ccnp - sECURITY Program
Our CCNP Security program is meticulously crafted to prepare you for the challenges of modern IT security environments. This comprehensive program covers critical security technologies and practices, ensuring you gain the expertise needed to protect and defend network infrastructures.
Upon completion, you will gain expertise in:
- Cisco Certified Network Associate (CCNA): Gain a strong foundation in networking, including key concepts, protocols, and practical skills. Validate your knowledge with a comprehensive exam.
- Implementing and Operating Cisco Security Core Technologies (SCOR): Learn to implement and manage core security technologies effectively. This advanced course includes an exam to certify your proficiency.
- Securing the Web with Cisco Web Security Appliance (SWSA) v3.0: Master web security using Cisco’s Web Security Appliance. Focus on securing web traffic, preventing threats, and ensuring safe web usage, with an exam to confirm your skills.
Our goal is to certify over 100 scholars in CCNP-Security in 2024, empowering them with essential skills for the industry.
Requirements, Sponsorship & Certification
Requirements:
- Malaysian Bumiputera
- Age 27 - 40: Not more than 40 years old at the time of enrollment
- Must hold a bachelor degree or higher, and have a background in IT, cybersecurity, network engineering, computer science, IoT, or related field
- Less than 5 years of working experience in the related field
Sponsorship Coverage:
- Program fees
- Training fees
- Examination fees
- Certification fees
- Nurture & Develop programme
Skillsets & Certifications:
- Cisco Certified Network Associate (CCNA) (including examination)
- Implementing and Operating Cisco Security Core Technologies (SCOR) (including examination)
- Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 (including examination)
- Digital Leadership
Certification Modules
- Module 1: Networking Fundamentals
- Module 2: Configuring Switching
- Module 3: Configuring IP Addressing
- Module 4: Configuring Routing
- Module 5: Configuring Wireless Connectivity
- Module 6: Configuring IP Network Services
- Module 7: Security Fundamentals
- Module 8: Automation & Programmability
- Module 9: Troubleshooting Network Issues
- Module 1: Describing Information Security Concepts
- Module 2: Describing Common TCP/IP Attacks
- Module 3: Describing Common Network Application Attacks
- Module 4: Describing Common Endpoint Attacks
- Module 5: Describing Network Security Technologies
- Module 6: Deploying Cisco ASA Firewall
- Module 7: Deploying Cisco Firepower Next Generation Firewall
- Module 8: Deploying Email Content Security
- Module 9: Deploying Web Content Security
- Module 10: Deploying Cisco Umbrella
- Module 11: Explaining VPN Technologies & Cryptography
- Module 12: Introducing Cisco Secure Site-to-Site VPN Solutions
- Module 13: Deploying Cisco IOS VTI-Based Point-to-Point IPSec VPNs
- Module 14: Deploying Point-to-Point IPSec VPNs on the Cisco ASA and Cisco
- Module 15: Introducing Cisco Secure Remote Access VPN Solutions
- Module 16: Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco
- Module 17: Explaining Cisco Secure Network Access Solutions
- Module 18: Describing 802.1X Authentication
- Module 19: Configure 802.1X Authentication
- Module 20: Describing Endpoint Security Technologies
- Module 21: Deploying Cisco Advanced Malware Protection (AMP) for Endpoints
- Module 22: Introducing Network Infrastructure Protection
- Module 23: Deploying Control Plane Security Controls
- Module 24: Deploying Layer 2 Data Plane Security Controls
- Module 25: Deploying Layer 3 Data Plane Security Controls
- Module 26: Deploying Management Plane Security Controls
- Module 27: Deploying Traffic Telemetry Methods
- Module 28: Deploying Cisco Stealthwatch Enterprise
- Module 29: Describing Cloud & Common Cloud Attacks
- Module 30: Securing the Cloud
- Module 31: Deploying Cisco Stealthwatch Cloud
- Module 32: Describing Software-Defined Networking (SDN)
- Module 1: Configuring the Cisco Web Security Appliance
- Module 2: Deploy Proxy Services
- Module 3: Configure Proxy Authentication
- Module 4: Configure HTTPS Inspection
- Module 5: Create & Enforce a Time/Data-Based Acceptable Use Policy
- Module 6: Configure Advanced Malware Protection
- Module 7: Configure Referrer Header Exceptions
- Module 8: Utilize Third-Party Security Feeds & MS Office 365 External Feed
- Module 9: Validate an Intermediate Certificate
- Module 10: View Reporting Services & Web Tracking
- Module 11: Perform Centralized Cisco AsyncOS Software Upgrade Using Cisco SMA
4 tOP Reasons to grab this Opportunity today
High Demand
Increase your employment opportunities with CCNP-Security skillset.
Upgrade Skills
Advance your career by receiving industry-standard up-skilling training by PEOPLElogy, covering both technical and leadership skills.
Get Certified
Graduate with an internationally recognized certification by Cisco.
Mentoring
Benefit from continuous mentoring and exclusive access to the Cisco Community.
Register here
Terms & Conditions Apply
By submitting this application, you hereby warrant that all information submitted by you is true, current, and complete. PEOPLElogy reserves the right to verify the eligibility of all participants. In the event of any dispute regarding the terms and any other matters relating to this training, the decision of the organizing committee is final, and no further correspondence will be entertained.
PEOPLElogy (Organizing Committee) reserves the right to cancel or amend the terms and conditions without prior notice. Any changes will be posted either within these terms and conditions or on the training information portal.
For any inquiry, please contact us at:
(+60) 14-515 9501 (Amalina – Project Team)
What To Expect After Submitting This Application:
- Online briefing for candidates who meet the criteria.
- Online assessment.
- Document submission.
- Candidate shortlist.
- Offer letter and funding award.
- Cohort briefing.
- Class commencement.