Woot Woot! 16 Weeks of Security Learning!! — SECURITY ZERO-TO-HERO

Just signed up last week for the Micronic’s “Security Zero-to-Hero” class. I am beyond stoked and excited!  I have been searching for awhile now for a class to take to help me really “go to the next level” in Security. But I just wasn’t finding the kind of class I was looking for. Every class I saw offered was either focused on one narrow aspect of the security landscape OR focused on helping people pass the CCIE Security.  Neither or which matched what I was searching for.

The class I was hoping to find would be structured more like a semester long college class with real world production discussions and also hands on labs. A class where … over weeks of learning and labbing in my personal time… the learning would just continue to seep deeper and deeper and the “aha” moments would just keep coming.  There were lots of one week classes to choose from. But, for me,  I just don’t see a one week class as a great “immersive” experience  into the complex landscape of the world of Security.  There is a “learning limit”, for me, as to how much my brain can retain during a one week class.  I can learn a great great deal in a week…. but not all the learning goes “deep”.  That happens, for me, over time.

After months of trying to find this class…. I finally just gave up.  Until last week when Katherine McNamara (@kmcnam1) told me about Micronic’s Zero to Hero class and pointed me to her blog page on it – Micronics Zero to Hero Security Review.

I am now officially signed up!  Woot woot woot!  16 weeks – April 28th til August 11th.  Very stoked!

Week 1
  • Class Introduction
  • LAB Topology
  • Class Agenda
  • Basic Student Assessment
  • Security Certification
  • Cisco Security Architecture
  • Network Security – ASA
  • Basic ASA Configuration
  • ASA Management
  • ASA Deployment Scenarios
  • ASA Traffic Flow
Week 2
  • Network Security – ASA
  • Dynamic Routing (RIP, OSPF, EIGRP, BGP)
  • NAT
  • Modular Policy Framework (Inspection Policy)
  • Virtual Firewall
  • Active/Active Failover
  • Transparent Firewall
  • Threat Detection & Botnet Traffic Filtering
  • QoS
  • ID Firewall
  • Firewall Clustering
  • PBR on ASA
Week 3
  • Network Security – Next Generation Firewall (NGFW)
  • Introduction to FirePOWER
  • FirePOWER on ASA
  • FirePOWER Traffic Flow
  • Device Management
  • Object Management
  • Access Control Policy
  • AD Integration
Week 4
  • Network Security – Next Generation Firewall (NGFW)
  • FireSIGHT Technology
  • File Detection and FireAMP
  • IPS Policy and Preprocessors
  • SSL Decryption
  • Correlation Policies
  • Event Analysis and Reporting
Week 5
  • Network Security – VPN
  • IPSec theory
  • PKI
  • VPN types and modes
  • Configuring Site-to-Site VPNs
Week 6
  • Network Security – VPN
  • EasyVPN for S2S VPN
  • DMVPN
Week 7
  • Network Security – VPN
  • GET VPN
  • IKEv2 theory
  • FlexVPN
Week 8
  • Network Security – Remote Access VPN
  • EasyVPN (DVTI)
  • SSL VPN theory
  • Clientless VPN
Week 9
  • Network Security – Remote Access VPN
  • Introduction to AnyConnect
  • Mobile User Security
  • VPN Load Balancing and HA
Week 10
  • Content Security – Web Security
  • Web proxy deployment modes
  • L4TM
  • User Identity & Authentication
  • Web Security Policies
  • URL Filtering
  • Bandwidth Control
  • Application Visibility & Control (AVC)
  • Content Security – Web Security
  • SSL Decryption
  • Outbound Data Security
Week 11
  • Content Security – Email Security
  • How SMTP works
  • SMTP Relay deployment
  • ESA Packet Flow
  • Reputation Filters
  • Message Filters
  • Anti-Spam & Anti-Virus
  • Content Security – Email Security
  • Content Filters
  • Outbreak Filters
  • Data Loss Prevention (DLP)
  • Email Encryption (CRES)
Week 12
  • Secure Access – AAA
  • Introducing to AAA
  • Setup AAA Clients
  • Using TACACS+ for Administrators
  • Using RADIUS for Network Access (802.1x)
  • Introducing to Cisco ISE
  • AD Integration
  • Configuring MAB
Week 13
  • Secure Access – AAA
  • Configuring Wired 802.1x
  • Configuring Wireless 802.1x
  • Guest Access
  • Device Profiling
  • BYOD & MDM
  • L2 Security
Week 14
  • Network Security – Routers
  • Router ACL
  • Configuring Zone-Based Firewall on Router
  • Router Hardening
  • Configuring NAT on Routers
  • NetFlow and Traffic Monitoring
Week 15
  • All-in-one LAB #1
Week 16
  • All-in-one LAB #2


Categories: Security

Tags: , , , , , ,

2 replies

  1. Was it a good class?

Leave a Reply