CCSP Register Now

Cisco Certified Security Professional is an advanced-level certification for IT professionals who “are actively involved in developing business solutions and designing and delivering multiple levels of security departments.” These individuals typically are responsible for “designing and implementing Cisco secure networks.” Either the CCNA (Cisco Certified Network Associate) or CCIP (Cisco Certified Internetwork Specialist) is a prerequisite for the CCSP.

The CCSP was established in 2002 and has been most recently changed in the spring of 2003 when its underlying required exams were updated. A candidate must pass five exams in order to achieve the CCSP designation. The CCSP is valid for three years. “To recertify, take and pass the current version of appropriate security exams.”

Job roles of those pursuing this certification include: network security professional, systems security professional, and infrastructure security specialist.

For more information:

Cisco security certifications focus on the growing need for knowledgeable network professionals who can implement complete security solutions. Cisco Firewall Specialists focus on securing network access using Cisco IOS Software and Cisco PIX Firewall Technologies.

Securing Cisco IOS Networks (SECUR)

  • Introduction

  • Network Security

  • Basic Cisco Router Security

  • Advanced AAA Security for Cisco Router Networks

  • Cisco Router Threat Mitigation

  • Cisco IOS Firewall Context-Based Access Control Configuration

  • Cisco IOS Firewall Authentication Proxy

  • Cisco IOS Firewall Intrusion Detection System

  • Building IPSec VPNs Using Cisco Routers

  • Building Advanced IPSec VPNs Using Cisco Routers and Certificate Authorities

  • Configuring IOS Remote Access Using Cisco Easy VPN

  • Securing Cisco Routers Using Security Device Manager

Cisco Secure PIX Firewall Advanced (CSPFA)

  • Introduction

  • Cisco PIX Firewall Technology and Features

  • Cisco PIX Firewall Family

  • Getting Started with the Cisco PIX Firewall

  • Outbound Translations and Connections

  • Inbound Translations and Connections

  • Object Grouping

  • Protocol Handling

  • Attack Guards, Intrusion Detection, and Shunning

  • Authentication, Authorization and Accounting

  • Failover

  • Site-to-Site Virtual Private Network

Register Now

Contact Us

Mobile No.:
Email ID:

Send Email to Us

Mobile No.:
Email ID: