Cisco CCNP Security Concentration (SVPN 300-730) Virtuelles Klassenzimmer
- Anbieter
- IPnetON GmbH
- Telefon
- +49.30.68056806
- kontakt@ipneton.com
- Beginn
- 17.04.2023
- Dauer
- 40 Stunden
- Ort
- 12055 Berlin
Adresse:/de/angebot/2898783/cisco-ccnp-security-concentration-svpn-300-730-virtuelles-klassenzimmer
gedruckt am:01.04.2023
Implementing Secure Solutions with Virtual Private Networks (SVPN 300-730)
Dieser Kurs vermittelt Kenntnisse an die Teilnehmer über Site-to-site Virtual Private Networks on Routers and Firewalls, Remote access VPNs , Troubleshooting using ASDM and CLI, Secure Communications Architectures. Dieser Kurs, Implementing Secure Solutions with Virtual Private Networks.
Course Content
Site-to-site Virtual Private Networks on Routers and Firewalls
Describing GETVPN
Implementing DMVPN (hub-and-spoke and spoke-to-spoke on both IPv4 & IPv6)
Implementing FlexVPN (hub-and-spoke on both IPv4 & IPv6) using local AAA
Remote access VPNs
Implementing AnyConnect IKEv2 VPNs on ASA and routers
Implementing AnyConnect SSLVPN on ASA and routers
Implementing Clientless SSLVPN on ASA and routers
Implementing Flex VPN on routers
Troubleshooting using ASDM and CLI
Troubleshooting IPsec
Troubleshooting DMVPN
Troubleshooting FlexVPN
Troubleshooting AnyConnect IKEv2 and SSL VPNs on ASA and routers
Troubleshooting Clientless SSLVPN on ASA and routers
Secure Communications Architectures
Identifying functional components of GETVPN, FlexVPN, DMVPN, and IPsec for site-to-site VPN solutions
Identifying functional components of FlexVPN, IPsec, and Clientless SSL for remote access VPN solutions
Identifying VPN technology based on configuration output for site-to-site VPN solutions
Identifying VPN technology based on configuration output for remote access VPN solutions
Identifying split tunneling requirements for remote access VPN solutions
Designing site-to-site VPN solutions
a. VPN technology considerations based on functional requirements
b. High availability considerations
Design remote access VPN solutions
a. VPN technology considerations based on functional requirements
b. High availability considerations
c. Clientless SSL browser and client considerations and requirements
Identifying Elliptic Curve Cryptography (ECC) algorithms
Alle Angaben ohne Gewähr. Für die Richtigkeit der Angaben sind ausschließlich die Anbieter verantwortlich.
Erstmals erschienen am 09.02.2021, zuletzt aktualisiert am 31.03.2023