(Implementing Cisco Edge Network Security Solutions (300-206

Exam Description: The Implementing Cisco Edge Network Security (SENSS) (300-206) exam tests the knowledge of a network security engineer to configure and implement security on Cisco network perimeter edge devices such as a Cisco switch, Cisco router, and Cisco ASA firewall. This 90-minute exam consists of 65-75 questions and focuses on the technologies used to strengthen security of a network perimeter such as Network Address Translation (NAT), ASA policy and application inspect, and a zonebased firewall on Cisco routers. Candidates can prepare for this exam by taking the Cisco Edge Network Security (SENSS) course   

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

سرفصل ها

1.0 Threat Defense
 1.1 Implement firewall (ASA or IOS depending on which supports the implementation)
 1.2 Implement Layer 2 Security
 1.3 Configure device hardening per best practices

2.0 Cisco Security Devices GUIs and Secured CLI Management
 2.1 Implement SSHv2, HTTPS, and SNMPv3 access on the network devices
 2.2 Implement RBAC on the ASA/IOS using CLI and ASDM
 2.3 Describe Cisco Prime Infrastructure
 2.4 Describe Cisco Security Manager (CSM)
 2.5 Implement Device Managers

3.0 Management Services on Cisco Devices
 3.1 Configure NetFlow exporter on Cisco Routers, Switches, and ASA
 3.2 Implement SNMPv3
 3.3 Implement logging on Cisco Routers, Switches, and ASA using Cisco best practices
 3.4 Implement NTP with authentication on Cisco Routers, Switches, and ASA  
 3.5 Describe CDP, DNS, SCP, SFTP, and DHCP

4.0 Troubleshooting, Monitoring and Reporting Tools
 4.1 Monitor firewall using analysis of packet tracer, packet capture, and syslog

5.0 Threat Defense Architectures
 5.1 Design a Firewall Solution
 5.2 Layer 2 Security Solutions

6.0 Security Components and Considerations
 6.1 Describe security operations management architectures
 6.2 Describe Data Center security components and considerations
 6.3 Describe Collaboration security components and considerations
 6.4 Describe common IPv6 security considerations