1-877-224-8987 | Contact Us

CCIE Security Workbooks

CCIE Security v4 Workbooks Bundle

INE’s CCIE Security v4 Workbook Bundle combines our Technologies and Practice Labs workbooks into an online interactive compilation of hands-on lab scenarios that guides you through all the technologies covered by the v4 blueprint and offers the building blocks for becoming a true expert and obtaining your CCIE.

The CCIE Security v4 Technologies Workbook lays the foundational knowledge you’ll need if you’re preparing for the lab exam, have an upcoming security implementation project with ASA firewalls, IOS routers and switches, web security appliances, an intrusion prevention system, and access control system or Identity Services Engine, or simply want to gain real experience with these cutting-edge technologies, this workbook is for you.

The CCIE Security v4 Practice Labs Workbook contains five detailed full-scale labs based on the actual CCIE Security Lab Exam. It follows a structured design that covers all topic domains from the current blueprint, and it is scoped to test you on your knowledge of the interaction between different technologies within a given network topology as well as building the network and making it functional according to given requirements. This workbook is an essential part of your final test preparation phase, after you have gained a solid understanding of all concepts from other self-paced materials such as the CCIE Security Advanced Technologies v4 video course download and the CCIE Security v4 Technologies Workbook.

Workbook Bundle Includes:

CCIE Security v4 Technologies Workbook
CCIE Security v4 Practice Labs Workbook
($598 Value)

Section 1: System Hardening and Availability

  • IOS RIPv2 Authentication
  • IOS OSPFv2 Authentication
  • IOS OSPFv3 Authentication and Encryption
  • IOS EIGRP Authentication
  • IOS BGP Authentication
  • IOS Routing Protocol Filtering
  • IOS Control Plane Policing
  • IOS Control Plane Protection
  • IOS Management Plane Protection
  • IOS Device Hardening
  • IOS CPU Protection Mechanisms
  • IOS File System Security
  • IOS IPv4 Selective Packet Discard
  • IOS IPv6 Selective Packet Discard
  • IOS Transit Traffic Control with FPM
  • IOS Congestion Management
  • IOS RITE and RMON
  • IOS Message Logging
  • IOS Banners
  • IOS Network Time Protocol
  • IOS NTP Access Control
  • IOS SNMPv2
  • IOS SNMPv3
  • IOS BGP TTL Security Hack
  • IOS RTBH Destination Based
  • IOS RTBH Source Based

Section 2: Threat Identification and Mitigation

  • Section 2 Introduction
  • Switch Dynamic Trunking Protocol
  • Switch Port Security
  • Switch Storm Control
  • Switch Port Blocking
  • Switch Private VLAN
  • Switch Private VLAN Propagation
  • Switch Port ACL
  • Switch MAC ACL
  • Switch VLAN ACL
  • Preventing STP Attacks Using BPDU Guard
  • Preventing STP Attacks Using BPDU Filter
  • Preventing STP Attacks Using Root Guard
  • Preventing STP Loops Using Loop Guard
  • Preventing DHCP Attacks Using DHCP Snooping
  • Preventing DHCP Attacks Using Port-Security
  • Preventing ARP Attacks Using Dynamic ARP Inspection
  • Preventing Attacks Using IP Source Guard
  • Preventing VLAN Hopping Attacks
  • Preventing ICMP Attacks Using ACL
  • Preventing ICMP Attacks Using NBAR
  • Preventing ICMP Attacks Using Policing
  • Preventing ICMP Attacks Using MPF
  • Preventing SYN Attacks Using ACL
  • Preventing SYN Attacks Using Policing
  • Preventing SYN Attacks Using CBAC
  • Preventing SYN Attacks Using CAR
  • Preventing Application Attacks Using MPF
  • Preventing IP Spoofing Attacks Using uRPF
  • Preventing Fragment Attacks Using ACL
  • Implementing RFC 1918 Anti-Spoofing Filtering
  • Implementing RFC 2827 Anti-Spoofing Filtering
  • Implementing RFC 3330 Anti-Spoofing Filtering
  • IOS TCP Intercept
  • IOS TCP Intercept Watch Mode
  • ASA TCP Intercept
  • IOS NBAR Traffic Classification
  • IOS Netflow Statistics
  • IOS Advanced FPM
  • IPv6 RA Guard
  • IPv6 DHCPv6 Guard
  • IPv6 Snooping
  • IPv6 Secure Neighbor Discovery

