Cisco Systems, Inc.
Cisco Certified Internetwork Expert (CCIE) Security
Credential: Cisco Certified Internetwork Expert (CCIE) Security
Credentialing Agency: Cisco Systems, Inc.
Renewal Period: 3 years
Cisco Systems, Inc., Cisco Certified Internetwork Expert (CCIE) Security recognizes individuals who have the knowledge and skills to implement, maintain and support extensive Cisco Network Security Solutions using the latest industry best practices and technologies. Candidates are encouraged to have three to five years of job experience. Candidates must pass a written qualification exam, which covers networking concepts and some equipment commands, and then must pass a hands-on lab exam, which tests the ability to get a secure network running in a timed test situation.
More information can be found on the certifying agency's website.
Cisco Certified Internetwork Expert (CCIE) Security
Attainability: 
Eligibility Requirements (View Details)
- Credential Prerequisite
- Experience: 3 years recommended
- Education
- Training
- Membership
- Other
- Fee
Note: This credential may have multiple options for a Service member to meet eligibility requirements. Requirements listed here are based on the minimum degree required.
To view other options, see the Eligibility tab.
Exam Requirements (View Details)
- Exam
- Written Exam
- Oral Exam
- Practical Exam
- Performance Assessment
Exam Administration (View Details)
- In-person exam
- Remote proctored on-line exam
- Third-party test vendor
Renewal Period: 3 years
- Continuing Education
- Exam
- Continuing Education OR Exam
- Fee
- Other
Cisco Systems, Inc.
170 West Tasman Dr.
San Jose, CA 95134
Phone: (800) 553-NETS
Contact Page
The Cisco Certified Internetwork Expert (CCIE) Security credential has the following other requirements:
-
1.0 Security Concepts (25%)
-
1.1 Explain common threats against on-premises and cloud environments
-
1.2 Compare common security vulnerabilities such as software bugs, weak and/or hardcoded passwords, SQL injection, missing encryption, buffer overflow, path traversal, cross-site scripting/forgery
-
1.3 Describe functions of the cryptography components such as hashing, encryption, PKI, SSL, IPsec, NAT-T IPv4 for IPsec, pre-shared key and certificate based authorization
-
1.4 Compare site-to-site VPN and remote access VPN deployment types such as sVTI, IPsec, Cryptomap, DMVPN, FLEXVPN including high availability considerations, and AnyConnect
-
1.5 Describe security intelligence authoring, sharing, and consumption
-
1.6 Explain the role of the endpoint in protecting humans from phishing and social engineering attacks
-
1.7 Explain North Bound and South Bound APIs in the SDN architecture
-
1.8 Explain DNAC APIs for network provisioning, optimization, monitoring, and troubleshooting
-
1.9 Interpret basic Python scripts used to call Cisco Security appliances APIs
-
2.0 Network Security (20%)
-
2.1 Compare network security solutions that provide intrusion prevention and firewall capabilities
-
2.2 Describe deployment models of network security solutions and architectures that provide intrusion prevention and firewall capabilities
-
2.3 Describe the components, capabilities, and benefits of NetFlow and Flexible NetFlow records
-
2.4 Configure and verify network infrastructure security methods (router, switch, wireless)
-
2.5 Implement segmentation, access control policies, AVC, URL filtering, and malware protection
-
2.6 Implement management options for network security solutions such as intrusion prevention and perimeter security (Single vs. multidevice manager, in-band vs. out-ofband, CDP, DNS, SCP, SFTP, and DHCP security and risks)
-
2.7 Configure AAA for device and network access (authentication and authorization, TACACS+, RADIUS and RADIUS flows, accounting, and dACL)
-
2.8 Configure secure network management of perimeter security and infrastructure devices (secure device management, SNMPv3, views, groups, users, authentication, and encryption, secure logging, and NTP with authentication)
-
2.9 Configure and verify site-to-site VPN and remote access VPN
-
3.0 Securing the Cloud (15%)
-
3.1 Identify security solutions for cloud environments
-
3.2 Compare the customer vs. provider security responsibility for the different cloud service models
-
3.3 Describe the concept of DevSecOps (CI/CD pipeline, container orchestration, and security
-
3.4 Implement application and data security in cloud environments
-
3.5 Identify security capabilities, deployment models, and policy management to secure the cloud
-
3.6 Configure cloud logging and monitoring methodologies
-
3.7 Describe application and workload security concepts
-
4.0 Content Security (15%)
-
4.1 Implement traffic redirection and capture methods
-
4.2 Describe web proxy identity and authentication including transparent user identification
-
4.3 Compare the components, capabilities, and benefits of local and cloud-based email and web solutions (ESA, CES, WSA)
-
4.4 Configure and verify web and email security deployment methods to protect onpremises and remote users (inbound and outbound controls and policy management)
-
4.5 Configure and verify email security features such as SPAM filtering, antimalware filtering, DLP, blacklisting, and email encryption
-
4.6 Configure and verify secure internet gateway and web security features such as blacklisting, URL filtering, malware scanning, URL categorization, web application filtering, and TLS decryption
-
4.7 Describe the components, capabilities, and benefits of Cisco Umbrella
-
4.8 Configure and verify web security controls on Cisco Umbrella (identities, URL content settings, destination lists, and reporting)
-
5.0 Endpoint Protection and Detection (10%)
-
5.1 Compare Endpoint Protection Platforms (EPP) and Endpoint Detection & Response (EDR) solutions
-
5.2 Explain antimalware, retrospective security, Indication of Compromise (IOC), antivirus, dynamic file analysis, and endpoint-sourced telemetry
-
5.3 Configure and verify outbreak control and quarantines to limit infection
-
5.4 Describe justifications for endpoint-based security
-
5.5 Describe the value of endpoint device management and asset inventory such as MDM
-
5.6 Describe the uses and importance of a multifactor authentication (MFA) strategy
-
5.7 Describe endpoint posture assessment solutions to ensure endpoint security
-
5.8 Explain the importance of an endpoint patching strategy
-
6.0 Secure Network Access, Visibility, and Enforcement (15%)
-
6.1 Describe identity management and secure network access concepts such as guest services, profiling, posture assessment and BYOD
-
6.2 Configure and verify network access device functionality such as 802.1X, MAB, WebAuth
-
6.3 Describe network access with CoA
-
6.4 Describe the benefits of device compliance and application control
-
6.5 Explain exfiltration techniques (DNS tunneling, HTTPS, email, FTP/SSH/SCP/SFTP, ICMP, Messenger, IRC, NTP)
-
6.6 Describe the benefits of network telemetry
-
6.7 Describe the components, capabilities, and benefits of these security products and solutions
The Cisco CCIE Security Lab Exam version 5.0 is an eight-hour, hands-on exam that requires a candidate to plan, design, implement, operate, and troubleshoot complex security scenarios for a given specification. Knowledge of troubleshooting is an important skill and candidates are expected to diagnose and solve issues as part of the CCIE lab exam.
