CCIE Security (400-251 V5.0) Written Exam Prep Bundle

4.7 out of 5
4.7
14 reviews
ccie security 400-251 v5.0 written exam prep bundle

CCIE Security Written Exam Prep Bundle includes access to study guide (491 pages), and practice exams with free bi-weekly updates that include newer questions.

All of our practice exams are structured around Cisco official blueprint sections for CCIE Security track. Practice exams include quizzes based on blueprint sections or categories and several exam simulations that are modeled after real world tests.

This Bundle is part of our Membership (billed month-to-month or annually) which also allows you to access all other products available on our catalog as long as your subscription remains active. You can cancel your subscription at anytime. We accept all major Credit Cards and PayPal.




monthly plan 

good for taking one or more courses

pay as you go

online course content

cancel any time

$59/Month

billed Monthly




annual plan

Perfect for achieving multiple certifications

flexibility to train on your own schedule

ONLINE CONTENT + 5 PDF GUIDES TO DOWNLOAD (2,000 PAGES)


SAVE $300 (OR GET 5 EXTRA MONTHS)

$32/Month

$384 billed yearly

BEST VALUE

Perimeter Security and Intrusion Prevention

1
Lesson 1: Describe, implement, and troubleshoot HA features on Cisco ASA and Cisco FirePOWER Threat Defense (FTD)
30

1.1 Describe, implement, and troubleshoot HA features on Cisco ASA and Cisco FirePOWER Threat Defense (FTD)

2
Lesson 2: Describe, implement, and troubleshoot clustering on Cisco ASA and Cisco FTD
30

1.2 Describe, implement, and troubleshoot clustering on Cisco ASA and Cisco FTD

3
Lesson 3: Describe, implement, troubleshoot, and secure routing protocols on Cisco ASA and Cisco FTD
30

1.3 Describe, implement, troubleshoot, and secure routing protocols on Cisco ASA and Cisco FTD

4
Lesson 4: Describe, implement, and troubleshoot different deployment modes such as routed, transparent, single, and multicontext on Cisco ASA and Cisco FTD
30

1.4 Describe, implement, and troubleshoot different deployment modes such as routed, transparent, single, and multicontext on Cisco ASA and Cisco FTD

5
Lesson 5: Describe, implement, and troubleshoot firewall features such as NAT (v4,v6), PAT, application inspection, traffic zones, policy-based routing, traffic redirection to service modules, and identity firewall on Cisco ASA and Cisco FTD
30

1.5 Describe, implement, and troubleshoot firewall features such as NAT (v4,v6), PAT, application inspection, traffic zones, policy-based routing, traffic redirection to service modules, and identity firewall on Cisco ASA and Cisco FTD


6
Lesson 6: Describe, implement, and troubleshoot IOS security features such as Zone-Based Firewall (ZBF), application layer inspection, NAT (v4,v6), PAT and TCP intercept on Cisco IOS/IOS-XE
30

1.6 Describe, implement, and troubleshoot IOS security features such as Zone-Based Firewall (ZBF), application layer inspection, NAT (v4,v6), PAT and TCP intercept on Cisco IOS/IOS-XE

7
Lesson 7: Describe, implement, optimize, and troubleshoot policies and rules for traffic control on Cisco ASA, Cisco FirePOWER and Cisco FTD
30

1.7 Describe, implement, optimize, and troubleshoot policies and rules for traffic control on Cisco ASA, Cisco FirePOWER and Cisco FTD

8
Lesson 8: Describe, implement, and troubleshoot Cisco Firepower Management Center (FMC) features such as alerting, logging, and reporting
30

1.8 Describe, implement, and troubleshoot Cisco Firepower Management Center (FMC) features such as alerting, logging, and reporting

9
Lesson 9: Describe, implement, and troubleshoot correlation and remediation rules on Cisco FMC
30

1.9 Describe, implement, and troubleshoot correlation and remediation rules on Cisco FMC

10
Lesson 10: Describe, implement, and troubleshoot Cisco FirePOWER and Cisco FTD deployment such as in-line, passive, and TAP modes
30

