BEST CCIE Security Certification Training | Emigo
ccna-banner-image

CCIE Security V6.1

Build cutting-edge skills to position yourself as a technical leader in the ever-changing landscape of security technologies and solutions.

CCIE Security Certification

The CCIE Security certification validates expert-level skills in designing, implementing, and troubleshooting complex Cisco security solutions to protect enterprise networks and data.Cisco Certified Internetwork Expert (CCIE) Security Training and Certification

Emigo Networks provides advanced training for the CCIE Security certification, designed for professionals aiming to achieve expert-level mastery in securing Cisco networks. This course focuses on planning, designing, implementing, operating, and troubleshooting complex security infrastructures across networks, cloud, and endpoints. With in-depth coverage of firewalls, VPNs, identity services, intrusion prevention, and automation, combined with hands-on labs and real-world scenarios, Emigo Networks prepares candidates to excel in both the written and lab exams while leading enterprise security initiatives.


Course Overview

The CCIE Security certification validates expert-level mastery in securing complex enterprise networks. Earning it requires passing the core written exam (350-701 SCOR)—which covers implementing and operating core security technologies across network, cloud, content, endpoint, access, visibility, and enforcement—and a rigorous 8-hour hands-on lab exam that tests your ability to design, deploy, operate, and optimize end-to-end security in dual-stack (IPv4/IPv6) environments. Passing the core exam also awards the Cisco Certified Specialist – Security Core credential. This certification positions you as a top-tier security expert capable of leading and defending modern, large-scale infrastructures.

What You'll Learn

  • Plan, design, and deploy comprehensive security architectures covering network, cloud, and content security to protect modern infrastructure. 
  • Implement and operate core security technologies including firewalls, intrusion prevention/detection, secure access, endpoint protection, and threat visibility. 
  • Configure and manage secure network access and identity services, enforcing policies across users and devices. 
  • Apply advanced enforcement mechanisms and automation (programmability, APIs, telemetry) to streamline security operations and enable intent-based security workflows. 
  • Integrate security across dual-stack (IPv4/IPv6) environments while ensuring high availability, scalability, and compliance. 
  • Troubleshoot and optimize end-to-end secure infrastructure under realistic conditions to prepare for the hands-on lab exam.

Syllabus Summary

Implementing and Operating Cisco Security Core Technologies v1.1 (350-701)

1. Security Concepts 

1.1 Explain common threats against on-premises, hybrid, and cloud environments 

1.1.a On-premises: viruses, trojans, DoS/DDoS attacks, phishing, rootkits, man-in-themiddle attacks, SQL injection, cross-site scripting, malware 

1.1.b Cloud: data breaches, insecure APIs, DoS/DDoS, compromised credentials 

1.2 Compare common security vulnerabilities such as software bugs, weak and/or hardcoded passwords, OWASP top ten, missing encryption ciphers, buffer overflow, path traversal, cross-site scripting/forgery 

1.3 Describe functions of the cryptography components such as hashing, encryption, PKI, SSL, IPsec, NAT-T IPv4 for IPsec, preshared key, and certificate-based authorization 

1.4 Compare site-to-site and remote access VPN deployment types and components such as virtual tunnel interfaces, standards-based IPsec, DMVPN, FlexVPN, and Cisco Secure Client including high availability considerations 

1.5 Describe security intelligence authoring, sharing, and consumption 

1.6 Describe the controls used to protect against phishing and social engineering attacks 

1.7 Explain North Bound and South Bound APIs in the SDN architecture 

1.8 Explain Cisco DNA Center APIs for network provisioning, optimization, monitoring, and troubleshooting 

1.9 Interpret basic Python scripts used to call Cisco Security appliances APIs

2. Network Security 

2.1 Compare network security solutions that provide intrusion prevention and firewall capabilities 

2.2 Describe deployment models of network security solutions and architectures that provide intrusion prevention and firewall capabilities 

2.3 Describe the components, capabilities, and benefits of NetFlow and Flexible NetFlow records 

2.4 Configure and verify network infrastructure security methods 

2.4.a Layer 2 methods (network segmentation using VLANs; Layer 2 and port security; DHCP snooping; Dynamic ARP inspection; storm control; PVLANs to segregate network traffic; and defenses against MAC, ARP, VLAN hopping, STP, and DHCP rogue attacks) 

