Cisco CCNP Security Concentration (SVPN 300-730) Virtuelles Klassenzimmer
- Anbieter
- IPnetON GmbH
- Telefon
- +49.30.68056806
- kontakt@ipneton.com
- Beginn
- 09.12.2024
- Dauer
- 40 Stunden in 5 Tagen
- Ort
- 12055 Berlin
Adresse:/de/angebot/3167086/weiterbildung-cisco-ccnp-security-concentration-svpn-300-730-virtuelles-klassenzimmer
gedruckt am:09.12.2024
Implementing Secure Solutions with Virtual Private Networks (SVPN 300-730)
Dieser Kurs vermittelt Kenntnisse an die Teilnehmer über Site-to-site Virtual Private Networks on Routers and Firewalls, Remote access VPNs , Troubleshooting using ASDM and CLI, Secure Communications Architectures. Dieser Kurs, Implementing Secure Solutions with Virtual Private Networks.
Course Content
Site-to-site Virtual Private Networks on Routers and Firewalls
-Describing GETVPN
-Implementing DMVPN (hub-and-spoke and spoke-to-spoke on both IPv4 & IPv6)
-Implementing FlexVPN (hub-and-spoke on both IPv4 & IPv6) using local AAA
Remote access VPNs
-Implementing AnyConnect IKEv2 VPNs on ASA and routers
-Implementing AnyConnect SSLVPN on ASA and routers
-Implementing Clientless SSLVPN on ASA and routers
-Implementing Flex VPN on routers
Troubleshooting using ASDM and CLI
-Troubleshooting IPsec
-Troubleshooting DMVPN
-Troubleshooting FlexVPN
-Troubleshooting AnyConnect IKEv2 and SSL VPNs on ASA and routers
-Troubleshooting Clientless SSLVPN on ASA and routers
Secure Communications Architectures
-Identifying functional components of GETVPN, FlexVPN, DMVPN, and IPsec for site-to-site VPN solutions
-Identifying functional components of FlexVPN, IPsec, and Clientless SSL for remote access VPN solutions
-Identifying VPN technology based on configuration output for site-to-site VPN solutions
-Identifying VPN technology based on configuration output for remote access VPN solutions
-Identifying split tunneling requirements for remote access VPN solutions
-Designing site-to-site VPN solutions
a. VPN technology considerations based on functional requirements
b. High availability considerations
-Designing remote access VPN solutions
a. VPN technology considerations based on functional requirements
b. High availability considerations
c. Clientless SSL browser and client considerations and requirements
-Identifying Elliptic Curve Cryptography (ECC) algorithms
Alle Angaben ohne Gewähr. Für die Richtigkeit der Angaben sind ausschließlich die Anbieter verantwortlich.
Erstmals erschienen am 18.09.2021, zuletzt aktualisiert am 09.12.2024