CCIE Security Zero to Hero Course

Overview

Octa Networks is Mumbai’s prestigious Training Institute which offers CCIE Security Zero to Hero program where the candidate is trained in CCNA Routing & Switching, CCNP Routing & Switching, CCNA Security, CCNP Security and CCIE Security Certifications by CCIE Certified Trainers. CCIE Security is Highest Level of Certification in Security track offered by Cisco Systems.

It takes 5 to 6 years to get a degree but with our CCIE Security Zero to Hero program you will be job ready in just 6 months.

CCIE Security Zero to Hero program makes you eligible for job roles related to Cisco Networking. CCIE Security is one of the most demanded, prestigious and highest paid IT career certification. CCIE Security Zero to Hero program provides certification training which is the industry standard for recognizing network security engineers who have demonstrated expert-level performance in implementing, configuring, and troubleshooting Cisco network security solutions.

The CCIE Security Zero to Hero program is our 100% job guarantee program where candidates make their career in the networking industry. All Undergraduates/Graduates from BCA, BE, BSC, BCOM, BA Background or Diploma Holders who are interested in Networking Domain are eligible for CCIE Security Zero to Hero program.

Candidates get mentored by India’s only two Octa CCIE’s Arshad Dhunna and Joaquim Fernandes.
Octa Networks is the leading training institute for CCIE training in Mumbai, where we have highly experienced CCIE certified trainers. We provide world-class training infrastructures to the students with 24*7 lab facility, virtual racks and smart classrooms.

CCIE Security Zero to Hero program at Octa Networks:

CCIE Security Zero to Hero program offered by Octa Networks consists of hands on practical and theoretical training on CCNA Security, CCNP Security, and CCIE Security courses. CCIE Security Zero to Hero program intends to provide basic to advance and in-depth knowledge about Security technologies.

Apart from the technical and practical part of the program, We at Octa Networks transform the overall personality of the candidate by providing the following:
  • Email etiquette
  • Documentation skills
  • Visio Skills
  • Presentation Skills
  • Resume Writings
  • Mock Interviews with Manager/HR
  • Soft Skills
  • Personality development classes

About Job Placement Guarantee:

Octa Networks is the only Cisco Training Institute in India to give job placement guarantee in writing for CCIE students. Starting package of 3-4 Lacs is guaranteed without appearing for any exam, based on your skills. After clearing CCIE Security (Written + Lab) exam starting package of 4 – 5 Lacs is guaranteed.
Note:Placement guarantee is only applicable for graduates. Graduation may either be regular or distance and, in any stream, (Computers, Engineering, Commerce, Arts, Science, etc.).

Key Features of CCIE Security Zero to Hero program:

  • Candidates are trained on Cisco Physical Devices.
  • CCIE Concepts are explained theoretically and then practiced on the Cisco Physical Devices.
  • 24*7 Lab Access provided to the candidates.
  • Students have access to the rack from any part of the world.
  • 120+ hours of training in classroom with interactive whiteboard and projector.
  • Candidates can appear for the repeat class.
  • Classrooms are equipped with projectors, Wi-Fi connectivity, and Digital Pads.
  • Batches are available from early morning to late night.
  • Trainers/Mentors 24×7 availability.
  • Our Trainers are Cisco certified and highly experienced.
  • 100% Job placement guarantee program.
  • Personality Development Sessions
  • Interview Preparation
  • Resume writing by expert
  • Spoken English Session
  • Industry knowledge by Octa CCIE’s
  • Mock interview by team of technical experts.

Devices to be used during CCIE Security Zero to Hero Program:

Physical Devices
  • Cisco 3850 Catalyst Switch
  • Cisco 5512-X & 5515-X Adaptive Security Appliance
  • Cisco 2504 Wireless Controller
  • Cisco 1602E & 3700 Access Point
  • Cisco 7965 Unified IP Phone
Virtual Machines:
  • Security Appliances
    • Cisco Identity Services Engine (ISE): 2.1.0
    • Cisco Secure Access Control System (ACS): 5.8.0.32
    • Cisco Web Security Appliance (WSA): 9.2.0
    • Cisco Email Security Appliance (ESA): 9.7.1
    • Cisco Wireless Controller (WLC): 8.0.133
    • Cisco Firepower Management Center Virtual Appliance: 6.0.1 and/or 6.1
    • Cisco Firepower NGIPSv: 6.0.1
    • Cisco Firepower Threat Defense: 6.0.1
  • Core Devices
    • IOSv L2: 15.2
    • IOSv L3: 15.5(2)T
    • Cisco CSR 1000V Series Cloud Services Router: 3.16.02.S
    • Cisco Adaptive Security Virtual Appliance (ASAv): 9.6.1