2.4.b Device hardening of network infrastructure security devices (control plane, data plane, and management plane) 

2.5 Implement segmentation, access control policies, AVC, URL filtering, malware protection, and intrusion policies 

2.6 Implement management options for network security solutions (single vs. multidevice manager, in-band vs. out-of-band, cloud vs. on-premises) 

2.7 Configure AAA for device and network access such as TACACS+ and RADIUS 

2.8 Configure secure network management of perimeter security and infrastructure devices such as SNMPv3, NetConf, RestConf, APIs, secure syslog, and NTP with authentication 

2.9 Configure and verify site-to-site and remote access VPN 

2.9.a Site-to-site VPN using Cisco routers and IOS 

2.9.b Remote access VPN using Cisco AnyConnect Secure Mobility client 

2.9.c Debug commands to view IPsec tunnel establishment and troubleshooting

3. Securing the Cloud 

3.1 Identify security solutions for cloud environments 

3.1.a Public, private, hybrid, and community clouds 

3.1.b Cloud service models: SaaS, PaaS, IaaS (NIST 800-145) 

3.2 Compare security responsibility for the different cloud service models 

3.2.a Patch management in the cloud 

3.2.b Security assessment in the cloud 

3.3 Describe the concept of DevSecOps (CI/CD pipeline, container orchestration, and secure software development) 

3.4 Implement application and data security in cloud environments 

3.5 Identify security capabilities, deployment models, and policy management to secure the cloud 

3.6 Configure cloud logging and monitoring methodologies 

3.7 Describe application and workload security concepts

4. Content Security 

4.1 Implement traffic redirection and capture methods for web proxy 

4.2 Describe web proxy identity and authentication including transparent user identification 

4.3 Compare the components, capabilities, and benefits of on-premises, hybrid, and cloudbased email and web solutions (Cisco Secure Email Gateway, Cisco Secure Email Cloud Gateway, and Cisco Secure Web Appliance) 

4.4 Configure and verify web and email security deployment methods to protect onpremises, hybrid, and remote users 

4.5 Configure and verify email security features such as SPAM filtering, antimalware filtering, DLP, blocklisting, and email encryption 

4.6 Configure and verify Cisco Umbrella Secure Internet Gateway and web security features such as blocklisting, URL filtering, malware scanning, URL categorization, web application filtering, and TLS decryption 

4.7 Describe the components, capabilities, and benefits of Cisco Umbrella 

4.8 Configure and verify web security controls on Cisco Umbrella (identities, URL content settings, destination lists, and reporting)

5. Endpoint Protection and Detection 

5.1 Compare Endpoint Protection Platforms (EPP) and Endpoint Detection & Response (EDR) solutions 

5.2 Configure endpoint antimalware protection using Cisco Secure Endpoint 

5.3 Configure and verify outbreak control and quarantines to limit infection 

5.4 Describe justifications for endpoint-based security 

5.5 Describe the value of endpoint device management and asset inventory systems such as MDM 

5.6 Describe the uses and importance of a multifactor authentication (MFA) strategy 

5.7 Describe endpoint posture assessment solutions to ensure endpoint security 

5.8 Explain the importance of an endpoint patching strategy

6. Secure Network Access, Visibility, and Enforcement 

6.1 Describe identity management and secure network access concepts such as guest services, profiling, posture assessment and BYOD 

6.2 Configure and verify network access control mechanisms such as 802.1X, MAB, WebAuth 

6.3 Describe network access with CoA 

6.4 Describe the benefits of device compliance and application control 

6.5 Explain exfiltration techniques (DNS tunneling, HTTPS, email, FTP/SSH/SCP/SFTP, ICMP, Messenger, IRC, NTP) 

6.6 Describe the benefits of network telemetry 

6.7 Describe the components, capabilities, and benefits of these security products and solutions 

6.7.a Cisco Secure Network Analytics 

6.7.b Cisco Secure Cloud Analytics 

6.7.c Cisco pxGrid 

6.7.d Cisco Umbrella Investigate 

6.7.e Cisco Cognitive Intelligence 

6.7.f Cisco Encrypted Traffic Analytics 

6.7.g Cisco Secure Client Network Visibility Module (NVM)

