Cisco VPN 2.0: Evaluating the Cisco ASA VPN Architecture
Anyone wishing to obtain the Cisco Certified Network Professional CCNP Security designation. Cisco Network Security Engineers responsible for the selection, configuration, and the troubleshooting of the majority of Cisco ASA Adaptive Security Appliance perimeter security features to reduce risk to IT infrastructure and its applications within their networking environments.Established IT professionals with a good understanding of networking and Cisco technology, installation, troubleshooting and monitoring of devices used to maintain integrity, confidentiality and availability of data and network devices that Cisco uses in its security infrastructure, as well as working knowledge of the Microsoft Windows operating system.Candidates who have completed the Cisco Certified Network Associate (CCNA), the Cisco Certified Network Associate Security (CCNA Security), the Securing Networks with Cisco Routers and Switches (SECURE) v1.0, and the Deploying Cisco ASA Firewall Solutions (FIREWALL 2.0) Certifications.
Please contact us for information about prerequisites.
The Cisco ASA Adaptive Security Appliance provides a rich set of VPN features that cover a wide range of common enterprise use cases to support mobile workers and remote offices. This course introduces the VPN technologies and access methods that the Cisco ASA Security Appliance supports; the integration of these access methods in the Cisco ASA Security Appliance traffic forwarding engine and access control model; and the VPN licensing options of Cisco ASA Security Appliances.
The Cisco ASA Adaptive Security Appliance provides a rich set of network integration, access control, and VPN features that work together to provide multiple security functions to an organization. Because this course focuses on the VPN aspects of the Cisco ASA Security Appliance software and hardware, it provides a refresher of baseline access control and network integration features that are required when implementing VPN functionality.
Evaluating the ASA VPN Subsystem Architecture
Evaluating the ASA VPN Software Architecture