• Training : +91 8383961646
  • Business : +91 9818 239 009
  • info@uninets.com
CCIE Security Integrated Course

Grab The Opportunity to Learn From Industry Best Network Security Trainers. All Trainers are Working Professionals

4.5 (151 ratings)
664 students enrolled

CCIE Security Integrated Training

The CCIE Security integrated training course is a part of our 100% placement for sure program. This training is specially designed and recommended for freshers or for students appeared in their last year of graduation and who have interest in the field of IT Network Security. This training can also be useful for the experienced professionals who wants to move their career path into Security.

strong>CCIE Security version 5 will be covered as a part of the training program. The following devices are introduced in this version including previous versions of the lab exam.

  • FirePOWER Management Center version 6.0.1 and/or 6.1
  • FirePOWER NGIPSv version 6.0.1
  • Cisco FirePOWER Threat Defense version 6.0.1
  • FireAMP Private Cloud
  • Cisco ASAv version 9.1
  • Cisco Application Policy Infrastructure Controller Enterprise Module version 1.2
  • Email Security Appliance (ESA) version 9.7.1
  • IOSv L2 version 15.2 (which is virtual IOS for layer 2)
  • IOSv L3 version 15.5(2)T (which is virtual IOS for layer 3)
  • Cisco CSR 1000v version 3.16.02S
  • Cisco Unified Communications Manager version 8.6(1)
  • Cisco Identity Services Engine (ISE) version 2.1.0
  • Cisco Secure Access Control System (ACS) version
  • Cisco Web Security Appliance (WSA) version 9.2.0
  • Cisco Wireless Controller (WLC) version 8.0.133
  • Test PC is Microsoft Windows 7
  • Active Directory is running on Microsoft Windows Server 2008
  • AnyConnect version 4.2

Physical devices used:

  • Cisco Catalyst Switch C3850-12S 16.2.1 version 16.2.1
  • Cisco Adaptive Security Appliance: 5512-X version 9.6.1
  • Cisco 2504 Wireless Controller: 2504 version
  • Cisco Aironet1602E version 15.3.3-JC
  • Cisco Unified IP Phone 7965 version 9.2(3)

CCIE Security Integrated training will provide you the basic to the advance level of network security knowledge on the Cisco specific environment that include the real world practical exposure on Cisco Firewall ASA, Cisco IPS, ACS, Cisco Routers and Switches which not only help you getting a great start in your network Security career but also provide you an expert level knowledge on Cisco Security Products which will further help you in competing with others in your current and future organizations.

The training batches would be Regular, Weekends and Fast Track for more flexibility to all students. The students can join any of the batches as per their convenience. All the batches will only be taught by the Security certified and working professionals who have at least 6+ years of industry experience in Security Domain. We offer our own proprietary security workbooks which match up with our security rack physical topology. These workbooks help students in understanding the technical concepts in-depth by practising labs given in the workbooks. The classes will be hands-on demonstrations on all real equipment on each technology where student can also practice after classes. The sessions on communication skills will also be covered as a part of this program. At the end of this training we also provide highly sophisticated HR and technical interviews trainings which help students to match up with the IT network security industry demand. The training program is expected to be very rigorous and students have to study for more then 8 hours per day for several months.

This training will open up the gates for good jobs available in LAN and WAN Security domains and also make you pass your CCIE Security version 5 Lab Exam in your first attempt.

CCIE Integrated Expected Salary The students from this training program can expect a pay package starting from 3 lacs to 8 lacs annually on profiles include Security Analyst, Security Specialist, Network Security Consultant etc.