1.10 Describe, implement, and troubleshoot Cisco FirePOWER and Cisco FTD deployment such as in-line, passive, and TAP modes

11
Lesson 11: Describe, implement, and troubleshoot Next Generation Firewall (NGFW) features such as SSL inspection, user identity, geolocation, and AVC (Firepower appliance)
30

1.11 Describe, implement, and troubleshoot Next Generation Firewall (NGFW) features such as SSL inspection, user identity, geolocation, and AVC (Firepower appliance)

12
Lesson 12: Describe, detect, and mitigate common types of attacks such as DoS/DDoS, evasion techniques, spoofing, man-in-the-middle, and botnet
30

1.12 Describe, detect, and mitigate common types of attacks such as DoS/DDoS, evasion techniques, spoofing, man-in-the-middle, and botnet

13
Key takeaways: Perimeter Security and Intrusion Prevention
5

Perimeter Security and Intrusion Prevention Key takeaways

14
Quiz: Perimeter Security and Intrusion Prevention
30

Perimeter Security and Intrusion Prevention Quiz

Advanced Threat Protection and Content Security

1
Lesson 1: Compare and contrast different AMP solutions including public and private cloud deployment models
30

2.1 Compare and contrast different AMP solutions including public and private cloud deployment models

2
Lesson 2: Describe, implement, and troubleshoot AMP for networks, AMP for endpoints, and AMP for content security (CWS, ESA, and WSA)
30

2.2 Describe, implement, and troubleshoot AMP for networks, AMP for endpoints, and AMP for content security (CWS, ESA, and WSA)

3
Lesson 3: Detect, analyze, and mitigate malware incidents
30

2.3 Detect, analyze, and mitigate malware incidents


4
Lesson 4: Describe the benefit of threat intelligence provided by AMP Threat GRID
30

2.4 Describe the benefit of threat intelligence provided by AMP Threat GRID


5
Lesson 5: Perform packet capture and analysis using Wireshark, tcpdump, SPAN, and RSPAN
30

2.5 Perform packet capture and analysis using Wireshark, tcpdump, SPAN, and RSPAN

6
Lesson 6: Describe, implement, and troubleshoot web filtering, user identification, and Application Visibility and Control (AVC)
30

2.6 Describe, implement, and troubleshoot web filtering, user identification, and Application Visibility and Control (AVC)

7
Lesson 7: Describe, implement, and troubleshoot mail policies, DLP, email quarantines, and SenderBase on ESA
30

2.7 Describe, implement, and troubleshoot mail policies, DLP, email quarantines, and SenderBase on ESA


8
Lesson 8: Describe, implement, and troubleshoot SMTP authentication such as SPF and DKIM on ESA
30

2.8 Describe, implement, and troubleshoot SMTP authentication such as SPF and DKIM on ESA

9
Lesson 9: Describe, implement, and troubleshoot SMTP encryption on ESA
30

2.9 Describe, implement, and troubleshoot SMTP encryption on ESA


10
Lesson 10: Compare and contrast different LDAP query types on ESA
30

2.10 Compare and contrast different LDAP query types on ESA


11
Lesson 11: Describe, implement, and troubleshoot WCCP redirection
30

2.11 Describe, implement, and troubleshoot WCCP redirection


12
Lesson 12: Compare and contrast different proxy methods such as SOCKS, Auto proxy/WPAD, and transparent
30

2.12 Compare and contrast different proxy methods such as SOCKS, Auto proxy/WPAD, and transparent


13
Lesson 13: Describe, implement, and troubleshoot HTTPS decryption and DLP
30

2.13 Describe, implement, and troubleshoot HTTPS decryption and DLP


14
Lesson: 14 Describe, implement, and troubleshoot CWS connectors on Cisco IOS routers, Cisco ASA, Cisco AnyConnect, and WSA
30