- Module 1: Troubleshooting module
- Module 2: Diagnostic module
- Module 3: Configuration module
There are a number of resources available to help you prepare for the Cisco Certified Internetwork Expert (CCIE) Security examination:
An additional resource is O'Reilly Learning Safari Books Online, a searchable digital library that provides online access to thousands of books, training videos and conference sessions. See the Educational Resources section on the
Related Sites page here on COOL to learn how to get free access.
-
Exam Administration
Credential exams may be administered in-person at a testing site, proctored on-line remotely, or have options for both. If an exam is administered through a test vendor, the third-party test vendor box will be checked. The following test administration options apply to the Cisco Certified Internetwork Expert (CCIE) Security credential where checked:
- In-person exam
- Remote proctored on-line exam
- Third-party test vendor
-
Third-Party Test Vendor Information
Testing for this credential is handled by the following vendor:
Pearson VUE
The test centers are located in the U.S.
They also have some test centers on military bases.
To find out more, use the following links on the Pearson VUE website:
Cisco Certified Internetwork Expert (CCIE) Security
Renewal Period: 3 years
The Cisco Certified Internetwork Expert (CCIE) Security credential has the following recertification information:
-
All certification levels have a three-year recertification requirement. Certified individuals will be able to recertify by completing continuing education activities, taking exams, or a combination of both.
-
Note: Marine Corps COOL will only pay recertification fees for the current year, no arrears will be paid.
Voucher requests for recertification fees must be submitted with proof of the current status of the certification (for example, a screen shot of your
credentialing agency dashboard or a copy of a current fee receipt).
MOS is Military Occupational Specialty
ASI is Additional Skill Identifier
WOMOS is Warrant Officer Military Occupational Specialty
AOC is Area Of Concentration Officer
Functional Area
Branch
Bright Outlook – new job opportunities are very likely in the future for this job
This is an official U.S. Marine Corps website
Updated: January 29, 2021
Marine Occupations Table Legend
Related As
The military occupations shown in this table are related to this credential in one of three ways: Most, Some, or Other.
MOST
This credential is directly related to most of the major duties associated with the military occupation (at least 80%). Note that the credential may require additional education, training or experience before you are eligible for it.
SOME
This credential is related to some tasks associated with the duties of the military occupation (related 80% to at least one or more critical tasks but less than 80% of all of the entire military occupation). Note that the credential may require additional education, training or experience before you are eligible for it.
OTHER
This credential is related to this military occupation, but is more advanced or specialized and therefore will most likely require additional education, training, or experience.
COOL$
Contact usmccool@navy.mil or call 850-452-6337/6583 for a Marine Corps COOL Program Analyst.
Federal Occupations Table Legend
Related As
The federal occupations shown in this table are related to this credential in one of three ways: Most, Some, or Other.
MOST
This credential is directly related to most of the major duties associated with the federal occupation (at least 80%). Note that the credential may require additional education, training or experience before you are eligible for it.
SOME
This credential is related to some tasks associated with the duties of the federal occupation (related 80% to at least one or more critical tasks but less than 80% of all of the entire military occupation). Note that the credential may require additional education, training or experience before you are eligible for it.
OTHER
This credential is related to this federal occupation, but is more advanced or specialized and therefore will most likely require additional education, training, or experience.
Civilian Occupations Table Legend
Bright Outlook
The Bright Outlook icon indicates that new job opportunities are very likely in the future for this job. Click the links in this column to go to the external link My Next Move For Veterans State Map.
Registered Apprenticeship
The Registered Apprenticeship icon indicates that this job has an apprenticeship program registered with the U.S. Department of Labor. Click the links in this column to go to the Apprenticeship Finder and enter career path or location to find apprenticeship opportunities
Local Salary Information
Click the links in this column to go to the external link My Next Move for Veterans web site to view salary and employment information for the job.
Top