S.No. CCIE Security Written Exam Topics v4.0 Part I Infrastructure, Connectivity, Communications, Network Security 1 Network Addressing Basics 2 OSI Layers 3 TCP/UDP/IP Protocols 4 LAN Switching (e.g. VTP, VLANs, Spanning Tree, Trunking) 5 Routing Protocols (RIP, EIGRP, OSPF, and BGP) (a) Basic Functions/Characteristics (b) Security Features 6 Tunneling Protocols (a) GRE (b) NHRP (c) v6 Tunnel Types 7 IP Multicast (a) PIM (b) Multi Src Disc Protocol (c) IGMP/CGMP (d) Multi Listener Discovery 8 Wireless (a) SSID (b) Authentication/Authorization (c) Rogue Aps (d) Session Establishment 9 Authentication/Authorization Technologies (a) Single Sign-on (b) OTPs (c) LDAP/AD (d) Role Based Access Control 10 VPNs (a) L2 vs L3 (b) MPLS/VRFs/Tag switching 11 MobileIP Networks Part II Security Protocols 1 Rivest, Shamir and Adleman (RSA) 2 Rivest Cipher 4 (RC4) 3 Message Digest 5 (MD5) 4 Secure Hash Algorithm (SHA) Page 1
Page 2 5 Data Encryption Standard (DES) 6 Triple DES (3DES) 7 Advanced Encryption Standard (AES) 8 IP Security (IPsec) 9 Internet Security Association and Key Management Protocol (ISAKMP) 10 Internet Key Exchange IKE/IKEv2 11 Group Domain of Interpretation (GDOI) 12 Authentication Header (AH) 13 Encapsulating Security Payload (ESP) 14 Certificate Enrollment Protocol (CEP) 15 Transport Layer Security TLS/DTLS 16 Secure Socket Layer (SSL) 17 Secure Shell (SSH) 18 Remote Authentication Dial In User Service (RADIUS) 19 Terminal Access Controller Access-Control System Plus (TACACS+) 20 Lightweight Directory Access Protocol (LDAP) 21 EAP Methods (e.g. EAP-MD5, EAP-TLS, EAP-TTLS, EAP-FAST, PEAP, LEAP) 22 Public Key Infrastructure (PKI)/PKIX/PKCS 23 802.1X 24 WEP/WPA/WPA2 25 Web Cache Communication Protocol (WCCP) 26 Secure Group Tagging Exchange Protocol (SXP) 27 MacSec 28 DNSSec Part III Application and Infrastructure Security 1 Hypertext Transfer Protocol (HTTP) 2 Hypertext Transfer Protocol Secure (HTTPS) 3 Simple Mail Transfer Protocol (SMTP) 4 Dynamic Host Configuration Protocol (DHCP) 5 Domain Name System (DNS) 6 File Transfer Protocol (FTP/SFTP) 7 Trivial File Transfer Protocol (TFTP) 8 Network Time Protocol (NTP) 9 Simple Network Management Protocol (SNMP) 10 Syslog 11 Netlogon,Netbios,SMB 12 RPCs 13 RDP/VNC
14 PCoIP 15 OWASP 16 Basic unnecessary services Part IV Threats, Vulnerability Analysis and Mitigation 1 Recognizing and mitigating common attacks (a) ICMP attacks, PING floods (b) MITM (c) Replay (d) Spoofing (e) Backdoor (f) Botnets (g) Wireless attacks (h) DoS/DDoS Attacks (i) Virus and Worms Outbreaks (j) Header Attacks (k) Tunneling attacks 2 Software/OS Exploits 3 Security/Attack Tools 4 Generic Network Intrusion Prevention Concepts 5 Packet Filtering 6 Content Filtering/Packet Inspection 7 Endpoint/Posture Assessment 8 QoS marking attacks Part V Cisco Security Products, Features and Management 1 Cisco Adaptive Security Appliance (ASA) (a) Firewall Functionality (b) Routing/Multicast Cababilities (c) Firewall modes (d) NAT - Pre 8.4/Post 8.4 (e) Object Definition/ACLs (f) MPF functionality (IPS/QoS/Application Awareness) (g) Context Aware Firewall (h) Identity Based Services (i) Failover Options Page 3
Page 4 2 Cisco IOS Firewalls and NAT (a) CBAC (b) Zone-Based Firewall (c) Port-to-Application Mapping (d) Identity Based Firewalling 3 Cisco Intrusion Prevention Systems (IPS) 4 Cisco IOS IPS 5 Cisco AAA Protocols and Application (a) RADIUS (b) TACACS+ (c) Device Admin (d) Network Access (e) 802.1X (f) VSAs 6 Cisco Identity Services Engine 7 Cisco Secure ACS Solution Engine 8 Cisco Network Admission Control (NAC) Appliance Server 9 Endpoint/Client (a) Cisco AnyConnect VPN Client (b) Cisco VPN Client (c) Cisco Secure Desktop (CSD) (d) NAC Agent 10 Secure Access Gateways (Cisco IOS Router/ASA) (a) IPsec (b) SSL VPN (c) PKI 11 Virtual Security Gateway 12 Cisco Catalyst 6500 Series Security Services Modules 13 Scansafe Functionality&Components 14 IronPort Products 15 Security Management (a) Cisco Security Manager (CSM) (b) Cisco Adaptive Security Device Manager (ASDM) (c) Cisco IPS Device Manager (IDM) (d) Cisco IPS Manager Express (IME) (e) Cisco Configuration Professional (CCP) (f) Cisco Prime
Part VI Cisco Security Technologies and Solutions 1 Router Hardening Features (e.g. CoPP, MPP. urpf, PBR) 2 Switch Security Features (e.g. anti-spoofing, port, STP, MacSec,NDAC,NEAT) 3 NetFlow 4 Wireless Security 5 Network Segregation (a) VRF-aware technologies (b) VXLAN 6 VPN Solutions (a) FlexVPN (b) Dynamic Multipoint VPN (DMVPN) (c) Group Encrypted Transport VPN (GETVPN) (d) EasyVPN 7 Content and Packet Filtering 8 QoS application for security 9 Load Balancing & Failover Part VII Security Policies and Procedures, Best Practices, Standards 1 Security Policy Elements 2 Information Security Standards (e.g. ISO/IEC 27001, ISO/IEC 27002) 3 Standards Bodies (e.g. ISO, IEC, ITU, ISOC, IETF, IAB, IANA, ICANN) 4 Industry Best Practices (e.g. SOX, PCI DSS) 5 Common RFC/BCP (e.g. RFC2827/BCP38, RFC3704/BCP84,RFC5735) 6 Security Audit & Validation 7 Risk Assessment 8 Change Management Process 9 Incident Response Framework 10 Computer Security Forensics 11 Desktop Security Risk Assessment/Desktop Security Risk Management Page 5