2.14 Describe, implement, and troubleshoot CWS connectors on Cisco IOS routers, Cisco ASA, Cisco AnyConnect, and WSA


15
Lesson 15: Describe the security benefits of leveraging the OpenDNS solution.
30

2.15 Describe the security benefits of leveraging the OpenDNS solution.


16
Lesson 16: Describe, implement, and troubleshoot SMA for centralized content security management
30

2.16 Describe, implement, and troubleshoot SMA for centralized content security management


17
Lesson 17: Describe the security benefits of leveraging Lancope
30

2.17 Describe the security benefits of leveraging Lancope

18
Key takeaways: Advanced Threat Protection and Content Security
5

Advanced Threat Protection and Content Security Key takeaways

19
Quiz: Advanced Threat Protection and Content Security
30

Advanced Threat Protection and Content Security Quiz


Secure Connectivity and Segmentation

1
Lesson 1: Compare and contrast cryptographic and hash algorithms such as AES, DES, 3DES, ECC, SHA, and MD5
30

3.1 Compare and contrast cryptographic and hash algorithms such as AES, DES, 3DES, ECC, SHA, and MD5

2
Lesson 2: Compare and contrast security protocols such as ISAKMP/IKEv1, IKEv2, SSL, TLS/DTLS, ESP, AH, SAP, and MKA
30

3.2 Compare and contrast security protocols such as ISAKMP/IKEv1, IKEv2, SSL, TLS/DTLS, ESP, AH, SAP, and MKA


3
Lesson 3: Describe, implement and troubleshoot remote access VPN using technologies such as FLEXVPN, SSL-VPN between Cisco firewalls, routers, and end hosts
30

3.3 Describe, implement and troubleshoot remote access VPN using technologies such as FLEXVPN, SSL-VPN between Cisco firewalls, routers, and end hosts


4
Lesson 4: Describe, implement, and troubleshoot the Cisco IOS CA for VPN authentication
30

3.4 Describe, implement, and troubleshoot the Cisco IOS CA for VPN authentication


5
Lesson 5: Describe, implement, and troubleshoot clientless SSL VPN technologies with DAP and smart tunnels on Cisco ASA and Cisco FTD
30

3.5 Describe, implement, and troubleshoot clientless SSL VPN technologies with DAP and smart tunnels on Cisco ASA and Cisco FTD


6
Lesson 6: Describe, implement, and troubleshoot site-to-site VPNs such as GETVPN, DMVPN and IPsec
30

3.6 Describe, implement, and troubleshoot site-to-site VPNs such as GETVPN, DMVPN and IPsec


7
Lesson 7: Describe, implement, and troubleshoot uplink and downlink MACsec (802.1AE)
30

3.7 Describe, implement, and troubleshoot uplink and downlink MACsec (802.1AE)


8
Lesson 8: Describe, implement, and troubleshoot VPN high availability using Cisco ASA VPN clustering and dual-hub DMVPN deployments
30

3.8 Describe, implement, and troubleshoot VPN high availability using Cisco ASA VPN clustering and dual-hub DMVPN deployments


9
Lesson 9: Describe the functions and security implications of cryptographic protocols such as AES, DES, 3DES, ECC, SHA, MD5, ISAKMP/IKEv1, IKEv2, SSL, TLS/DTLS, ESP, AH, SAP, MKA, RSA, SCEP/EST, GDOI, X.509, WPA, WPA2, WEP, and TKIP
30

3.9 Describe the functions and security implications of cryptographic protocols such as AES, DES, 3DES, ECC, SHA, MD5, ISAKMP/IKEv1, IKEv2, SSL, TLS/DTLS, ESP, AH, SAP, MKA, RSA, SCEP/EST, GDOI, X.509, WPA, WPA2, WEP, and TKIP