CCIE Security v6.1

1. Perimeter Security and Intrusion Prevention 

1.1 Deployment modes on Cisco ASA and Cisco FTD 

1.1.a Routed 

1.1.b Transparent 

1.1.c Single 

1.1.d Multi-context 

1.1.e Multi-instance 

1.2 Firewall features on Cisco ASA and FTD 

1.2.a NAT 

1.2.b Application inspection 

1.2.c Traffic zones 

1.2.d Policy-based routing 

1.2.e Traffic redirection to service modules 

1.2.f Identity firewall 

1.3 Security features on Cisco IOS/IOS XE 

1.3.a Application awareness 

1.3.b Zone-based firewall 

1.3.c NAT 

1.4 Cisco FMC features 

1.4.a Alerting 

1.4.b Logging 

1.4.c Reporting 

1.4.d Dynamic objects 

1.5 Cisco NGIPS deployment modes 

1.5.a In-line

1.5.b Passive 

1.5.c TAP 

1.6 Cisco NGFW features 

1.6.a SSL inspection 

1.6.b User identity 

1.6.c Geolocation 

1.6.d AVC 

1.7 Detect and mitigate common types of attacks 

1.7.a DoS/DDoS 

1.7.b Evasion techniques 

1.7.c Spoofing 

1.7.d Man-in-the-middle 

1.7.e Botnet 

1.8 Clustering and high availability features on Cisco ASA and Cisco FTD 

1.9 Policies and rules for traffic control on Cisco ASA and Cisco FTD 

1.10 Routing protocols security on Cisco IOS, Cisco ASA, and Cisco FTD 

1.11 Network connectivity through Cisco ASA and Cisco FTD 

1.12 Correlation and remediation rules on Cisco FMC

2. Secure Connectivity and Segmentation 

2.1 Cisco AnyConnect client-based, remote-access VPN technologies on Cisco ASA, Cisco FTD, and Cisco routers 

2.2 Cisco IOS CA for VPN authentication

2.3 FlexVPN, DMVPN, and IPsec L2L tunnels 

2.4 VPN high availability methods 

2.4.a Cisco ASA VPN clustering 

2.4.b Dual-hub DMVPN deployments 

2.5 Infrastructure segmentation methods 

2.5.a VLAN 

2.5.b PVLAN 

2.5.c GRE 

2.5.d VRF-Lite 

2.6 Microsegmentation with Cisco TrustSec using SFT and SXP

3. Security Infrastructure 

3.1 Device hardening techniques and control plane protection methods 

3.1.a CoPP 

3.1.b IP source routing 

3.1.c iACLs 

3.2 Management plane protection techniques 

3.2.a CPU 

3.2.b Memory thresholding 

3.2.c Securing device access 

3.3 Data plane protection techniques 

3.3.a uRPF 

3.3.b QoS 

3.3.c RTBH 

3.4 Layer 2 security techniques 

3.4.a DAI 

3.4.b IPDT 

3.4.c STP security 

3.4.d Port security 

3.4.e DHCP snooping 

3.4.f RA Guard 

3.4.g VACL 

3.5 Wireless security technologies 

3.5.a WPA 

3.5.b WPA2 

3.5.c WPA3 

3.5.d TKIP 

3.5.e AES 

3.6 Monitoring protocols 

3.6.a NetFlow/IPFIX/NSEL 

3.6.b SNMP 

3.6.c SYSLOG 

3.6.d RMON 

3.6.e eStreamer 

3.7 Security features to comply with organizational security policies, procedures, and standards BCP 38 

3.7.a ISO 27001 

3.7.b RFC 2827 

3.7.c PCI-DSS 

3.8 Cisco SAFE model to validate network security design and to identify threats to different PINs 

3.9 Interaction with network devices through APIs using basic Python scripts 

3.9.a REST API requests and responses 

3.9.a (i) HTTP action verbs, error codes, cookies, headers 

3.9.a (ii) JSON or XML payload 

3.9.a (iii) Authentication 

3.9.b Data encoding formats 

3.9.b (i) JSON 

3.9.b (ii) XML 

3.9.b (iii) YAML 

3.10 Cisco DNAC Northbound APIs use cases 

3.10.a Authentication and authorization 

3.10.b Network discovery 

3.10.c Network device 

3.10.d Network host

4. Identity Management, Information Exchange, and Access Control 

4.1 Cisco ISE scalability using multiple nodes and personas 

4.2 Cisco switches and Cisco Wireless LAN Controllers for network access AAA with Cisco ISE 

4.3 Cisco devices for administrative access with Cisco ISE 

4.4 AAA for network access with 802.1X and MAB using Cisco ISE 

4.5 Guest lifecycle management using Cisco ISE and Cisco WLC 

4.6 BYOD on-boarding and network access flows 

4.7 Cisco ISE integration with external identity sources 