Prerequisite for CCIE Security Integrated Training:

One to one session with our deemed Instructor, who will evaluate you in terms of communication skills and inclination towards network security for our 100% placement for sure program

The following 3 modules with extensive course curriculum will be the covered in CCIE Security Integrated training program:

*We strongly recommend CCNA Routing & Switching training as a prerequisite for CCIE Security Integrated Candidates as Basic concepts of IT Networking will be covered in CCNA Routing & Switching. As a complementary we will also cover CCNA R&S training as a part of this training program”


Course Content


CCIE Security Integrated course outline :

CCNA Security
  1. Security Concepts

    • Learn the Common security principles like confidentiality, integrity, availability (CIA)
    • Define and Describe SIEM technology
    • Describe the Identify common security terms,common network security zones
    • Describe the Common security threats concepts like common network attacks,social engineering,malware
    • Learn the Cryptography concepts like key exchange , key exchange
    • Compare the difference between symmetric and asymmetric encryption
    • Describe digital signatures, certificates, and PKI
    • Classify and define differnet network topologies like Campus area network (CAN), Cloud, wide area network (WAN), Data center Network security for a virtual environment
  2. Secure Access

    • learn how Secure management works
    • learn and Compare in-band and out-of band
    • Configure and verify secure network management through SNMP v3 using an ACL
    • Describe how to configure and verift NTP Security
  3. AAA concepts

    • Learn how RADIUS and TACACS+ technologies Works
    • Configure and verify administrative access on a Cisco router using TACACS+
    • Configure and Verify authentication on a Cisco router to a TACACS+ server
    • Describe and Explain the integration of Active Directory with AAA
    • Describe authentication and authorization using ACS and ISE
    • Describe 802.1X authentication and functions of 802.1X components
    • Describe how BYOD architecture framework works
    • Describe various function of mobile device management (MDM)
  4. VPN

    • Detailes description of VPN concepts
    • Describe how differnet IPsec protocols and delivery modes (IKE, ESP, AH, tunnel mode,transport mode) Works
    • Describe hairpinning, split tunneling, always-on, NAT traversal concepts
    • Configure and implement Remote access VPN
    • Configure Implement and verify basic clientless SSL VPN using ASDM and its connection
    • Implement and verify basic AnyConnect SSL VPN using ASDM
    • Describe and Identify endpoint posture assessment concepts
    • Implement Site-to-site VPN along with IPsec site-to-site VPN with pre-shared key authentication on Cisco
    • Implement and verify an IPsec site-to-site VPN with pre-shared key authentication on Cisco routers and ASA firewalls
  5. Securing Routing and Switching Devices and Protocols

    • Security on Cisco routers like Configure multiple privilege levels , ultiple privilege levels, IOS role-based CLI access
    • Implement and verify Cisco IOS resilient configuration
    • Implement routing update authentication on OSPF
    • Learn how to Secure the control plane
    • Explain control plane policing functions and works
    • Explain different Common Layer 2 attacks like STP, ARP, MAC spoofing, CAM table Overflow , VLAN hopping, DHCP Spoofing
    • Describe Mitigation procedures for DHCP snooping, Dynamic ARP Inspection,port security
    • Describe BPDU guard, root guard, loop guard to Protect L2 Environment
    • Describe the security implications of a PVLAN and native VLAN
  6. Implementing Cisco Firewall Technologies

    • Describe operational strengths and weaknesses of the different firewall technologies
    • Describe the different Firewall like Proxy firewalls , Application firewall, Personal firewall
    • Compare and contarst stateful vs. stateless firewalls its operation and its state table function
    • Implement and verify Static , Dynamic, PAT, Policy NAT, and other NAT operation on Cisco ASA 9.x
    • Implement zone-based firewall and its component like Zone to Zone and Self Zone features
    • Confdigure Firewall features on the Cisco Adaptive Security Appliance (ASA) 9.x
    • Configuration and Verification of ASA access management
    • Configuration and Verification of security access policies
    • Configuration and Verification of Cisco ASA interface security levels
    • Configuration and Verification of default Cisco Modular Policy Framework (MPF)
    • Describe different deployment modes of (routed firewall, transparent firewall)
    • Describe methods of implementing high availability like Securoty Context and Firewall services
  7. IPS