10
Lesson 10: Describe the security benefits of network segmentation and isolation
30

3.10 Describe the security benefits of network segmentation and isolation


11
Lesson 11: Describe, implement, and troubleshoot VRF-Lite and VRF-Aware VPN
30

3.11 Describe, implement, and troubleshoot VRF-Lite and VRF-Aware VPN


12
Lesson 12: Describe, implement, and troubleshoot microsegmentation with TrustSec using SGT and SXP
30

3.12 Describe, implement, and troubleshoot microsegmentation with TrustSec using SGT and SXP


13
Lesson 13: Describe, implement, and troubleshoot infrastructure segmentation methods such as VLAN, PVLAN, and GRE
30

3.13 Describe, implement, and troubleshoot infrastructure segmentation methods such as VLAN, PVLAN, and GRE


14
Lesson 14: Describe the functionality of Cisco VSG used to secure virtual environments
30

3.14 Describe the functionality of Cisco VSG used to secure virtual environments


15
Lesson 15: Describe the security benefits of data center segmentation using ACI, EVPN, VXLAN, and NVGRE
30

3.15 Describe the security benefits of data center segmentation using ACI, EVPN, VXLAN, and NVGRE

16
Key takeaways: Secure Connectivity and Segmentation
5

Secure Connectivity and Segmentation Key takeaways


17
Quiz: Secure Connectivity and Segmentation
30

Secure Connectivity and Segmentation Quiz


Identity Information Exchange and Access Control

1
Lesson 1: Describe, implement, and troubleshoot various personas of ISE in a multinode deployment
30

4.1 Describe, implement, and troubleshoot various personas of ISE in a multinode deployment

2
Lesson 2: Describe, implement, and troubleshoot network access device (NAD), ISE, and ACS configuration for AAA
30

4.2 Describe, implement, and troubleshoot network access device (NAD), ISE, and ACS configuration for AAA


3
Lesson 3: Describe, implement, and troubleshoot AAA for administrative access to Cisco network devices using ISE and ACS
30

4.3 Describe, implement, and troubleshoot AAA for administrative access to Cisco network devices using ISE and ACS


4
Lesson 4: Describe, implement, verify, and troubleshoot AAA for network access with 802.1X and MAB using ISE.
30

4.4 Describe, implement, verify, and troubleshoot AAA for network access with 802.1X and MAB using ISE.


5
Lesson 5: Describe, implement, verify, and troubleshoot cut-through proxy/auth-proxy using ISE as the AAA server
30

4.5 Describe, implement, verify, and troubleshoot cut-through proxy/auth-proxy using ISE as the AAA server


6
Lesson 6: Describe, implement, verify, and troubleshoot guest life cycle management using ISE and Cisco network infrastructure
30

4.6 Describe, implement, verify, and troubleshoot guest life cycle management using ISE and Cisco network infrastructure


7
Lesson 7: Describe, implement, verify, and troubleshoot BYOD on-boarding and network access flows with an internal or external CA
30

4.7 Describe, implement, verify, and troubleshoot BYOD on-boarding and network access flows with an internal or external CA


8
Lesson 8: Describe, implement, verify, and troubleshoot ISE and ACS integration with external identity sources such as LDAP, AD, and external RADIUS
30

4.8 Describe, implement, verify, and troubleshoot ISE and ACS integration with external identity sources such as LDAP, AD, and external RADIUS


9
Lesson 9: Describe ISE and ACS integration with external identity sources such as RADIUS Token, RSA SecurID, and SAML
30

4.9 Describe ISE and ACS integration with external identity sources such as RADIUS Token, RSA SecurID, and SAML


10
Lesson 10: Describe, implement, verify, and troubleshoot provisioning of AnyConnect with ISE and ASA
30

4.10 Describe, implement, verify, and troubleshoot provisioning of AnyConnect with ISE and ASA


11
Lesson 11: Describe, implement, verify, and troubleshoot posture assessment with ISE
30

4.11 Describe, implement, verify, and troubleshoot posture assessment with ISE


12
Lesson 12: Describe, implement, verify, and troubleshoot endpoint profiling using ISE and Cisco network infrastructure including device sensor
30

4.12 Describe, implement, verify, and troubleshoot endpoint profiling using ISE and Cisco network infrastructure including device sensor


13
Lesson 13: Describe, implement, verify, and troubleshoot integration of MDM with ISE
30

4.13 Describe, implement, verify, and troubleshoot integration of MDM with ISE


14
Lesson 14: Describe, implement, verify, and troubleshoot certificate based authentication using ISE
30

4.14 Describe, implement, verify, and troubleshoot certificate based authentication using ISE


15
Lesson 15: Describe, implement, verify, and troubleshoot authentication methods such as EAP Chaining and Machine Access Restriction (MAR)
30

4.15 Describe, implement, verify, and troubleshoot authentication methods such as EAP Chaining and Machine Access Restriction (MAR)