Others

  • Test PC: Microsoft Windows 7
  • Active Directory: Microsoft Windows Server 2008
  • Cisco Application Policy Infrastructure Controller Enterprise Module : 1.2
  • Cisco Unified Communications Manager: 8.6.(1)
  • FireAMP Private Cloud
  • AnyConnect 4.2

Training Plan

Training Schedule
Weekdays (Mon-Fri)Weekend (Sat-Sun)
Duration6 Months8 Months
Hours4 Hours / Day8 Hours / Day
Fees1,50,000 + Taxes1,50,000 + Taxes
Training ModeOnline/OnsiteOnline/Onsite
Training Plan
Weekday Batch:Total DurationTiming:Mode:
Mon - Fri5 Months4 Hours / DayOnline/Onsite

Group Discount
In a Group of 2 discount will be 10% per head
In a Group of 3 discount will be 15% per head
In a Group of 4 discount will be 20% per head

Trainer's Profile

MUNAWAR KHAN

MUNAWAR KHAN

Master Trainer

Munawar Khan,is a highly experienced and extremely driven Master Technical Instructor. He has been training networking courses for more than 15 years, teaching on a wide range of topics including Routing and Switching, Security, Collaboration and Checkpoint. Munawar Khan has delivered instructor led training’s in India as well as international countries like UAE, Qatar and East African Countries. In addition, he has been developing and updating the content for these courses. He has assisted many engineers in passing CCNA and CCNP examinations and securing their certifications.

JAGDISH RATHOD

JAGDISH RATHOD

Senior Trainer

Having a degree of M.Tech Computer Engineering with specialization in Networking Gold Medalist (University First) and BE Information Technology (Class First), Jadish had joined Octa Networks in 2017. He is a CCIE (R&S – Written), CCNP (R&S), CCNA (R&S) certified, highly experienced and extremely driven senior technical instructor and network consultant. He is young and dedicated trainer of the Octa Networks technical team and also one of the star trainer and passionate training professional.

He guides thousands of students across the world like INDIA, China, Kenya and UAE, Africa, CANADA, Pakistan, Australia and USA and builds a strong foundation of networking which serves a long way in gaining expertise. Jagdish has worked with TOP MNC IT company and ISP (Dimension data and Ishan Netsol) as a network Engineer for more than 3 years. Thus, have a deep understanding of multi vendor networking devices like Cisco, Juniper, extreme and huawei, Firewall, Checkpoint, ASA. In addition, he has a in depth knowledge of protocols like MPLS, BGP, OSPF, EIGRP, IPv4, IPV6, SNMP, SYSLOG and Switching Technologies like RSTP, MSTP, STP, Ether channel, Flex link. He has also expert in QOS, Traffic engineering, ISIS and Multicasting.

He is an experienced mentor, he knows the requirements of students and guides them to the best. When he is not busy training students at Octa Networks, he spends hours and hours in drafting, practical workbooks for making CCNP journey easy for the students. He himself spends hours practicing in the labs to polish his skills and always learn new technologies

NAIMAN KHAN

NAIMAN KHAN

CCIE#54008

Lab Facility

CCIE Security Integrated Course Details

Target Audience

  • All Undergraduates/Graduates from BCA, BE, BSC, BCOM, BA Background or Diploma Holders who are interested in Networking Domain are eligible for CCIE Security Zero to Hero program.
  • Professionals in the IT and Technologies sector who wish to specialize their knowledge and acquire an internationally recognized professional certification.