    • Describe IPS deployment considerations
    • Define Network-based IPS vs. host-based IPS
    • Describe the different Modes of IPS deployment (inline, promiscuous – SPAN, tap)
    • Define different IPS Placement (positioning of the IPS within the network)
    • Describe IPS technologies like Rules/signatures , Rules/signatures, Detection/signature engines
    • Difine different IPS Trigger actions/responses (drop, reset, block, alert, monitor/log, shun)
CCNP Security
  1. EXAM: Implementing Cisco Edge Network Security Solutions (300-206)-SENSS

    • Describe Threat Defense Concepts

      • Implementation and verification of firewall (ASA or IOS depending on which supports the implementation)
      • Implementation and verification of ACLs
      • Implementation and verification of static/dynamic NAT/PAT
      • Configuration and Verification of object groups
      • Describe various threat detection features
      • Implement botnet traffic filtering
      • Configuration of application filtering and protocol inspection
      • Describe various ASA security contexts
      • Implement and verify Layer 2 Security
      • Configuration and verification of DHCP snooping
      • Describe dynamic ARP inspection Works
      • Describe whats is storm control
      • Configuration of port security methods
      • Describe various common Layer 2 threats and attacks and mitigation
      • Describe what is MACSec
      • Configure IP source verification and its implementation
      • Configure device hardening per best practices on Routers , Switches and Firewalls
    • Cisco Security Devices GUIs and Secured CLI Management

      • Implement and configure SSHv2, HTTPS, and SNMPv3 access on the network devices
      • Implementation and verification of RBAC on the ASA/IOS using CLI and ASDM
      • Describe how Cisco Prime Infrastructure works
      • whats is the Functions and use cases of Cisco Primeon Device Management
    • Describe Cisco Security Manager (CSM) and its functions

      • Implementation of Device Managers
      • Implement ASA firewall features using ASDM
    • Management Services on Cisco Devices

      • Configurtion of NetFlow exporter on Cisco Routers, Switches, and ASA
      • Implement SNMPv3 on cisco devices
      • Create views, groups, users, authentication, and encryption via SNMPv3
      • Implementation and verification of logging on Cisco Routers, Switches, and ASA using Cisco best practices
      • Implementation and verification of NTP with authentication on Cisco Routers, Switches, and ASA
      • Describe CDP, DNS, SCP, SFTP, and DHCP features
      • Describe security implications of using CDP on routers and switches
    • Threat Defense Architectures

      • Design a Firewall Solution on Threat Defense
      • What is High-availability
      • Describe Basic concepts of security zoning
      • Describe Transparent & Routed Modes
      • Describe Security Contexts
      • Describe Layer 2 Security Solutions
      • Implement defenses against MAC, ARP, VLAN hopping, STP, and DHCP rogue attacks
      • Describe how PVLANs works to segregate network traffic at Layer 2
    • Security Components and Considerations

      • Describe security operations management architectures on Single device manager vs. multi-device manager
      • Describe Data Center security components and considerations on Virtualization and Cloud security
      • Describe Collaboration security components and considerations on ASA
  2. EXAM: Implementing Cisco Threat Control Solutions (300-207) SITCS

    • learn Content Security Concepts

      • Describe Cisco ASA 5500-X NGFW Security Services like features and functionality
      • Implement web usage control (URL-filtering, reputation based, file filtering) on ASA
      • Implemention and verification of AVC and decryption policies on Cisco ASA 5500-X NGFW
      • Describe and learn traffic redirection and capture methods Cisco ASA 5500-X NGFW
      • Define Cloud Web Security its features and functionality
      • Implement Cloud Web Security IOS and ASA connectors
      • Implementation and verification of AnyConnect web security module
      • Describe web usage control Works
      • Implemention of AVC and anti-malware on Cisco Cloud Web Security
    • Describe Cisco WSA features and functionality

