Like this article? We recommend
Exam Objectives
Exam Objectives
The following information provides general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.
General Networking
- Networking Basics (IPv4 and IPv6)
- OSI Layers
- TCP/IP Protocols
- LAN Switching (e.g. VTP, VLANs, Spanning Tree, Trunking)
- Routing Protocols (RIP, EIGRP, OSPF, and BGP) (IPv4 only)
- Tunneling Protocols (GRE, NHRP)
- IP Multicast
Security Protocols, Ciphers, Hashes, and Encryption
- Rivest, Shamir and Adleman (RSA)
- Rivest Cipher 4 (RC4)
- Message Digest 5 (MD5)
- Secure Hash Algorithm (SHA)
- Data Encryption Standard (DES)
- Triple DES (3DES)
- Advanced Encryption Standard (AES)
- IP Security (IPsec)
- Internet Security Association and Key Management Protocol (ISAKMP)
- Internet Key Exchange (IKE)
- Group Domain of Interpretation (GDOI)
- Authentication Header (AH)
- Encapsulating Security Payload (ESP)
- Certificate Enrollment Protocol (CEP)
- Transport Layer Security (TLS)
- Secure Socket Layer (SSL)
- Secure Shell (SSH)
- Remote Authentication Dial In User Service (RADIUS)
- Terminal Access Controller Access-Control System Plus (TACACS+)
- Lightweight Directory Access Protocol (LDAP)
- EAP Methods (e.g. EAP-MD5, EAP-TLS, EAP-TTLS, EAP-FAST, PEAP, LEAP)
Application Protocols
- Hypertext Transfer Protocol (HTTP)
- Hypertext Transfer Protocol Secure (HTTPS)
- Simple Mail Transfer Protocol (SMTP)
- Dynamic Host Configuration Protocol (DHCP)
- Domain Name System (DNS)
- File Transfer Protocol (FTP)
- Trivial File Transfer Protocol (TFTP)
- Network Time Protocol (NTP)
- Simple Network Management Protocol (SNMP)
- Syslog
Technologies
- Packet Filtering
- Content Filtering
- URL Filtering
- Authentication Technologies
- Authorization Technologies
- Proxy Authentication
- Public Key Infrastructure (PKI)
- IPsec VPN
- SSL VPN
- Dynamic Multipoint VPN (DMVPN)
- Group Encrypted Transport VPN (GET VPN)
- Network Intrusion Prevention Systems
- Host Intrusion Prevention Systems
- Event Correlation
- Network Admission Control (NAC)
- 802.1x
- Endpoint Security
- Network Address Translation (NAT)
Cisco Security Appliances and Applications
- Cisco Adaptive Security Appliance (ASA) Firewall
- Cisco Intrusion Prevention System (IPS)
- Cisco IOS Firewall (CBAC, Zone-Based, PAM)
- Cisco IOS IPS
- Cisco IOS AAA
- Cisco IOS IPsec VPN
- Cisco Easy VPN
- Cisco SSL VPN
- Cisco AnyConnect VPN Client
- Cisco VPN Client
- Cisco Secure Desktop (CSD)
- Cisco Network Admission Control (NAC) Appliance
- Cisco Security Agent (CSA)
- Cisco Secure ACS for Windows
- Cisco Secure ACS Solution Engine
- Cisco Security Monitoring, Analysis and Response System (MARS)
- Cisco Catalyst 6500 Series Security Services Modules (FWSM, IDSM-2, VPNSPA)
Cisco Security Management
- Cisco Adaptive Security Device Manager (ASDM)
- Cisco Router & Security Device Manager (SDM)
- Cisco Security Manager (CSM)
- Cisco IPS Device Manager (IDM)
- Cisco IPS Manager Express (IME)
- Cisco Configuration Professional (CCP)
Cisco Security General
- Router Security Features (e.g. ACL, NBAR, MQC, CAR, FPM, uRPF, CoPP, CPPr, MPP)
- Switch Security Features(e.g. IP & MAC Spoofing, MAC Address Controls, Port Security, DHCP Snooping, DNS [lb] Spoofing, ARP Spoofing, BPDU/Root Guard, PVLAN)
- NetFlow
- Wireless Security
- IPv6 Security
Security Solutions
- Network Attack Mitigation
- Virus and Worms Outbreaks
- DoS/DDoS Attacks
- Web Server & Web Application Security
- DNS Security
Security General
- Security Policy
- Information Security Standards (e.g. ISO/IEC 27001, ISO/IEC 27002)
- Standards Bodies (e.g. ISO, IEC, ITU, ISOC, IETF, IAB, IANA, ICANN)
- Industry/Regulatory Compliance (e.g. SOX, HIPAA, GLBA, PCI DSS, FISMA)
- Common RFC/BCP (e.g. RFC1918, RFC3330, RFC2827/BCP38, RFC3704/BCP84, RFC2401)
- Security Audit & Validation
- Risk Assessment
- Change Management Process
- Incident Response Framework
- Computer Security Forensics