Prerequisite:

  • Basic computer literacy
  • Basic PC operating system navigation skills
  • Basic Internet usage skills
  • Basic IP address knowledge
  • Good understanding of network fundamentals

Topics Covered:

1.0 Perimeter Security and Intrusion Prevention

1.1 Describe, implement, and troubleshoot HA features on Cisco ASA and Cisco FirePOWER Threat Defense (FTD)

1.2 Describe, implement, and troubleshoot clustering on Cisco ASA and Cisco FTD

1.3 Describe, implement, troubleshoot, and secure routing protocols on Cisco ASA and Cisco FTD

1.4 Describe, implement, and troubleshoot different deployment modes such as routed, transparent, single, and multicontext on Cisco ASA and Cisco FTD

1.5 Describe, implement, and troubleshoot firewall features such as NAT (v4,v6), PAT, application inspection, traffic zones, policy-based routing,  traffic redirection to service modules, and identity firewall on Cisco ASA and Cisco FTD

1.6 Describe, implement, and troubleshoot IOS security features such as Zone-Based Firewall (ZBF), application layer inspection, NAT (v4,v6), PAT and  TCP intercept on Cisco IOS/IOS-XE

1.7 Describe, implement, optimize, and troubleshoot policies and rules for traffic control on Cisco ASA, Cisco FirePOWER and Cisco FTD

1.8 Describe, implement, and troubleshoot Cisco Firepower Management Center (FMC) features such as alerting, logging, and reporting

1.9 Describe, implement, and troubleshoot correlation and remediation rules on Cisco FMC

1.10 Describe, implement, and troubleshoot Cisco FirePOWER and Cisco FTD deployment such as in-line, passive, and TAP modes

1.11 Describe, implement, and troubleshoot Next Generation Firewall (NGFW) features such as SSL inspection, user identity, geolocation, and AVC  (Firepower appliance)

1.12 Describe, detect, and mitigate common types of attacks such as DoS/DDoS, evasion techniques, spoofing, man-in-the-middle, and botnet

2.0 Advanced Threat Protection and Content Security

2.1 Compare and contrast different AMP solutions including public and private cloud deployment models

2.2 Describe, implement, and troubleshoot AMP for networks, AMP for endpoints, and AMP for content security (CWS, ESA, and WSA)

2.3 Detect, analyze, and mitigate malware incidents

2.4 Describe the benefit of threat intelligence provided by AMP Threat GRID

2.5 Perform packet capture and analysis using Wireshark, tcpdump, SPAN, and RSPAN

2.6 Describe, implement, and troubleshoot web filtering, user identification, and Application Visibility and Control (AVC)

2.7 Describe, implement, and troubleshoot mail policies, DLP, email quarantines, and SenderBase on ESA

2.8 Describe, implement, and troubleshoot SMTP authentication such as SPF and DKIM on ESA

2.9 Describe, implement, and troubleshoot SMTP encryption on ESA

2.10 Compare and contrast different LDAP query types on ESA

2.11 Describe, implement, and troubleshoot WCCP redirection

2.12 Compare and contrast different proxy methods such as SOCKS, Auto proxy/WPAD, and transparent

2.13 Describe, implement, and troubleshoot HTTPS decryption and DLP

2.14 Describe, implement, and troubleshoot CWS connectors on Cisco IOS routers, Cisco ASA, Cisco AnyConnect, and WSA

2.15 Describe the security benefits of leveraging the OpenDNS solution.

2.16 Describe, implement, and troubleshoot SMA for centralized content security management

2.17 Describe the security benefits of leveraging Lancope

3.0 Secure Connectivity and Segmentation

3.1 Compare and contrast cryptographic and hash algorithms such as AES, DES, 3DES, ECC, SHA, and MD5

3.2 Compare and contrast security protocols such as ISAKMP/IKEv1, IKEv2, SSL, TLS/DTLS, ESP, AH, SAP, and MKA

3.3 Describe, implementc and troubleshoot remote access VPN using technologies such as FLEXVPN, SSL-VPN between Cisco firewalls, routers, and end hosts

3.4 Describe, implement, and troubleshoot the Cisco IOS CA for VPN authentication

3.5 Describe, implement, and troubleshoot clientless SSL VPN technologies with DAP and smart tunnels on Cisco ASA and Cisco FTD

3.6 Describe, implement, and troubleshoot site-to-site VPNs such as GETVPN, DMVPN and IPsec

3.7 Describe, implement, and troubleshoot uplink and downlink MACsec (802.1AE)

3.8 Describe, implement, and troubleshoot VPN high availability using Cisco ASA VPN clustering and dual-hub DMVPN deployments

3.9 Describe the functions and security implications of cryptographic protocols such as AES, DES, 3DES, ECC, SHA, MD5, ISAKMP/IKEv1, IKEv2, SSL,  TLS/DTLS, ESP, AH, SAP, MKA, RSA, SCEP/EST, GDOI, X.509, WPA, WPA2, WEP, and TKIP