      • Implementation of data security on Cisco WSA
      • Implement WSA Identity and Authentication, including Transparent User Identification
      • Describe web usage control, AVC , anti-malware decryption policies traffic redirection and capture methods on WSA
    • Describe Cisco ESA features and functionality

      • Implementation of email encryption , anti-spam policies, virus outbreak filter on Cisco ESA
      • Implementation of DLP policies, anti-malware Implement inbound and outbound mail policies and authentication on ESA
      • Describe traffic redirection and various capture methods on Cisco ESA
    • Learn and implement Threat Defense

      • What is Network IPS
      • Configuration and Implementation of traffic redirection and capture methods
      • Implement various network IPS deployment modes
      • learn and Describe signatures engines
      • Implementation and verification of event actions & overrides/filters
      • Implementation of anomaly detection
      • Describe various risk ratings
      • Describ and learn about IOS IPS
      • Configure device hardening per best practices on IPS
      • Learn about Content Security appliances
    • Device GUIs and Secured CLI

      • learn Content Security
      • Implementation and verificationof HTTPS and SSH access
      • Describe various configuration elements
      • Configure and Implement ESA GUI for message tracking
    • Troubleshooting, Monitoring, and Reporting Tools

      • Configure and test IME and IP logging for IPS
      • Describe and implement reporting functionality on Content Security
      • Configure and Implement the WSA Policy Trace tool
      • Implementation of the ESA Message Tracking tool
      • Implement the ESA Trace tool
      • How web interface is used to verify traffic is being redirected to CWS
      • Configure and implement CLI on IOS to verify CWS operations
      • Configure and implement CLI on ASA to verify CWS operations
      • Configure and implement PRSM Event Viewer to verify ASA NGFW operations
      • Describe various the PRSM Dashboards and Reports
    • Threat Defense Architectures

      • Design and Describe IPS solution
      • Deploy Inline or Promiscuous
      • Deployand implement as IPS appliance, IPS software or hardware module or IOS IPS
      • Describe various methods of IPS appliance load-balancing
      • Describe why Traffic Symmetry is needed
      • Describe the Inline modes comparison – inline interface pair, inline VLAN pair, and inline VLAN group
    • Content Security Architectures

      • Design various Web Security solution
      • Compare ASA NGFW vs. WSA vs. CWS and its functions
      • Compare Physical WSA vs. Virtual WSA and its functions
      • List available CWS connectors
      • Design Email Security solution
      • Compare Physical ESA vs. Virtual ESA
      • Describe Hybrid mode
      • Design Application Security solution
      • Describe the need for application visibility and control
  3. EXAM: Implementing Cisco Secure Access Solutions (300-208)

    • Identity Management and Secure Access using Various methods

      • Implement and verify device administration
      • Compare and implement AAA options like TACACS+, RADIUS, Native AD and LDAP
      • Describe identity management and its features and functionality of authentication and authorization
      • Describe and learn about identity store op
    • Implement wired/wireless 802.1X

      • Describe how RADIUS flows
      • Define and learn AV pairs
      • Describe various EAP types
      • Describe and learn supplicant, authenticator, and server
      • Define various Supplicant options
      • Define concepts of 802.1X phasing (monitor mode, low impact, closed mode)
      • What is AAA server
    • Implement MAB

      • Describe the MAB process within an 802.1X framework
      • Describe how Flexible authentication configuration works
      • leane and define ISE authentication/authorization policies
      • configuration and implemenattion of ISE endpoint identity
      • Verify MAB Operation methods
    • Implement various network authorization enforcement

      • Configure and verify dACL
      • Configure and verify Dynamic VLAN assignment
      • Describe how SGA Work
      • Implement and verify Named ACL
      • Describe how CoA Works
    • Implement Central Web Authentication (CWA)

      • Describe the function of CoA to support web authenticationv
      • Configure authentication policy to facilitate CWA
      • Describe various URL redirect policy
      • Define how Redirect ACL works
      • Customize the web portal
      • Verify central web authentication operation
    • Implement profiling and its Services