16
Lesson 16: Describe the functions and security implications of AAA protocols such as RADIUS, TACACS+, LDAP/LDAPS, EAP (EAP-PEAP, EAP-TLS, EAP-TTLS, EAP-FAST, EAP-TEAP, EAP- MD5, EAP-GTC), PAP, CHAP, and MS-CHAPv2
30

4.16 Describe the functions and security implications of AAA protocols such as RADIUS, TACACS+, LDAP/LDAPS, EAP (EAP-PEAP, EAP-TLS, EAP-TTLS, EAP-FAST, EAP-TEAP, EAP- MD5, EAP-GTC), PAP, CHAP, and MS-CHAPv2


17
Lesson 17: Describe, implement, and troubleshoot identity mapping on ASA, ISE, WSA and FirePOWER
30

4.17 Describe, implement, and troubleshoot identity mapping on ASA, ISE, WSA and FirePOWER


18
Lesson 18: Describe, implement, and troubleshoot pxGrid between security devices such as WSA, ISE, and Cisco FMC
30

4.18 Describe, implement, and troubleshoot pxGrid between security devices such as WSA, ISE, and Cisco FMC

19
Key takeaways: Identity Management, Information Exchange, and Access Control
5

Identity Management, Information Exchange, and Access Control Key takeaways

20
Quiz: Identity Management, Information Exchange, and Access Control
30

Identity Management, Information Exchange, and Access Control Quiz


Infrastructure Security Virtualization and Automation

1
Lesson 1: Identify common attacks such as Smurf, VLAN hopping, and SYNful knock, and their mitigation techniques
30

5.1 Identify common attacks such as Smurf, VLAN hopping, and SYNful knock, and their mitigation techniques


2
Lesson 2: Describe, implement, and troubleshoot device hardening techniques and control plane protection methods, such as CoPP and IP Source routing.
30

5.2 Describe, implement, and troubleshoot device hardening techniques and control plane protection methods, such as CoPP and IP Source routing.


3
Lesson 3: Describe, implement, and troubleshoot management plane protection techniques such as CPU and memory thresholding and securing device access
30

5.3 Describe, implement, and troubleshoot management plane protection techniques such as CPU and memory thresholding and securing device access


4
Lesson 4: Describe, implement, and troubleshoot data plane protection techniques such as iACLs, uRPF, QoS, and RTBH
30

5.4 Describe, implement, and troubleshoot data plane protection techniques such as iACLs, uRPF, QoS, and RTBH


5
Lesson 5: Describe, implement, and troubleshoot IPv4/v6 routing protocols security
30

5.5 Describe, implement, and troubleshoot IPv4/v6 routing protocols security


6
Lesson 6: Describe, implement, and troubleshoot Layer 2 security techniques such as DAI, IPDT, STP security, port security, DHCP snooping, and VACL
30

5.6 Describe, implement, and troubleshoot Layer 2 security techniques such as DAI, IPDT, STP security, port security, DHCP snooping, and VACL


7
Lesson 7: Describe, implement, and troubleshoot wireless security technologies such as WPA, WPA2, TKIP, and AES
30

5.7 Describe, implement, and troubleshoot wireless security technologies such as WPA, WPA2, TKIP, and AES


8
Lesson 8: Describe wireless security concepts such as FLEX Connect, wIPS, ANCHOR, Rogue AP, and Management Frame Protection (MFP)
30

5.8 Describe wireless security concepts such as FLEX Connect, wIPS, ANCHOR, Rogue AP, and Management Frame Protection (MFP)


9
Lesson 9: Describe, implement, and troubleshoot monitoring protocols such as NETFLOW/IPFIX, SNMP, SYSLOG, RMON, NSEL, and eSTREAMER
30

5.9 Describe, implement, and troubleshoot monitoring protocols such as NETFLOW/IPFIX, SNMP, SYSLOG, RMON, NSEL, and eSTREAMER


10
Lesson 10: Describe the functions and security implications of application protocols such as SSH, TELNET, TFTP, HTTP/HTTPS, SCP, SFTP/FTP, PGP, DNS/DNSSEC, NTP, and DHCP
30