4.7.a LDAP 

4.7.b AD 

4.7.c External RADIUS 

4.8 Provisioning Cisco AnyConnect with Cisco ISE and Cisco ASA 

4.9 Posture assessment with Cisco ISE 

4.10 Endpoint profiling using Cisco ISE and Cisco network infrastructure including device sensor 

4.11 Integration of MDM with Cisco ISE 

4.12 Certification-based authentication using Cisco ISE 

4.13 Authentication methods 

4.13.a EAP Chaining and TEAP 

4.13.b MAR 

4.14 Identity mapping on Cisco ASA, Cisco ISE, Cisco WSA, and Cisco FTD 

4.15 pxGrid integration between security devices Cisco WSA, Cisco ISE, and Cisco FMC 

4.16 Integration of Cisco ISE with multifactor authentication 

4.17 Access control and single sign-on using Cisco DUO security technology 

4.18 Cisco IBNS 2.0 (C3PL) for authentication, access control, and user policy enforcement

5. Advanced Threat Protection and Content Security 

5.1 Cisco AMP for networks, Cisco AMP for endpoints, and Cisco AMP for content security (Cisco ESA, and Cisco WSA) 

5.2 Detect, analyze, and mitigate malware incidents 

5.3 Perform packet capture and analysis using Wireshark, tcpdump, SPAN, ERSPAN, and RSPAN 

5.4 Cloud security 

5.4.a DNS proxy through Cisco Umbrella virtual appliance 

5.4.b DNS security policies in Cisco Umbrella 

5.4.c RBI policies in Cisco Umbrella 

5.4.d CASB policies in Cisco Umbrella 

5.4.e DLP policies in Cisco Umbrella 

5.5 Web filtering, user identification, and Application Visibility and Control (AVC) on Cisco FTD and Cisco WSA 

5.6 WCCP redirection on Cisco devices 

5.7 Email security features 

5.7.a Mail policies 

5.7.b DLP 

5.7.c Quarantine 

5.7.d Authentication 

5.7.e Encryption 

5.8 HTTP decryption and inspection on Cisco FTD, Cisco WSA, and Cisco Umbrella 

5.9 Cisco SMA for centralized content security management 

5.10 Cisco advanced threat solutions and their integration: Cisco Stealthwatch, Cisco FMC, Cisco AMP, Cisco CTA, Threat Grid, ETA, Cisco WSA, Cisco SMA, Cisco Threat Response, and Cisco Umbrella


Pre-requisites

There are no formal prerequisites for the CCIE Security certification. However, Cisco recommends that candidates have five to seven years of hands-on experience designing, deploying, operating, and optimizing security technologies and solutions before attempting the exams. Candidates must first pass the core written exam (350-701 SCOR)—which satisfies the core requirement—before attempting the rigorous lab.

Required Exams

Pass the core exam

  • Exam : SCOR 350-701
  • Cost : 400 USD 
  • Duration : 120 MINUTES
  • Pass the lab exam
  • Exam : CCIE Security v6.1
  • Cost : 1600 USD 
  • Duration : 8 HOURS

Who Should Attend

  • Security Architects and Senior Security Engineers designing and deploying comprehensive security architectures. 
  • Network Security Engineers responsible for implementing and operating advanced security technologies (firewalls, VPNs, identity services, intrusion prevention, etc.). 
  • Security Consultants and Technical Leads who advise enterprises on secure design and need to demonstrate deep, hands-on proficiency. 
  • Security Operations Center (SOC) Leaders and Infrastructure Operators looking to elevate their expertise in threat visibility, enforcement, and end-to-end secure network management. 
  • DevOps/Automation Engineers integrating security into programmable, intent-based workflows and looking to formalize that expertise at scale.

Related Courses

experts-banner-background

EMIGO Expert Training Team

new-batch-mage

New Batches Commence On

Testimonials

enquiry-section1-bg
enquiry-form-model1

Learn like a Leader
Not a follower

Scan or Click on the QR Code to submit your enquiry

Enquiry
enquiry-section1-qrcode
footer-enquiry footer-enquiry