      • What is Network probes
      • Define how IOS Device Sensor works
      • Describe Feed service
      • Describe Profiling policy rules
      • Describe how to Utilize profile assignment in authorization policies
      • Verify various profiling operation
    • Implement and Verify guest services

      • learn how to Manage sponsor accounts
      • Describe Sponsor portals
      • Describe what is Guest portals, Guest Policies,Self registration,Guest activation
      • Differentiate various secure access
      • Verify guest services operation
    • Implement and verify posture services

      • Describe the function of CoA to support posture services
      • What is Agent options
      • Define Client provisioning policy and redirect ACL
      • Describe Posture policy, Quarantine/remediation
    • Implement and verify BYOD access

      • Describe various elements of a BYOD policy
      • Describe Device registration and devices portal
    • learn and describe Threat Defense

      • Describe TrustSec Architecture in detail
      • What is SGT Classification – dynamic/static
      • Describe SGT Transport – inline tagging and SXP
      • DescribeSGT Enforcement – SGACL and SGFW
      • What is MACsec
    • Learn various Threat Defense Architectures

      • Design highly secure wireless solution with ISE and its implementation
      • What is Identity Management
      • Describe 802.1X and its features
      • Describe MAB and its features
      • Describe Network authorization enforcement
      • Define CWA and its features
      • What is Profiling and its features
      • What is Guest Services, Posture Services and BYOD Access
    • Design Identity Management Architectures

      • Describe how to administrate the Device
      • Whats is Identity Management, Profiling, Guest Services
      • Describe in details ablout Posturing Services and BYOD Access
  4. EXAM: Implementing Cisco Secure Mobility Solutions (300-209)

    • Secure Communications Methods

      • Implement and varify Site-to-site VPNs on routers and firewalls
      • Implement and varify Describe GETVPN
      • Implement and varify IPsec (with IKEv1 and IKEv2 for both IPV4 & IPV6)
      • Implement and varify DMVPN (hub-Spoke and spoke-spoke on both IPV4 & IPV6)
      • Implement and varify Implement FlexVPN (hub-Spoke on both IPV4 & IPV6) using local AAA
      • Implement and varify Implement remote access VPNs
      • Implement and varify AnyConnect IKEv2 VPNs on ASA and routers
      • Implement and varify AnyConnect SSLVPN on ASA and routers
      • Implement and varify clientless SSLVPN on ASA and routers
      • Implement and varify FLEX VPN on routers
    • Troubleshooting, Monitoring, and Reporting Tools (as implemented above)

      • Troubleshoot various features of VPN using ASDM & CLI
      • Troubleshoot various features of IPsec
      • Troubleshoot various features of DMVPN
      • Troubleshoot various features of FlexVPN
      • Troubleshoot various features of AnyConnect IKEv2 and SSL VPNs on ASA and routers
      • Troubleshoot various features of clientless SSLVPN on ASA and routers
    • Design and describe various remote access VPN solutions

      • Identify various functional components of FlexVPN, IPsec, and Clientless SSL
      • Describe VPN technology considerations based on functional requirements
      • Identify describe VPN technology based on configuration output
      • Identify describe AnyConnect client requirements
      • Define Clientless SSL browser and client considerations/requirements
      • Identify and describe split tunneling requirements
    • Describe encryption, hashing, and Next Generation Encryption (NGE)

      • Compare and describe Symmetric and asymmetric key algorithms
      • Identify and describe the cryptographic process in VPNs – Diffie-Hellman, IPsec –ESP, AH, IKEv1, IKEv2,
      • Identify and describe the cryptographic process in VPNs hashing algorithms MD5 and SHA, and authentication methods
      • Describe and implement PKI components and protection methods
      • Describe Elliptic Curve Cryptography (ECC)
      • Compare and contrast SSL, DTLS, and TLS
CCIE Security
  1. System Hardening and Availability Concepts