3.10 Describe the security benefits of network segmentation and isolation

3.11 Describe, implement, and troubleshoot VRF-Lite and VRF-Aware VPN

3.12 Describe, implement, and troubleshoot microsegmentation with TrustSec using SGT and SXP

3.13 Describe, implement, and troubleshoot infrastructure segmentation methods such as VLAN, PVLAN, and GRE

3.14 Describe the functionality of Cisco VSG used to secure virtual environments

3.15 Describe the security benefits of data center segmentation using ACI, EVPN, VXLAN, and NVGRE

4.0 Identity Management, Information Exchange, and Access Control

4.1 Describe, implement, and troubleshoot various personas of ISE in a multinode deployment

4.2 Describe, implement, and troubleshoot network access device (NAD), ISE, and ACS configuration for AAA

4.3 Describe, implement, and troubleshoot AAA for administrative access to Cisco network devices using ISE and ACS

4.4 Describe, implement, verify, and troubleshoot AAA for network access with 802.1X and MAB using ISE.

4.5 Describe, implement, verify, and troubleshoot cut-through proxy/auth-proxy using ISE as the AAA server

4.6 Describe, implement, verify, and troubleshoot guest life cycle management using ISE and Cisco network infrastructure

4.7 Describe, implement, verify, and troubleshoot BYOD on-boarding and network access flows with an internal or external CA

4.8 Describe, implement, verify, and troubleshoot ISE and ACS integration with external identity sources such as LDAP, AD, and external RADIUS

4.9 Describe ISE and ACS integration with external identity sources such as RADIUS Token, RSA SecurID, and SAML

4.10 Describe, implement, verify, and troubleshoot provisioning of AnyConnect with ISE and ASA

4.11 Describe, implement, verify, and troubleshoot posture assessment with ISE

4.12 Describe, implement, verify, and troubleshoot endpoint profiling using ISE and Cisco network infrastructure including device sensor

4.13 Describe, implement, verify, and troubleshoot integration of MDM with ISE

4.14 Describe, implement, verify, and troubleshoot certificate based authentication using ISE

4.15 Describe, implement, verify, and troubleshoot authentication methods such as EAP Chaining and Machine Access Restriction (MAR)

4.16 Describe the functions and security implications of AAA protocols such as RADIUS, TACACS+, LDAP/LDAPS, EAP (EAP-PEAP, EAP-TLS, EAP-TTLS, EAP-FAST,  EAP-TEAP, EAP- MD5, EAP-GTC), PAP, CHAP, and MS-CHAPv2

4.17 Describe, implement, and troubleshoot identity mapping on ASA, ISE, WSA and FirePOWER

4.18 Describe, implement, and troubleshoot pxGrid between security devices such as WSA, ISE, and Cisco FMC

5.0 Infrastructure Security, Virtualization, and Automation

5.1 Identify common attacks such as Smurf, VLAN hopping, and SYNful knock, and their mitigation techniques

5.2 Describe, implement, and troubleshoot device hardening techniques and control plane protection methods, such as CoPP and IP Source routing.

5.3 Describe, implement, and troubleshoot management plane protection techniques such as CPU and memory thresholding and securing device access

5.4 Describe, implement, and troubleshoot data plane protection techniques such as iACLs, uRPF, QoS, and RTBH

5.5 Describe, implement, and troubleshoot IPv4/v6 routing protocols security

5.6 Describe, implement, and troubleshoot Layer 2 security techniques such as DAI, IPDT, STP security, port security, DHCP snooping, and VACL

5.7 Describe, implement, and troubleshoot wireless security technologies such as WPA, WPA2, TKIP, and AES

5.8 Describe wireless security concepts such as FLEX Connect, wIPS, ANCHOR, Rogue AP, and Management Frame Protection (MFP)

5.9 Describe, implement, and troubleshoot monitoring protocols such as NETFLOW/IPFIX, SNMP, SYSLOG, RMON, NSEL, and eSTREAMER

5.10 Describe the functions and security implications of application protocols such as SSH, TELNET, TFTP, HTTP/HTTPS, SCP, SFTP/FTP, PGP, DNS/DNSSEC,  NTP, and DHCP