Section 3: Intrusion Prevention and Content Security

  • IPS Initialization
  • IPS Management Access
  • IPS Inline Interface Pair
  • IPS Inline VLAN Pair
  • IPS Promiscuous Mode
  • IPS Custom Signature
  • IPS Inline Blocking
  • IPS TCP Reset
  • IPS Blocking and Rate-Limiting
  • IPS Event Summarization
  • IPS Event Processing
  • IPS Application Inspection and Control
  • IPS Meta Engine
  • IPS Anomaly Detection
  • WSA Setup Wizard
  • WSA Management Access
  • WSA Explicit Forward Mode
  • WSA Active Directory Integration
  • WSA Transparent Mode with Switch
  • WSA Transparent Mode with Router
  • WSA Transparent Mode with ASA

Section 4: Identity Management

  • ASA Local Authentication
  • ASA Local Command Authorization
  • ASA RADIUS Authentication
  • ASA LDAP Authentication
  • ASA TACACS Command Authorization and Accounting
  • ASA Cut-Through Proxy Authentication
  • ASA Cut-Through Proxy RADIUS Authorization
  • ASA Cut-Through Proxy TACACS Authorization
  • IOS Local Authentication
  • IOS Local Command Authorization
  • IOS Role-Based CLI Access
  • IOS RADIUS Authentication
  • IOS LDAP Authentication
  • IOS TACACS Command Authorization and Accounting
  • IOS Authentication Proxy Local AAA
  • IOS Authentication Proxy Using RADIUS
  • IOS Authentication Proxy Using TACACS
  • Installing ACS Certificates
  • Installing ISE Certificates
  • MAB Using ACS
  • MAB Using ISE
  • PEAP (EAP-MSCHAPv2) Using ACS and AD
  • PEAP (EAP-MSCHAPv2) Using ISE and AD
  • PEAP (EAP-TLS) Using ACS
  • PEAP (EAP-TLS) Using ISE
  • EAP-FAST (EAP-MSCHAPv2) Using ACS
  • EAP-FAST (EAP-MSCHAPv2) Using ISE
  • NEAT Using ACS
  • NEAT Using ISE
  • ISE Profiling
  • ISE Central Web Authentication
  • Local Web Authentication Using ACS
  • Local Web Authentication Using ISE
  • ISE CPP and Posture Assessment
  • MACsec Downlink
  • MACsec Uplink Manual

Section 5: Perimeter Security and Services – ASA Firewall

  • ASA Basic Configuration
  • ASA Interface High Availability
  • ASA Basic Access-Lists
  • ASA Object-Group Access-Lists
  • ASA Identity Firewall
  • ASA Reliable Static Routing
  • ASA RIPv2 Routing
  • ASA OSPFv2 Routing
  • ASA EIGRP Routing
  • ASA Route Redistribution
  • ASA Stub Multicast Routing
  • ASA PIM Multicast Routing
  • ASA Static NAT and PAT
  • ASA Static Policy NAT and PAT
  • ASA Dynamic NAT and PAT
  • ASA Dynamic Policy NAT and PAT
  • ASA Outside Dynamic NAT
  • ASA NAT Control
  • ASA Legacy DNS Doctoring
  • ASA DNS Doctoring
  • ASA Firewall Contexts
  • ASA Active-Standby Failover
  • ASA Active-Active Failover
  • ASA Asymmetric Routing
  • ASA Contexts Traffic Classification
  • ASA Contexts Resource Management
  • ASA uRPF
  • ASA Traffic Policing
  • ASA Low Latency Queuing
  • ASA Traffic Shaping
  • ASA Hierarchical Queuing
  • ASA URL Filtering
  • ASA HTTP Inspection
  • ASA SMTP Inspection
  • ASA TCP Inspection
  • ASA Management Traffic Inspection
  • ASA Network Time Protocol
  • ASA System Logging
  • ASA Log Filtering
  • ASA SNMP Monitoring
  • ASA DHCP Server
  • ASA IDENT Handling
  • ASA Fragmented Traffic
  • ASA ICMP Traffic
  • ASA Threat Detection
  • ASA Transparent Firewall
  • ASA EtherType Access-Lists
  • ASA ARP Inspection
  • ASA Transparent NAT