    • Learn Routing plane security features (for example, protocol authentication and route filtering)
    • Describe the Control Plane Policing features
    • Define Control plane protection and management plane protection
    • What is Broadcast control and switch port security
    • What is Additional CPU protection mechanisms (for example, options drop and logging interval)
    • Describe Disable unnecessary services
    • How Control device access (for example, Telnet, HTTP, SSH, and privilege levels)
    • Define Device services (for example, SNMP, syslog, and NTP)
    • What is Transit traffic control and congestion management
  2. Threat Identification and Mitigation

    • Identification and protectaction against fragmentation attacks
    • Identification and protectaction against malicious IP option usage
    • Identification and protectaction against network reconnaissance attacks
    • Identification and protectaction against IP spoofing attacks
    • Identification and protectaction against MAC spoofing attacks
    • Identification and protectaction against ARP spoofing attacks
    • Identification and protectaction against DoS attacks
    • Identification and protectaction against DDoS attacks
    • Identification and protectaction against man-in-the-middle attacks
    • Identification and protectaction against port redirection attacks
    • Identification and protectaction against DHCP attacks
    • Identification and protectaction against DNS attacks
    • Identification and protectaction against MAC flooding attacks
    • Identification and protectaction against VLAN hopping attacks
    • Identification and protectaction various Layer 2 and Layer 3 attacks
    • Describe NetFlow and its features and how it Capture and utilize packet captures
  3. Intrusion Prevention and Content Security

    • Describe Cisco IPS 4200 Series Sensor appliance and Cisco ASA appliance IPS module
    • Learn how to Initialize the sensor appliance
    • Learn Sensor appliance management
    • Learn how to configure Virtual sensors on the sensor appliance
    • Implement various security policies
    • Implement Promiscuous and inline monitoring on the sensor appliance
    • Learn Tune signatures on the sensor appliance
    • Whats is Custom signatures on the sensor appliance
    • What are Signature engines on the sensor appliance
    • Use Cisco IDM and Cisco IME to manage the sensor appliance
    • What is Event action overrides and filters on the sensor appliance
    • How Event monitoring is done on the sensor appliance
    • Implementation and verification of VACL, SPAN and RSPAN on Cisco switches
  4. Cisco WSA

    • Implementatio and verification of WCCP
    • learn Active Directory integration
    • Implement Custom categories on WSA
    • HTTPS configuration on WSA
    • Services configuration (web reputation) on WSA
    • Configure proxy bypass lists on WSA
    • Configuration of Web proxy modes on WSA
    • Implement Application visibility and control
  5. Identity Management

    • Implement Identity-based AAA
    • Implement Cisco router and appliance AAA via RADIUS and TACACS+
    • learn Device administration (Cisco IOS routers, Cisco ASA, and Cisco ACS5.x)
    • Describe Network access (TrustSec model)
    • learn Authorization results for network access (ISE)
    • Describe IEEE 802.1X (Cisco ISE)
    • Describe VSAs (Cisco ASA, Cisco IOS, and Cisco ISE)
    • What is Proxy authentication (Cisco ISE, Cisco ASA, and Cisco IOS)
  6. Cisco ISE

    • Profiling configuration (probes) on ISE
    • Learn Guest services, Posture assessment on ISE
    • Learn Client provisioning (CPP)
    • Configure Microsoft Active Directory integration and identity sources
  7. Perimeter Security and Services

    • Describe and Configure Cisco ASA firewalls
    • Describe and Configure Basic firewall Initialization
    • Describe and Configure Device management
    • Describe and ConfigureAddress translation
    • Describe and Configure ACLs
    • Describe and Configure IP routing and route tracking
    • Describe and Configure Object groups
    • Describe and Configure VLANs
    • Describe and Configure Configure EtherChannel
    • Implement High availability and redundancy
    • Implement Layer 2 transparent firewall
    • Implement Security contexts (virtual firewall)
    • Implement Cisco Modular Policy Framework
    • Configuration and verification of Identity firewall services
    • Configuration and verification of Cisco ASA with ASDM
    • Configuration and verification of Context-aware services
    • Describe QoS capabilities
  8. Cisco IOS zone-based firewall