5.11 Describe the functions and security implications of network protocols such as VTP, 802.1Q, TCP/UDP, CDP, LACP/PAgP, BGP, EIGRP, OSPF/OSPFv3,  RIP/RIPng, IGMP/CGMP, PIM, IPv6, and WCCP

5.12 Describe the benefits of virtualizing security functions in the data center using ASAv, WSAv, ESAv, and NGIPSv

5.13 Describe the security principles of ACI such as object models, endpoint groups, policy enforcement, application network profiles, and contracts

5.14 Describe the northbound and southbound APIs of SDN controllers such as APIC-EM

5.15 Identify and implement security features to comply with organizational security policies, procedures, and standards such as BCP 38, ISO 27001, RFC  2827, and PCI-DSS

5.16 Describe and identify key threats to different places in the network (campus, data center, core, edge) as described in Cisco SAFE

5.17 Validate network security design for adherence to Cisco SAFE recommended practices

5.18 Interpret basic scripts that can retrieve and send data using RESTful API calls in scripting languages such as Python

5.19 Describe Cisco Digital Network Architecture (DNA) principles and components.

6.0 Evolving Technologies v1.1

6.1 Cloud

  • 6.1.a Compare and contrast public, private, hybrid, and multicloud design considerations
    • 6.1.a [i] Infrastructure, platform, and software as a service (XaaS)
    • 6.1.a [ii] Performance, scalability, and high availability
    • 6.1.a [iii] Security implications, compliance, and policy
    • 6.1.a [iv] Workload migration
  • 6.1.b Describe cloud infrastructure and operations
    • 6.1.b [i] Compute virtualization (containers and virtual machines)
    • 6.1.b [ii] Connectivity (virtual switches, SD-WAN and SD-Access)
    • 6.1.b [iii] Virtualization functions (NFVi, VNF, and L4/L6)
    • 6.1.b [iv] Automation and orchestration tools (CloudCenter, DNA-center, and Kubernetes)

6.2 Network programmability (SDN)

  • 6.2.a Describe architectural and operational considerations for a programmable network
    • 6.2.a [i] Data models and structures (YANG, JSON and XML)
    • 6.2.a [i] Device programmability (gRPC, NETCONF and RESTCONF)
    • 6.2.a [ii] Controller based network design (policy driven configuration and northbound/ southbound APIs)
    • 6.2.a [iii] Configuration management tools (agent and agentless) and version control systems (Git and SVN)

6.3 Internet of things (IoT)

  • 6.3.a Describe architectural framework and deployment considerations for IoT
    • 6.3.a [i] IoT technology stack (IoT Network Hierarchy, data acquisition and flow)
    • 6.3.a [ii] IoT standards and protocols (characteristics within IT and OT environment)
    • 6.3.a [iii] IoT security (network segmentation, device profiling, and secure remote)

Candidates need to undertake below exam

Exam Name:Exam Code :Duration:Registration:
CCIE Security Written Exam400-251120 minutes (90-110 questions)Pearson VUE

Lab Exam Details

The lab exam is an eight-hour, hands-on exam which requires you to configure and troubleshoot a series of complex networks to given specifications. Knowledge of troubleshooting is an important skill and candidates are expected to diagnose and solve issues as part of the CCIE Collaboration lab exam.

Lab Exam can be booked once CCIE Written exam is cleared

Upon completion of this course candidates will learn:

  • Essentials of Cisco ASA
  • Basic connectivity and device management
  • Network integration
  • Configure common features of the Cisco ASA OS
  • Cisco ASA policy control
  • Core Cisco ASA VPN common components
  • Main VPN components
  • Cisco clientless VPN solutions
  • Cisco AnyConnect full tunnel VPN solution
  • Cisco ASA high availability and virtualization options
  • Features of Cisco ASA 5500-X Series Next-Generation Firewalls
  • Cisco ASA 5500-X Series Next-Generation Firewalls and the Cisco ASA Services Module (ASA SM)
  • Implement ASA Security Zones and Equal Cost Multipathing
  • Configure ASA 9.3/9.4 new features including: REST API for configuration, Policy Based Routing, ACL Manual Commit and ACL Forward Reference
  • Implement the Cisco ASA Identity Firewall Feature, including the use of the Cisco CDA
  • Implement the Cisco ASA SFR (FirePOWER Services) module
  • Configure Cisco ASA to integrate with Cisco Cloud Web Security to provide web security and filtering services through an SaaS model
  • Security Group Access Control (SGACL) feature in Cisco ASA Software 9.0 and later.
  • Implement a Cisco ASA Cluster feature which allows as many as eight Cisco ASA appliances to be joined in a single cluster
  • Fundamental ASA configuration from the CLI and ASDM
  • Administrative access using AAA, TACACS+, and Cisco ACS 5.x
  • Object (auto) NAT and manual (twice) NAT
  • Access control and troubleshooting tools
  • Application inspection and control (deep packet inspection)
  • ASAv using 9.4 code
  • Equal cost multipathing using ASA security zones
  • Policy Based Routing on the ASA
  • ACL enhancements including forward reference and manual commit
  • Using the REST API to configure the ASA
  • Configuring BGP support on the ASA using 9.4 code
  • Bootstrapping and configuring the SFR 6.0 software module
  • Deploying Cisco Context Directory Agent (CDA) with Active Directory
  • Features of Cisco ASA 5500-X Series Next-Generation Firewalls (NGFW ASA SFR)
  • SFR (FirePOWER Services) software module integration using FirePOWER Management Center 6.0 and access control, intrusion prevention, file policy, network discovery, Active Directory integration, user based access control, DNS, URL, and SSL policy
  • Cloud Web Security (ScanSafe) integration
  • Threat and botnet detection
  • Dynamic routing
  • Transparent firewall and bridge groups
  • Basic and advanced clientless SSL VPN
  • Full tunnel SSL VPN using AnyConnect 3.x Secure Mobility Client
  • Remote Access IPsec IKEv2 using AnyConnect 3.x
  • Easy VPN remote for the SOHO using ASA 5505
  • External AAA authentication of VPN users
  • PKI and VPN integration
  • Host scan and dynamic access policies (DAP) for VPN
  • IPsec VPN site-to-site between ASAs and with IOS router
  • ASA and ISE integration for TrustSec Firewall using Security Group Tags
  • Active/standby failover
  • ASA clustering including local and spanned EtherChannel

Candidates will have Employment Opportunities with following Job Title:

  • Network Security Engineers
  • Network Security Administrators
  • Network Security Support Engineers
  • Network Security Consultant
  • Technical Consultant

Schedule

Upcoming Batches
Weekday Batch :
1 october 2018

Frequently Asked Question

What is CCIE Security?

The Cisco Certified Internetwork Expert Security (CCIE Security) program recognizes security experts who have the knowledge and skills to architect, engineer, implement, troubleshoot, and support the full suite of Cisco security technologies and solutions using the latest industry best practices to secure systems and environments against modern security risks, threats, vulnerabilities, and requirements.

What is the scope of CCIE Security?

Benefits are great for being a CCIE Security Expert. The salary would be among the top paid roles in industry, job role opportunities are better, great reputation and respect among co-workers & within company, highly rewarding career.

What are prerequisites for CCIE Security Zero to Hero program?

There are currently no prerequisites for a CCIE Security Zero to Hero program.
Preferred Knowledge –
• Basic computer literacy
• Basic PC operating system navigation skills
• Basic Internet usage skills
• Basic IP address knowledge
• Good understanding of network fundamentals

How can Octa Networks give an edge over other training institutes?

Octa Networks provides real Cisco devices for lab practice; CCIE certified trainers who are highly experienced and updated learning materials for all the candidates. 24×7 access to lab facility with 100% assistance for placements.

I am a B.Com graduate; can I still opt for this CCIE Security Zero to Hero program?

Yes. Any Undergraduates/Graduates from BCA, BE, BSC, BCOM, BA Background or Diploma Holders who are interested in Networking Domain are eligible for CCIE Security Zero to Hero program.

What features should an aspirant consider while choosing a training
institute for CCIE certification course preparation?

There are various important features to be considered while choosing the best institute for CCIE Certification course preparation. First of all, a candidate should visit the training institute physically to verify the lab facilities. Some of the key features recommend would be

  • Real Cisco Devices for training
  • CCIE Certified trainers
  • CCIE success results
  • Job Placements
  • Reviews from existing candidates
  • 24×7 Lab access facility

How to get recertified in CCIE Security? Is it necessary?

CCIEs are required to recertify every two years.