Section 6: Perimeter Security and Services – IOS Firewall

  • IOS Basic Access-Lists
  • IOS Time-Based Access-Lists
  • IOS Dynamic Access-Lists
  • IOS Reflexive Access-Lists
  • CBAC Routed Firewall
  • CBAC Transparent Firewall
  • CBAC Tuning
  • CBAC URL Filtering
  • CBAC Application Inspection
  • CBAC High Availability
  • ZBPF Routed Mode
  • ZBPF Transparent Mode
  • ZBPF Tuning
  • ZBPF Application Inspection
  • ZBPF High Availability
  • ZBPF Asymmetric Routing
  • ZBPF User Based Firewall Using ACS
  • ZBPF User Based Firewall Using ISE
  • ZBPF Legacy User Based Firewall
  • ZBPF Secure Group Firewall
  • IOS Static NAT
  • IOS Dynamic NAT
  • IOS Overload NAT
  • IOS Outside NAT
  • IOS NVI NAT
  • IOS Stateful NAT
  • IOS Policy Routing
  • IOS Local Policy Routing
  • IOS Classification and Marking

Section 7: Confidentiality and Secure Access

  • PKI Infrastructure Overview
  • PKI Server on ASA Firewall
  • PC Enrollment with ASA PKI
  • RSA Key Management on IOS Router
  • PKI Server on IOS Router
  • PKI Server High Availability on IOS Router
  • PC Enrollment with IOS PKI
  • IKEv1 L2L Between IOS Routers with Crypto Map and PSK
  • IKEv1 L2L Between IOS Routers with Crypto Map and PKI
  • IKEv1 L2L Between IOS Routers with ISAKMP Defaults
  • IKEv1 L2L Between IOS Routers with ISAKMP Profile
  • IKEv1 L2L Between IOS Routers with SVTI and PSK
  • IKEv1 L2L Between IOS Routers with SVTI and PKI
  • IKEv1 L2L Between IOS and ASA with PSK in Main Mode
  • IKEv1 L2L Between IOS and ASA with PSK in Aggressive Mode
  • IKEv1 L2L Between IOS and ASA with PKI
  • IKEv1 L2L Between IOS and ASA with Certificate Map
  • IKEv1 GRE over IPsec with Crypto Map and PSK
  • IKEv1 GRE over IPsec with IPsec Profiles and PSK
  • IKEv1 VRF Aware VPN with Crypto Map and Global FVRF
  • IKEv1 VRF Aware VPN with Crypto Map and Custom FVRF
  • IKEv1 VRF Aware VPN with IPsec Profiles and Global FVRF
  • IKEv1 VRF Aware VPN with IPsec Profiles and Custom FVRF
  • IKEv1 VPN High Availability with Backup Peers
  • IKEv1 VPN High Availability with Loopback Peers
  • IKEv1 VPN High Availability with Crypto Map and RRI
  • IKEv1 VPN High Availability with GRE over IPsec
  • IKEv1 VPN High Availability with Crypto Map and SSO
  • IKEv1 VPN High Availability with GRE over IPsec and SSO
  • IKEv1 IOS EzVPN Server with Crypto Map and PSK
  • IKEv1 IOS EzVPN Server with ISAKMP Profiles
  • IKEv1 IOS EzVPN Server with DVTI and PSK
  • IKEv1 IOS EzVPN Server with Group Lock
  • IKEv1 IOS EzVPN Remote in Client Mode with PSK
  • IKEv1 IOS EzVPN Remote in NEM Plus Mode with PSK
  • IKEv1 IOS EzVPN Remote in NEM Plus Mode with DVTI
  • IKEv1 IOS EzVPN Remote in NEM Mode with PKI
  • IKEv1 ASA EzVPN Server with PSK
  • IKEv1 ASA EzVPN Server DHCP Address Allocation
  • IKEv1 DMVPN Phase1 with PSK
  • IKEv1 DMVPN Phase2 with PSK
  • IKEv1 DMVPN Phase3 with PSK
  • IKEv1 DMVPN NAT Aware with PSK
  • IKEv1 GETVPN Unicast Rekey with PSK
  • IKEv1 DMVPN and GETVPN Integration
  • IKEv1 GETVPN Key Server Redundancy
  • IKEv2 L2L Between IOS Routers with SVTI and PSK
  • IKEv2 L2L Between IOS Routers with DVTI and PKI
  • IKEv2 FlexVPN Server and Client with PSK
  • IKEv2 FlexVPN Spoke to Spoke with PSK
  • IKEv2 L2L Between IOS and ASA with PSK
  • IKEv2 AnyConnect on ASA with EAP
  • ASA Basic Clientless SSL VPN
  • ASA Clientless SSL VPN Port Forwarding
  • ASA Clientless SSL VPN Smart Tunnel
  • ASA AnyConnect SSL VPN with AAA
  • ASA AnyConnect SSL VPN with PKI
  • IOS AnyConnect SSL VPN with AAA
  • IOS Basic Clientless SSL VPN
  • IOS Clientless SSL VPN Port Forwarding

