, sharing, and consumption, Interpret basic Python scripts used to call Cisco Security appliances APIs, Cloud service models: SaaS, PaaS, IaaS, Security assessment in the cloud, Patch management in the cloud, Describe the benefits of device compliance and application control

CCIE Security – WSA 9.2.0 Deep Dive: Labs

Learn About Cisco Web Security Appliance (WSA) 9.2.0 in An Easy Way...

Created by Baldev Singh - Trainer & Consultant - Cisco Network Security

"]

Students: 585, Price: $89.99

Students: 585, Price:  Paid

Advanced threats can hide even on legitimate websites. Users may inadvertently put your organization at risk by clicking where they shouldn't. Cisco Secure Web Appliance protects your organization by automatically blocking risky sites and testing unknown sites before allowing users to click on them. Using TLS 1.3 and high-performance capabilities, Cisco Secure Web Appliance keeps your users safe.

This course will help candidates learn and master Cisco Web Security Appliance Solution Overview  version 9.2.0. The course includes intensive labs up to advanced level.

CCIE Security  WSA 9.2.0 Labs Contents in brief:  (Update in Progress)

  • WSA-9.2.0 Topology Introduction

  • WSA-9.2.0 Topology Initial Configuration

  • WSA-9.2.0 Installation using OVF on VMware Workstation

  • WSA-9.2.0 Initial Configuration on WSA

  • WSA-9.2.0 Install License on WSA

  • WSA-9.2.0 Run System Setup Wizard

  • WSA-9.2.0 Verify Web Proxy Settings on WSA

  • WSA-9.2.0 Explicit Proxy Configuration on Client

  • WSA-9.2.0 Check That Traffic is Hitting to WSA or not

  • WSA-9.2.0 Search Engines and Portals Blocking

  • WSA-9.2.0 Social Site Blocking

  • WSA-9.2.0 References Sites  Blocking

  • WSA-9.2.0 Internet Telephony Site Blocking

  • WSA-9.2.0 HTTP/HTTPS/FTP Download Limit Configuration

  • WSA-9.2.0 HTTP/HTTPS/FTP Download Limit Verification

  • WSA-9.2.0 IP Base URL Blocking of HTTP Configuration

  • WSA-9.2.0 IP Base URL Blocking of HTTP Verification

  • WSA-9.2.0 IP Base URL Blocking of HTTPS Configuration

  • WSA-9.2.0 IP Base URL Blocking of HTTPS Verification

  • WSA-9.2.0 IP Base URL Blocking of FTP Configuration

  • WSA-9.2.0 IP Base URL Blocking of FTP Verification

  • WSA-9.2.0 Redirection bing to google Configuration

  • WSA-9.2.0 Redirection bing to google Verification

  • WSA-9.2.0 Warning For Social Site Configuration

  • WSA-9.2.0 Warning For Social Site Verification

  • WSA-9.2.0 Proxy Bypass on WSA Configuration

  • WSA-9.2.0 Proxy Bypass on WSA Verification

  • WSA-9.2.0 Microsoft Active Directory Integration Configuration

  • WSA-9.2.0 Microsoft Active Directory Integration Verification

  • WSA-9.2.0 Proxy Authentication Configuration

  • WSA-9.2.0 Proxy Authentication Verification

  • WSA-9.2.0 How to Upgrade WSA Configuration

  • WSA-9.2.0 How to Verifiy WSA Upgrade

  • WSA-9.2.0 How to Restore the factory defaults via CLI "resetconfig"

  • WSA-9.2.0 How to Set Management IP via CLI "ifconfig"

  • WSA-9.2.0 How to Set Hostname via CLI "sethostname"

  • WSA-9.2.0 How to Set Gateway IP via CLI "setgateway"

  • WSA-9.2.0 How to Set DNS Server IP via CLI "dnsconfig

  • WSA-9.2.0 How to Flush DNS Cache "dnsflush"

  • WSA-9.2.0 How to Check Configuration via CLI "showconfig"

  • WSA-9.2.0 How to Configure Time Zone via CLI "settz"

  • WSA-9.2.0 How to Configure Time via CLI "settime"

  • WSA-9.2.0 How to Change Admin Password via CLI "passwd"

  • WSA-9.2.0 How to Check WSA version via CLI "version"

  • WSA-9.2.0 How to Upgrade WSA version via CLI "upgrade"

  • WSA-9.2.0 How to Revert WSA version via CLI "revert"

  • WSA-9.2.0 How to Take Backup of WSA Configuration

  • WSA-9.2.0 How to Load a configuration file via CLI "loadconfig"

  • WSA-9.2.0 How to Display the current date and time via CLI "date"

  • WSA-9.2.0 How to Display alerts sent by the appliance via CLI "displayalerts"

  • WSA-9.2.0 How to Flush entries from proxy authentication cache "authcache"

  • WSA-9.2.0 How to Create user via CLI "userconfig"

  • WSA-9.2.0 How to Configure Failover via CLI "failoverconfig"

  • WSA-9.2.0 How to Configure Failover via GUI

  • WSA-9.2.0 How to Load PAC File on WSA

  • WSA-9.2.0 How to Configure PAC File URL on Client For High availability or Failover

  • WSA-9.2.0 How to Enable HTTPS Proxy on WSA

  • WSA-9.2.0 How to Load WSA Certificate on Client

  • WSA-9.2.0 Block Social Networking during Peak Business Hours (otherwise Warn)

  • WSA-9.2.0 How to Set Volume Quotas on WSA for YouTube

  • WSA-9.2.0 How to Configure Application Visibility and Control (AVC) on WSA

  • WSA-9.2.0 How to Configure Web Reputation on WSA

  • And Much More.....

CCIE Security Layer 2 Security Deep Dive: Labs

Master CCIE Security Layer 2 Security. Learn Cisco Layer 2 Security Concepts and Technologies in An Easy Way.

Created by Baldev Singh - Trainer & Consultant - Cisco Network Security

"]

Students: 339, Price: $89.99

Students: 339, Price:  Paid

This course focused towards Cisco CCIE Security Layer 2 Security  Labs.  This course will help you learn and master Cisco CCIE Layer 2 Security Labs.

CCIE Security v5.0 L2 Security Labs Contents in brief: 

  • Fundamentals of Switching

  • Fundamentals and Implementation of VLAN

  • Fundamentals and Implementation of VTP

  • Fundamentals and Implementation of Ether-Channel

  • Fundamentals and Implementation of STP

  • Fundamentals and Implementation of RSTP

  • Fundamentals and Implementation of MST

  • Fundamentals and Implementation of STP Protection

  • Fundamentals and Implementation of HSRP

  • Fundamentals and Implementation of VRRP

  • Fundamentals and Implementation of GLBP

  • Fundamentals and Implementation of Layer 2 Security Technologies

  • Much More...............