his is the first part of the 3 Parts for new CCNP SECURITY Concentration Exam SPVN-300-730
covers topics in 3 Parts as given below
Part 1 - CryptoGraphy Concepts , VPN FOundations, IPSEC, Site to Site IPsec VPN
Part 2 - covers DMVPN Concepts & IPSec over DMVPN , FlexVPN
Part 3 - Focusses on Remote Access VPN on ASA and Routers.
Available February 24, 2020: Updates to the CCNP certification and training program
On February 24, 2020, Cisco will release new certification exams. New training will roll out over the next several months.
If you have started working toward the current CCNP Security certification, keep going. In the new program, you’ll receive credit for work you’ve already completed.
Implementing Secure Solutions with Virtual Private Networks (SVPN 300-730)
This exam tests your knowledge of implementing secure remote communications with Virtual Private Network (VPN) solutions, including:
To earn CCNP Security, you pass two exams: a core exam and a concentration exam of your choice.
The core exam, Implementing and Operating Cisco Security Core Technologies v1.0 (SCOR 300-701), focuses on your knowledge of security infrastructure including network security, cloud security, content security, endpoint protection and detection, secure network access, visibility, and enforcements.
You can prepare for this exam by taking the training course, Implementing and Operating Cisco Security Core Technologies (SCOR).
Concentration exams focus on emerging and industry-specific topics such as Cisco Firepower, identity services, email security, web security, VPNs, and automation.
You can prepare for concentration exams by taking corresponding Cisco training courses.
Your GNS3 Academy Instructor
Sikandar Shaik, a Triple CCIE (RS/SP# 35012), is a highly experienced and extremely driven senior technical instructor and network consultant.
He has been training networking courses for more than 15 years, teaching on a wide range of topics including Routing and Switching, Service Provider and Security (CCNA to CCIE).
In addition, he has been developing and updating the content for these courses.
He has assisted many engineers in passing out the lab examinations and securing certifications.
Sikandar Shaik is highly skilled at designing, planning, coordinating, maintaining, troubleshooting and implementing changes to various aspects of multi-scaled, multi-platform, multi-protocol complex networks as well as course development and instruction for a technical workforce in a varied networking environment.
His experience includes responsibilities ranging from operating and maintaining Network devices includes Routers, Switches, ASA firewalls & software’s relate to them for multi-faceted data communication networks in LAN, MAN and WAN environments.
Sikandar Shaik has delivered instructor led trainings in several states in India as well as in abroad in countries like China, Kenya. Maldives, Bangladesh and UAE.
He has also worked as a Freelance Cisco Certified Instructor globally for Corporate Major Clients.
Highly experienced and extremely driven senior technical instructor and network consultant.
Working as a Cisco Certified Instructor globally for Corporate Major Client’s to name a few:
- Dubai Airports
- Tech Mahindra
- AT & T
- OMAN AIrports
- Dheeragu (Maldives)
Deliver highly interactive classes and training online, with video, breakout sessions, and hands-on learning labs.
Worldwide delivery of authorized Cisco training courses CCNA to CCIE (R&S, security, service provider) for different Cisco Learning Partners.
Course Development of Cisco Authorized Course Material. Network Consulting for clients
Network Design, Support, Implementation and Troubleshooting of complex Cisco based networks in addition to Network Security Audits.
Deliver quality classroom instruction.
Plan for emerging technologies and prepare for new classes on on-going basis in coordination with company
GNS3 Academy Curriculum
StartWhat is Cryptography (3:40)
StartGoals of Cryptography (3:47)
StartWhat is Hashing and How it works (2:56)
StartHashing Drawbacks (2:15)
StartHashing with HMAC (3:16)
StartWhat is Encryption - Decryption (1:53)
StartEncryption Algorithms - Symmetric vs Asymmetric (5:26)
StartCrypt-analysis - Attacks (4:23)
StartAsymmetric Encryption - Drawbacks (3:13)
StartPublic Key Infrastructure - PKI (4:16)