5.10 Describe the functions and security implications of application protocols such as SSH, TELNET, TFTP, HTTP/HTTPS, SCP, SFTP/FTP, PGP, DNS/DNSSEC, NTP, and DHCP


11
Lesson 11: Describe the functions and security implications of network protocols such as VTP, 802.1Q, TCP/UDP, CDP, LACP/PAgP, BGP, EIGRP, OSPF/OSPFv3, RIP/RIPng, IGMP/CGMP, PIM, IPv6, and WCCP
30

5.11 Describe the functions and security implications of network protocols such as VTP, 802.1Q, TCP/UDP, CDP, LACP/PAgP, BGP, EIGRP, OSPF/OSPFv3, RIP/RIPng, IGMP/CGMP, PIM, IPv6, and WCCP


12
Lesson 12: Describe the benefits of virtualizing security functions in the data center using ASAv, WSAv, ESAv, and NGIPSv
30

5.12 Describe the benefits of virtualizing security functions in the data center using ASAv, WSAv, ESAv, and NGIPSv


13
Lesson 13: Describe the security principles of ACI such as object models, endpoint groups, policy enforcement, application network profiles, and contracts
30

5.13 Describe the security principles of ACI such as object models, endpoint groups, policy enforcement, application network profiles, and contracts


14
Lesson 14: Describe the northbound and southbound APIs of SDN controllers such as APIC-EM
30

5.14 Describe the northbound and southbound APIs of SDN controllers such as APIC-EM


15
Lesson 15: Identify and implement security features to comply with organizational security policies, procedures, and standards such as BCP 38, ISO 27001, RFC 2827, and PCI-DSS
30

5.15 Identify and implement security features to comply with organizational security policies, procedures, and standards such as BCP 38, ISO 27001, RFC 2827, and PCI-DSS


16
Lesson 16: Describe and identify key threats to different places in the network (campus, data center, core, edge) as described in Cisco SAFE
30

5.16 Describe and identify key threats to different places in the network (campus, data center, core, edge) as described in Cisco SAFE


17
Lesson 17: Validate network security design for adherence to Cisco SAFE recommended practices
30

5.17 Validate network security design for adherence to Cisco SAFE recommended practices


18
Lesson 18: Interpret basic scripts that can retrieve and send data using RESTful API calls in scripting languages such as Python
30

5.18 Interpret basic scripts that can retrieve and send data using RESTful API calls in scripting languages such as Python


19
Lesson 19: Describe Cisco Digital Network Architecture (Cisco DNA) principles and components.
30

5.19 Describe Cisco Digital Network Architecture (Cisco DNA) principles and components.

20
Key takeaways: Infrastructure Security, Virtualization, and Automation
5

Infrastructure Security, Virtualization, and Automation Key takeaways


21
Quiz: Infrastructure Security, Virtualization, and Automation
30

Infrastructure Security, Virtualization, and Automation Quiz


Evolving Technologies V1.1

1
Lesson 1: Cloud
30

1.0 Cloud

1.a Compare and contrast public, private, hybrid, and multi-cloud design considerations

1.a (i) Infrastructure, platform, and software as a service (XaaS)

1.a (ii) Performance, scalability, and high availability

1.a (iii) Security implications, compliance, and policy

1.a (iv) Workload migration

1.b Describe cloud infrastructure and operations

1.b (i) Compute virtualization (containers and virtual machines)

1.b (ii) Connectivity (virtual switches, SD-WAN and SD-Access)

1.b (iii) Virtualization functions (NFVi, VNF, and L4/L1)

1.b (iv) Automation and orchestration tools (cloud center, DNA-center, and Kubernetes)

2
Lesson 2: Network Programmability (SDN)
30

2.0 Network programmability (SDN)

2.a Describe architectural and operational considerations for a programmable network

2.a (i) Data models and structures (YANG, JSON and XML)

2.a (ii) Device programmability (gRPC, NETCONF and RESTCONF)

2.a (iii) Controller based network design (policy driven configuration and northbound/ southbound APIs)

2.a (iv) Configuration management tools (agent and agent-less) and version control systems (Git and