  • To maintain active status, every 24-months CCIEs have the flexibility and option to recertify using one of the options below before the certification expiration date:
  • Earn the required credits through the Cisco Continuing Education Program, or
  • Pass any current CCIE Written Exam OR CCIE Lab Exam, or
  • Pass the current CCDE Written Exam OR current CCDE Practical Exam, or
  • Pass the Cisco Certified Architect (CCAr) interview AND the CCAr board review to extend lower certifications.

How many exams does the CCIE Security certification exam consist of?

Written and Lab Exam.

How many questions does the CCIE Security Written exam consist of?

90 – 110 questions

What are the facilities that Octa Networks provide for CCIE Security Certification?

We provide lab training facility in Asia with 24×7 Lab access with rack and lab administrator guide. We offer great value for money to all our candidates through Personality development sessions. Our training is best in Mumbai and our trainers are CCIE Certified.

Is online mode available for the CCIE Security training?

Yes. The batches are available in both weekdays as well as weekends in morning and evening sessions

How much am I expected to earn once I get CCIE Security Certified?

Fresher may earn between 6,00,000 – 8,00,000 INR which may increase significantly with work experience, improved hands-on skills and other related factors.

What is the exam code of CCIE Security Written Exam?

400-251

Reviews & Comments

Student Reviews

{"number_of_column":"1","number_of_column_desktop":"1","number_of_column_small_desktop":"1","number_of_column_tablet":"1","number_of_column_mobile":"1","auto_play":"true","auto_play_speed":"3000","scroll_speed":"600","pause_on_hover":"true","infinite_loop":"true","navigation":"true","pagination":"false","swipe_on":"true","mouse_draggable":"true","rtl_mode":"false"}

#CCNP_Jan_2019 #Octa_Networks Yesterday we learned the basics of BGP including property, message types, states,role of igp into bgp and Rathod sir explained how messages are involved with states of bgp. I left the class after half session because of office work 😞 and could not attend the remaining last 45 minuets. But one thing is best and will be always best that our Trainer Jagdish Sir is always in positive mode and clear our doubt positively. Thank you Jagdish sir, Arshad Sir and Octa networks for providing such an opportunity to learn the technology. Jagdish Sir is doing his best in all session with same energy..........

My self Krishnendu form Kolkata i have attended CCNA Service provider and CCNP routing and Switching training from Octa Network. My trainer is Mr jagdish Rathod. He teaches us everything in detail. Today we have competed HSRP, VRRP and GLBP theory as well as Practical sessions. I have cleared all my doubts related to HSRP. Thank you Octa Networks, Rathod Jagdish, Arshad Dhunna, and Joaquim Fernandes sir.

I have attended the CCNA Wireless 8am-10am class.I learnt about RRM and AP group RF. Mr.Vibhor Sir explained these concept in very well manner.He keeps the session very interactive and solves all the queries raised by Students.Thanks Octa networks for providing such a talented mentor. Thank You Octa Networks arshad Dhunna and Joaquim Fernandes for providing this Great Opportunity.

Yes its true 🤩 First of all I am giving 100/100 and I strongly recommended Octa Networks to all from this entire world that if want to start your carrier in Networking field (it doesn’t matter you are from technical background on not) Octa Networks will makes you champion in Networking (CCNA, CCNP, CCIE in all tracks). Wish you all the best Octa Networks. Arshad Dhunna. Rathod Jagdish.

Amitesh Arnav, India

Attending CCNA Security class from Manuhar Khan, he is delivering very good security lecture, very polite & answer all the queries. One thing that I must tell you about him, his example are really interesting by relating real environment, That you can't forget easily. Recommending OCTA NETWORKS 👌👌👌👌👌

Shan Vel

Octa network is such great place . To hole world global training Centre . I such a trainer is Jagdish Rathore sir provide training CCNA. / CCNP/ CCIE tramendous.. there his mind set .it's great mentor , trainer , motivations .he is practically Person. Repeated every dout particular topic Clear..

Gaurav Kabre

Currently, I am taking CCNA Data Center training which is lead by Mr. Ronak Vyas. I appreciate his efforts in guiding and explaining the DC concepts. Also, he answers all the questions or doubts raised by the participants after explaining the topic. Mr.Ronak very well explained step by step on concepts like UCS, OTV and VPC in Lab rack setup practically. Thanks Octa Networks


Get In Touch

[dynamichidden dynamichidden-816 class:post-title-fld "shortcode attribute='value'"]

Request a call back