Professional Documents
Culture Documents
. The goal of this learning matrix is to help you attain your goal to become certified by providing study resources tail
. It is intended to be used as a reference, and not to provide a complete list of all resources available. The matrix foc
. These widely available preparation resources can be in the form of specific chapters of books, Cisco Validated Desi
webinars, VoDs, SRNDs, white papers, case studies, design guides, Design TechNotes, reference guides, etc.
Disclaimer
. There is no guarantee that you will be able to pass the exam by only referring to material provided within this matr
. There are a lot of other resources (both internal and external) that cover the same exam topics. You are encouraged to use a
. This matrix should be considered a living document and taking into account the sheer amount of possible relevant content, t
. We encourage you to participate and engage with us, so if you have any suggestions for further content or any comments re
1.5. Pass?
Did you pass? Great! Did you not? Do not despair, do a lessons learned review and update your self-evaluation.
viding study resources tailored to your own needs.
es available. The matrix focusses primarely on Cisco and Cisco Press content.
ooks, Cisco Validated Design documents (CVDs), Cisco Live 365 presentations, courses,
erence guides, etc.
l provided within this matrix. But it will certainly improve your skills, which will serve as the foundation you need to build upon
You are encouraged to use any other resources at your own discretion during your exam preparation.
f possible relevant content, the objective here is to refine and improve this compilation of resources over time, so please refer to it freque
content or any comments regards to the current content, please let us know.
ral options might be provided to prepare to each topic, you might not need all of them.
e your self-evaluation.
on you need to build upon.
Task
ID
Infrastructure segmentation
2.5
methods
2.5.a VLAN
2.5.b PVLAN
2.5.c GRE
2.5.d VRF-Lite
Microsegmentation with Cisco
2.6
TrustSec using SFT and SXP
3 Security Infrastructure
3.1.a CoPP
3.1.b IP source routing
3.1.c iACLs
Management plane protection
3.2
techniques
3.2.a CPU
Certification-based authentication
4.12
using Cisco ISE
5.7.d Authentication
5.7.e Encryption
Training
Integrated Security Technologies and Solutions CCIE Security Practice Labs
Next Generation Technologies and Solutions CCIE Security Practice Labs
Network Security Technologies and Solutions CCIE Security Practice Labs
CCIE Security Practice Labs
CCIE Security Practice Labs
Cisco ISE for BYOD and Secure Unified Access CCIE Security Practice Labs
Cisco ISE for BYOD and Secure Unified Access CCIE Security Practice Labs
Cisco ISE for BYOD and Secure Unified Access CCIE Security Practice Labs
Cisco ISE for BYOD and Secure Unified Access CCIE Security Practice Labs
Cisco ISE for BYOD and Secure Unified Access CCIE Security Practice Labs
Cisco ISE for BYOD and Secure Unified Access CCIE Security Practice Labs
CCIE Security Practice Labs
CCIE Security Practice Labs
Cisco ISE for BYOD and Secure Unified Access CCIE Security Practice Labs
Cisco ISE for BYOD and Secure Unified Access CCIE Security Practice Labs
Cisco ISE for BYOD and Secure Unified Access CCIE Security Practice Labs
Cisco ISE for BYOD and Secure Unified Access CCIE Security Practice Labs
Cisco ISE for BYOD and Secure Unified Access CCIE Security Practice Labs
Cisco ISE for BYOD and Secure Unified Access CCIE Security Practice Labs
CCIE Security Practice Labs
Cisco ISE for BYOD and Secure Unified Access CCIE Security Practice Labs
Cisco ISE for BYOD and Secure Unified Access CCIE Security Practice Labs
Cisco ISE for BYOD and Secure Unified Access CCIE Security Practice Labs
Cisco ISE for BYOD and Secure Unified Access CCIE Security Practice Labs
Cisco ISE for BYOD and Secure Unified Access CCIE Security Practice Labs
Troubleshooting Guide
Troubleshooting Guide
VPN HA Guide
VPN Load Balancing
VLAN Guide
PVLAN Guide
GRE Tunnel Guide
VEF-lite Guide
CoPP Configuration
Configuring IP Services
Configuring iACLs
Configuring NETFLOW
Configuring SNMP
Logging
Events and Alarms
Configuring eStreamer
RFC 2827
WLC-ISE Configuration
MAB Guide
802.1X Guide
802.1X Guide
Guest Management
AD-ISE Integration
LDAP-ISE Integration
External RADIUS-ISE Integration
AnyConnect Guide
EAP-TLS Configuration
EAP-FAST and Chaining
MAR
ISE Configuration
AMP-WSA-ESA AMP
FMC Configuration Guide
AMP For Endpoints
WSA User Guide
ESA User Guide
SSL Decryption
Decryption Policies
SSL Decryption in Intelligent Proxy