SVN)

3
Lesson 3: Internet of things (IoT)
30

3.0 Internet of things (IoT)

3.a Describe architectural framework and deployment considerations for Internet of Things (IoT)

3.a (i) IoT technology stack (IoT Network Hierarchy, data acquisition and flow)

3.a (ii) IoT standards and protocols (characteristics within IT and OT environment)

3.a (iii) IoT security (network segmentation, device profiling, and secure remote access)

3.a (iv) IoT edge and fog computing (data aggregation and edge intelligence)

4
Key takeaways: Evolving Technologies V1.1
5

Evolving Technologies V1.1 Key takeaways

5
Quiz: Evolving Technologies V1.1
30

Evolving Technologies V1.1 Quiz

Exam Simulations

1
Exam Simulation: CCIE Security #1
90

Exam Simulation: CCIE Security #1

2
Exam Simulation: CCIE Security #2
90

Exam Simulation: CCIE Security #2

3
Exam Simulation: CCIE Security #3
90

Exam Simulation: CCIE Security #3

4
Exam Simulation: CCIE Security #4
90

Exam Simulation: CCIE Security #4

5
Exam Simulation: CCIE Security #5
90

Exam Simulation: CCIE Security #5

This course is for Network Engineers, System Admins, DevOps and Developers who would like to level up their skill set to Cisco CCIE Security 400-251 V5.0.
You will need to have basic know-how of computer networking and Cisco products, preferably Cisco CCNA or CCNP certifications.
You will be able to understand concepts of Cisco Routing and Switching technologies. Additionally, you also will be able to tackle corresponding subject matter in the Cisco CCIE Security 400-251 V5.0 written exam.

Please refer to our content calendar for all content changes and announcements.

4.7
4.7 out of 5
14 Ratings

Detailed Rating

Stars 5
10
Stars 4
4
Stars 3
0
Stars 2
0
Stars 1
0

{{ review.user }}

{{ review.time }}
 

Show more
Please, login to leave a review
Add to Wishlist
Enrolled: 1509 students
Lectures: 101
Level: Advanced

Reviews and Testimonials

cciein8weeks reviews review legit

Excellent for people who don’t want to read the whole book and also quizzes are very useful to practice.

Christian Guzman, CO-Founder/COO
One Consulting S.A.S

The pdf is very helpful and contains a lot of knowledge that is not found in other products. The study plan and quizzes are excellent.

Guido Groeneweg, Sr. Consultant
YaWorks

The best material available today for CCIE Written preparation!

Ronaldo Cesar, Analista de Redes
TECHNET-WIFI TELECOM

Very useful content

Prem Jeevarathinam, Associate Architect, Cloud R&D
NTT Communications CIS

Small investment for a larger return! The CCIE DC All In One Membership has been an essential resource in studying for my CCIE Datacenter Written exam. This product alone takes the abundance of criteria outlined in the exam blueprint and condenses the essential material into a Study Guide and Practice exams which provide a real-time experience in preparation for your exam. Highly recommended!

Benny Henderson, Cloud Platform Architect
World Wide Technology

Useful, a wide range of questions and good structure.

Ivo Nemecek, Director, Project Division
Simac Technik ČR, a.s.

Great study materials. Very thorough and complete. Extensive coverage of the topics. There is a lot to review, and will take some time, but if you complete all of it, you will be well prepared. Well worth the price.

Kendal Gabel

I came across this site while preparing to sit for my CCIE R&S exam. I have studied the material in depth before, but needed something that would give me a concise overview and an easy to follow map to quickly find the content I need to review. The study guide material is put together very well and organized by exam topic, which is exactly what I needed. There are also links to documentation for further reading where necessary. The exam questions are also great to further your retention of the material. The study guide has been a valuable preparation resource.

Mark Bellville, Network Engineer
Hy-Vee

Well structured and very helpful

David Muliro, Principal
Safaricom

CCIEin8Weeks is the product to use if you are going to be passing the CCIE Written! Thank you for the book, the great customer service and the abundance of information!

