cisco, senss, ccnp security, it certification exams, cisco cybersecurity specialist

A Closer Look at CCNP Security 300-206 (SENSS) Exam

  • By
  • March 3, 2014
0 Comment

cisco, senss, ccnp security, it certification exams, cisco cybersecurity specialist As we mentioned earlier, Cisco kicked off the year with updating its security certifications, especially CCNP Security, and the launch of Cisco Cybersecurity Specialist certification. These changes, along with others, are meant to step up Cisco’s security certifications, putting them in line with the latest security trends. They also validate the skills that employers are searching for in their staff.

Today, we take a closer look at the 300-206 (SENSS) exam: Implementing Cisco Edge Network Security Solutions. It validates the candidates’ knowledge required to configure and implement security on Cisco network perimeter edge devices such as a Cisco Switch, Cisco Router, and Cisco ASA Firewall. The 300-206 exam focuses on the technologies used to secure the perimeter of a network such as Network Address Translation (NAT), ASA policy and application inspect, and Zone-Based Firewall on Cisco routers. Like most Cisco exams, this is a closed book exam, with the usual Cisco types of questions: Multiple-Choice Single Key, Multiple-Choice Multiple Key, Drag-and-Drop, Fill-in-the-Blank, Router Simulation, Testlet Queries, Simlet.

According to Cisco, the current version of the 300-206 exam includes the following topics.
Threat Defense (25%)
1.1 Implement Firewall
• 1.1.a Implement ACLs
• 1.1.b Implement static/dynamic NAT/PAT
• 1.1.c Implement object groups
• 1.1.d Describe threat detection features
• 1.1.e Implement Botnet traffic filtering

1.2 Implement Layer 2 security
• 1.2.a Configure DHCP snooping
• 1.2.b Describe dynamic ARP inspection
• 1.2.c Describe storm control
• 1.2.d Configure port security
• 1.2.e Describe common layer 2 threats and attacks and mitigation
• 1.2.f Describe private VLAN
• 1.2.g Describe MACSec

• 1.3 Configure device hardening per best practices
• 1.3.a Routers
• 1.3.b Switches
• 1.3.c Firewalls

• 1.4 Implement Firewalls
• 1.4.a Configure application filtering and protcol inspection
• 1.4.b Describe virtualized firewalls

Cisco Security Devices GUIs and Secured CLI Management (25%)
• 2.1 Implement SSHv2, SSL, SNMPv3 access on the network devices
• 2.2 Implement RBAC on the ASA/IOS CLI and on ASDM
• 2.3 Describe Cisco Prime Infrastructure
• 2.4 Describe CSM
• 2.5 Implement device managers

Management Services on Cisco Devices (12%)
• 3.1 Implement NetFlow exporter
• 3.2 Implement SNMPv3
• 3.3 Implement logging
• 3.4 Implement NTP with authentication
• 3.5 Describe CDP, DNS, SCP, SFTP, and DHCP

Troubleshooting, Monitoring and Reporting Tools (10%)
• Monitor firewall using analysis of packet tracer, packet capture, and syslog

Threat Defense Architectures (16%)
• 5.1 Design a firewall solution
• 5.2 Design Layer 2 security solution

Security Components and Considerations (12%)
• 6.1 Describe security operations management architecture
• 6.2 Describe Data Center Security components and considerations
• 6.3 Describe Collaboration security components and considerations
• 6.4 Describe common IPv6 security considerations

Comments
* The most recent comment are at the top

Add Comments

Interesting posts

Amazon AWS Certified Database – Specialty Exam Announcement: Key Points to Know

Amazon Web Services recently made an announcement that it will soon be launching the beta exam version for the AWS Certified Database test of the Specialty level. The launch will take place on December 2, 2019. This announcement is one of the most important of the upcoming Amazon Web Services certification exam changes. The code… Read More »

Comparative Analysis: Which PMI Certification Is Better (PMP or CAPM)?

The field of project management is one of the most highly rewarding career paths with the average salary of a project manager netting a little above $75,000 per annum. In addition to this, the professionals in this area are not restricted to a specific industry. Therefore, it is not surprising to see a lot of… Read More »

Pros and Cons of Obtaining (ISC)2 CISSP Certification

The decision to pursue the CISSP credential is dependent on a number of factors. First, you have to understand that there are different options when it comes to the security certificates, so choosing the best option for you will depend on a couple of factors. Before we dive into the details, it is essential to… Read More »

Important Points about VMware Certifications: Why They No Longer Expire

Recently, there have been a lot of changes to the IT credentials provided by popular vendors, and this has made many professionals unsure of what to expect next. For instance, Amazon removed all exam prerequisites, and Microsoft also retired some of its brand new certificates. Not so long ago, Cisco also carried out a total… Read More »

How to Prepare for Cisco Exams (CCNA, CCNP, & CCIE) via Network Simulators/Emulators?

Preparing for any exam requires choosing the right study materials. If you are planning to take the tests in order to get the Cisco CCNA, CCNP, or CCIE certifications, it is imperative that you choose the best network emulator or simulator. Unfortunately, making the right choice might be a bit difficult. This is because it… Read More »

Top 10 Free Cloud Storage Services: Store Your Data in a Safe Place!

The significance of high-quality online storage services continues to gain popularity as the consumers and businesses are adopting the ongoing digital transformation. The trend will continue throughout 2020 with more dependence on the online storage of files in Cloud. This means that both enterprises and individuals are shifting their focus from local storage hardware and… Read More »

img