cisco, sitcs, new it certification exams, threat control solutions, ccnp security

NEW Cisco 300-207 Exam: Implementing Cisco Threat Control Solutions (SITCS)

  • By
  • March 4, 2014
0 Comment

cisco, sitcs, new it certification exams, threat control solutions, ccnp securityAs part of its CCNP Security certification program update, Cisco is phasing out the 642-627 IPS (Implementing Cisco Intrusion Prevention System) exam on 21 April 2014. This date will be the last day CCNP Security candidates can take the IPS exam. The 642-627 exam is being replaced by the 300-207 (Implementing Cisco Threat Control Solutions, SITCS) exam, already available in the testing centers worldwide.

The new CCNP Security program targets Cisco Network Security Engineers responsible for Security in Routers, Switches, Networking devices and appliances, as well as choosing, deploying, supporting and troubleshooting Firewalls, VPNS, and IDS/IPS solutions for their networking environments.

The 300-207 Implementing Cisco Threat Control Solutions (SITCS) exam validates the skills of a network security engineer on advanced firewall architecture and configuration with Cisco’s Next Generation Firewall (NGFW). This exam covers integration of Intrusion Prevention System (IPS) and context-aware firewall components, as well as Web (Cloud) and Email Security solutions. Candidates can prepare for this exam by taking the Implementing Cisco Threat Control Solutions (SITCS) course.

Like 300-206 and most other Cisco exams, 300-207 is a closed book exam, with no reference materials being allowed. According to Cisco, 300-207 covers the following topics:

1.0 Content Security (22%)

1.1 1.1 Implement Cisco CX

  • 1.1.1 1.1.a Describe features and functionality
  • 1.1.2 1.1.b Implement web usage control
  • 1.1.3 1.1.c Implement AVC
  • 1.1.4 1.1.d Implement decryption policies
  • 1.1.5 1.1.e Describe traffic redirection and capture methods

1.2 1.2 Implement Cisco Cloud Web Security

  • 1.2.1 1.2.a Describe features and functionality
  • 1.2.2 1.2.b Implement IOS and ASA connectors
  • 1.2.3 1.2.c Implement AnyConnect web security module
  • 1.2.4 1.2.d Describe web usage control
  • 1.2.5 1.2.e Describe AVC
  • 1.2.6 1.2.f Describe anti-malware
  • 1.2.7 1.2.g Describe decryption policies

1.3 1.3 Implement Cisco WSA

  • 1.3.1 1.3.a Implement data security
  • 1.3.2 1.3.b Describe traffic redirection and capture methods

1.4 1.4 Implement Cisco ESA

  • 1.4.1 1.4.a Describe features and functionality
  • 1.4.2 1.4.b Implement email encryption
  • 1.4.3 1.4.c Implement anti-spam policies
  • 1.4.4 1.4.d Implement virus outbreak filter
  • 1.4.5 1.4.e Implement DLP policies
  • 1.4.6 1.4.f Implement anti-malware
  • 1.4.7 1.4.g Implement inbound and outbound mail policies
  • and authentication
  • 1.4.8 1.4.h Describe traffic redirection and capture methods

2.0 Threat Defense (23%)

  • 2.1 Implement network IPS
  • 2.1.a Describe traffic redirection and capture methods
  • 2.1.b Configure network IPS
  • 2.1.c Describe signatures
  • 2.1.d Implement event actions
  • 2.1.e Configure event action overrides
  • 2.1.f Implement risk ratings
  • 2.1.g Describe router-based IP

2.2 Configure Device Hardening per Best Practices

  • 2.2.a IPS
  • 2.2.b Content Security appliances
  • 2.3 Implement Network IPS
  • 2.3.a Describe signatures
  • 2.3.b Configure blocking
  • 2.3.c Implement anomaly detection

3.0 Devices GUIs and Secured CLI (16%)

  • 3.1 Implement Content Security

4.0 Troubleshooting, Monitoring and Reporting Tools (19%)

  • 4.1 Configure IME and IP logging for IPS
  • 4.2 Monitor Content Security
  • 4.3 Monitor Cisco Security intelliShield

5.0 Threat Defense Architectures (8%)

  • Design IPS solution

6.0 Content Security Architectures (12%)

  • 6.1 Design web security solution
  • 6.2 Design email security solution
  • 6.3 Design application security solution

Explore Cisco VCE files at Examcollection!

Comments
* The most recent comment are at the top

Interesting posts

The Evolving Role of ITIL: What’s New in ITIL 4 Managing Professional Transition Exam?

If you’ve been in the IT service management (ITSM) world for a while, you’ve probably heard of ITIL – the framework that’s been guiding IT professionals in delivering high-quality services for decades. The Information Technology Infrastructure Library (ITIL) has evolved significantly over the years, and its latest iteration, ITIL 4, marks a substantial shift in… Read More »

SASE and Zero Trust: How New Security Architectures are Shaping Cisco’s CyberOps Certification

As cybersecurity threats become increasingly sophisticated and pervasive, traditional security models are proving inadequate for today’s complex digital environments. To address these challenges, modern security frameworks such as SASE (Secure Access Service Edge) and Zero Trust are revolutionizing how organizations protect their networks and data. Recognizing the shift towards these advanced security architectures, Cisco has… Read More »

CompTIA’s CASP+ (CAS-004) Gets Tougher: What’s New in Advanced Security Practitioner Certification?

The cybersecurity landscape is constantly evolving, and with it, the certifications that validate the expertise of security professionals must adapt to address new challenges and technologies. CompTIA’s CASP+ (CompTIA Advanced Security Practitioner) certification has long been a hallmark of advanced knowledge in cybersecurity, distinguishing those who are capable of designing, implementing, and managing enterprise-level security… Read More »

Azure DevOps Engineer Expert Certification: What’s Changed in the New AZ-400 Exam Blueprint?

The cloud landscape is evolving at a breakneck pace, and with it, the certifications that validate an IT professional’s skills. One such certification is the Microsoft Certified: DevOps Engineer Expert, which is validated through the AZ-400 exam. This exam has undergone significant changes to reflect the latest trends, tools, and methodologies in the DevOps world.… Read More »

Certified Cloud Security Professional (CCSP): Exam Content and Salary Insights

As the digital landscape continues to expand and evolve, cloud security has become a top priority for businesses moving their operations online. In this fast-paced world, safeguarding data in the cloud is not just a necessity—it’s a vital component of a company’s success. If you’re looking to carve out a career in this high-demand, ever-evolving… Read More »

Cryptocurrency and Blockchain Certification: A Guide to Career Opportunities

Cryptocurrency and blockchain have moved beyond mere buzzwords – they’re transforming industries, disrupting traditional systems, and creating a wave of career prospects. If you’re eager to ride this wave and position yourself at the forefront of this technological revolution, certification is your key to unlocking the door. But where do you start? In this guide,… Read More »

img