Tel: 1-866-777-0060 | Request For Information
CCIE Enterprise Infrastructure Training
Achieving CCIE Enterprise Infrastructure certification proves your skills with complex enterprise infrastructure solutions. To earn CCIE Enterprise Infrastructure certification, you pass two exams: a qualifying exam that covers core enterprise infrastructure technologies, and a hands-on lab exam that covers enterprise networks through the entire network lifecycle, from designing and deploying to operating and optimizing
What is included
- 5 Days Instructor-led Training
- Free Retake - Up to 2 Years
- Attend Online or Onsite
- Full Access to Study Kits
- Email Support from Instructor
Course Fee - $3,995*
Upcoming Schedule
Upcoming Schedule
If you do not see any schedules, please contact us at
There are no events in the selected category
Course Outline
- Defining the Security Operations Center
- Understanding Network Infrastructure and Network Security Monitoring Tools
- Exploring Data Type Categories
- Understanding Basic Cryptography Concepts
- Understanding Common TCP/IP Attacks
- Understanding Endpoint Security Technologies
- Understanding Incident Analysis in a Threat-Centric SOC
- Identifying Resources for Hunting Cyber Threats
- Understanding Event Correlation and Normalization
- Identifying Common Attack Vectors
- Identifying Malicious Activity
- Identifying Patterns of Suspicious Behavior
- Conducting Security Incident Investigations
- Using a Playbook Model to Organize Security Monitoring
- Understanding SOC Metrics
- Understanding SOC Workflow and Automation
- Describing Incident Response
- Understanding the Use of VERIS
- Understanding Windows Operating System Basics
- Understanding Linux Operating System Basics
Lab Outline
- Configure the Initial Collaboration Lab Environment
- Use NSM Tools to Analyze Data Categories
- Explore Cryptographic Technologies
- Explore TCP/IP Attacks
- Explore Endpoint Security
- Investigate Hacker Methodology
- Hunt Malicious Traffic
- Correlate Event Logs, PCAPs, and Alerts of an Attack
- Investigate Browser-Based Attacks
- Analyze Suspicious DNS Activity
- Explore Security Data for Analysis
- Investigate Suspicious Activity Using Security Onion
- Investigate Advanced Persistent Threats
- Explore SOC Playbooks
- Explore the Windows Operating System
- Explore the Linux Operating System