Jeromy Polachak, Sr. Network Engineer
General Dynamics

I am shocked and amazed at the amount of material that I have now for my CCIE written, It has cut down on the time for collecting right resources for the prep. It is a perfect place with all resources like full documentation, Videos and practice tests.

Mohammed Irfan, Senior Manager GPON Network Expansion
Transworld

Great product, well organized study guide and the quiz questions lead you in the right direction to further study.

Nicholas Garde, Network Administrator
Paycom

Excellent material to study for CCIE Written. I recommend it to all who want to learn for CCIE

Urs Weber, Network Engineer
Swisscom

The CCIE R&S definitely provides great, precise and complete training materials. I am highly impressed by the complete training materials as preparation not only for CCIE R&S but also helps a lot on review for CCNA R&S. This is awesome and I will definitely recommend this to my teammates and friends.

Robin Familara, Network Engineer
NetBrain

Three days studying this material and I feel comfortable and sure that I’ll pass the written exam!

Andrea Capalbo, Design Engineer
Telefónica

Very clear and concise content. I really appreciated the video content and how they understood that some of the material could be dry, so they tried to mix it up a bit by adding “fun facts” to the content. I would recommend and will be purchasing other material in the future.

Jeff Rapini, Sr. Solutions Architect
ePlus inc.

Study guide provides concise information for all areas of exam and provides a link to more details for each section. I would recommend to anyone that is ready to take the written but wants to review main points before taking.

Eric Schmitz

Good product in market to pass CCIE written and contains good amount of information

Siddharth Choudhary

I stumbled on this site by accident a few months ago, and since then my study for CCIE Written for R&S has never been much easier. Of particular interest is the Evolving Technologies section. I am yet to come across any CCIE learning sites that have better content than those in this guide for the new Evolving Technologies. I would definitely recommend to anyone wishing to undertake the written exam.

Austin Okpaleke, Network Engineer
Vodafone

I am reasonably impressed with the content in this book, to help kickstart my certification efforts.

Alvin Aung, Senior Network Consultant
Infosys Public Services

Great Study Guides!

Jose Venegas, Computer Engineer Integrator
ICF

I am an CCIE R&S. This product really helps me re-certify my license. The product has very realistic problems with links to useful documents. It lists a lot of problems that cover all necessary topics. In short, studying these materials really make me study and well prepare me for the test!

Beomsu Kim, CCIE #16814

I highly recommend this study material. It helped me pass the CCIE Collab Written exam a few weeks ago. I agree with the other reviewers – it’s definitely the best study material out there (besides Cisco guides).

Dionne Danvers, Consulting Engineer Unified Communications & Collaboration
CDW

Excellent test prep for CCIE written exam. Really like that when you get answer wrong it has link to documentation with explanations. Also, a plus is the test questions are updated frequently!

Justin Priebe

So far, this has exceeded my expectations. I was struggling with studying for the 400-101 in a methodical manner and now I have a dedicated study schedule with material that doesn’t run down rabbit holes.

Kenny Keefover

I was very impressed with the structure of the study guide for R&S. Used in addition to other materials this package is a brilliant resource.

Robert Grant, Consulting Engineer
Ping Network Solutions

I have used CCIEin8Weeks to prepare for CCIE CCIE Data Center 400-151 and I find the product excellent preparation material, highly recommend it.

Martin McGannon, VP Network Architecture
State Stree

Very well put together, and thought out, Move along a good pace, and explains exactly what you need to know. Great refresher for those that have already passed, but are looking to pass again for re-cert. I would recommend this guide!

Jay Stanley, Sr. Systems Engineer
ConvergeOne

A very nice reference PDF for CCIE Security Studies. Hits all of the topics listed in the blueprint, and has become a helpful resource in my studies.

Charles Judd, Technical Instructor
KWT, LLC.

The study guide provides a nice breakdown of the blueprint with links to additional reference material which provides a good refresher. The study plans are a nice touch and help keep you on track when you have a busy schedule.

Stephen Ransome, CCIE #41102
Ranix Data Communications

Well compiled content for preparation of the exam and understanding of concepts relevant to the Course. Well articulated for preparing one to take on the exam

Alex Ikuha, Principal
Safaricom PLC