Section 8: Wireless Security

  • WLC Initialization
  • WLC TACACS Authentication
  • WLC RADIUS Authentication
  • WLC Rogue Management
  • LAP Authorization
  • LAP 802.1x Authentication
  • LAP Local Mode
  • LAP FlexConnect Mode
  • PEAP (EAP-MSCHAPv2) Local Mode
  • PEAP (EAP-MSCHAPv2) FlexConnect Mode
  • WLC Local Web Authentication
  • WLC Central Web Authentication
  • WLC Wireless IPS

Purchase Individually

CCIE Security v4 Technologies Workbook

INE’s CCIE Security v4 Technologies Workbook is an online interactive compilation of hands-on lab scenarios that guides you through all the technologies covered by the v4 blueprint and offers the building blocks for becoming a true expert and obtaining your CCIE. Whether you are preparing for the CCIE lab exam, have an upcoming security implementation project with ASA firewalls, IOS routers and switches, web security appliances, an intrusion prevention system, and access control system or Identity Services Engine, or simply want to gain real experience with these cutting-edge technologies, this workbook is for you.

Learn More

CCIE Security v4 Practice Labs Workbook

The CCIE Security v4 Practice Labs Workbook is an online interactive compilation of five detailed full-scale labs based on the actual CCIE Security Lab Exam. It follows a structured design that covers all topic domains from the current blueprint, and it is scoped to test you on your knowledge of the interaction between different technologies within a given network topology as well as building the network and making it functional according to given requirements. This workbook is an essential part of your final test preparation phase, after you have gained a solid understanding of all concepts from other self-paced materials such as the CCIE Security Advanced Technologies v4 video course download and the CCIE Security v4 Technologies Workbook.

Learn More

Customer Testimonials

“I could not have completed this journey without the INE workbooks.”
Christopher Allen/CCIE #43325
“INE’s materials gave me a solid foundation on different technologies that played a big role in passing my LAB exam in just one take.”
Rico Dagson/CCIE #41114
Contact Us
INE Logo

Our staff is looking forward to assisting you! Please call 1-877-224-8987 EXT 1 or fill out the form below to have a training advisor contact you.






Get the latest news from INE and 10% OFF your first order!

Subscribe now to hear about all the latest news, product releases and promotions, and get a 10% OFF coupon for your first order. 10% OFF discount excludes Team Training and Bootcamps.

We hate spam as much as you do and will never sell your info to a third party.
#GetCertified2K17: Reach your New Year's Resolution Goals with a $450+ Savings on all CCNA and CCNP Training Bootcamps! Use Coupon Code: START2K17 at Checkout!
Ends Today! Get a FREE NetGear NIGHTHAWK X4S Router with any 1 or 2 Year All Access Pass! Learn More