| Security Architecture |
Enterprise security design models Defense-in-depth strategy Secure network segmentation |
| Network Security Fundamentals |
Threat vectors & attack types Security policies & best practices Risk management concepts |
| Cisco Firewalls |
Cisco Secure Firewall architecture Access control policies NAT & VPN fundamentals |
| Identity & Access Control |
Cisco ISE architecture 802.1X authentication AAA & TACACS+ administration |
| Secure Connectivity (VPNs) |
Site-to-site IPsec VPNs Remote access VPNs Encryption & key management |
| Network Security Services |
IDS/IPS concepts URL filtering & malware protection Email & web security |
| Endpoint Security |
Endpoint protection fundamentals Zero Trust concepts Posture assessment |
| Secure Network Access |
Secure wireless authentication Guest & BYOD access models Policy enforcement |
| Automation & Programmability |
Security automation concepts REST APIs Policy orchestration basics |
| Monitoring & Incident Response |
Security monitoring tools Log analysis & correlation Incident response workflows |
| Operations & Troubleshooting |
Firewall & ISE troubleshooting Policy validation Security operations best practices |
| Hands-On Labs |
Firewall & VPN labs ISE policy labs Access control & threat mitigation |
| Exam Preparation |
CCNP Security exam structure Scenario-based practice Mock exams & final review |