    • Configuration and verification of Network, secure group, and user-based policy
    • Configuration and verification of Performance tuning
    • Configuration and verification of Network, protocol, and application inspection
    • Learn concept of Perimeter security services
    • Configuration and verification of Cisco IOS QoS and packet-marking techniques
    • Configuration and verification of Traffic filtering using access lists
    • Configuration and verification of Cisco IOS NAT
    • Configuration and verification of uRPF
    • Implement Port to Application Mapping (PAM)
    • Implement Policy routing and route maps
  9. Confidentiality and Secure Access

    • Describe and implement IKE (v1/v2)
    • Implementation of IPsec LAN-to-LAN (Cisco IOS and Cisco ASA)
    • Implementation and verification of DMVPN
    • Implementation and verification of FlexVPN
    • Implementation and verification of GET VPN
    • Implementation and verification of Remote-access VPN
  10. Implementation and verification ofCisco EasyVPN Server (Cisco IOS and Cisco ASA)

    • Implementation and verification of VPN Client 5.X
    • Configuration and verification of Clientless WebVPN
    • Configuration and verification of Cisco AnyConnect VPN
    • Configuration and verification of Cisco EasyVPN Remote
    • Describe how SSL VPN gateway works
    • Describe how VPN high availability Works
    • Describe QoS for VPN
    • Describe VRF-aware VPN
    • Configuration and verification of MACsec
    • Configuration and verification of Digital certificates (enrollment and policy matching)
    • Implementation and verification of Wireless access
    • Implementation and verification of EAP methods
    • Implementation and verification of WPA and WPA2
    • Implementation and verification of wIPS


Course Fee



Regular Batch

+91 8383 961 646Training Fee Queries (9 AM - 6 PM IST)

Weekends Batch

+91 8527 91 67 51Training Fee Queries (9 AM - 10 PM IST)


Trainer Profile


Trainers' Profile :


Experience: 6+ Years
Certifications: CCIE (Written) Security, CCNP Security, CCNA Security, CCNA RS, CCNP RS, CCSA, CCSE, Palo Alto Expert, F5 LTM
Associate Company: HCL, TCS, BT



Experience: 6+ Years
Certifications: CCIE#43614 (Security), CCNP Security, CCNA Security, CCNP RS, CCNA RS, CCSA, CCSE, F5 LTM
Associate Company: HCL, Wipro and British Telecom


Timing Schedule


Topic Name Regular Weekends Fast track Instructor Name
CCNA Security 3 Weeks 4 Weeks 2 Weeks Mr. Praveen, Mr. Pankaj
CCNP Security 15 Weeks 17 Weeks 8 Weeks
Mr. Praveen, Mr. Pankaj
CCIE Security 11 Weeks 16 Weeks 4 Weeks
Mr. Praveen, Mr. Pankaj
CCIE Lab Exam Sessions 3 Weeks 3 Weeks 2 Weeks
Mr. Praveen, Mr. Pankaj
Lab Tour :

Devices Used for CCIE Security Integrated Training:

  • Routers: 3 x 2611xm Series Cisco Routers, 3 x 2811 Series Cisco Routers
  • Switches: 3 x 3550 Series Cisco Switches, 3 x 3560 Series Cisco Switches
  • Firewall and IPS: 2 x 5510 Cisco ASA, 1 x 4240 Cisco IPS Sensor and 1 x ACS

Devices used for CCIE Security

  • Routers: 6 x 2811, 2 x 2911 Series Cisco routers
  • Switches: 6 x 3560, 2 x 3550, Series Cisco switches
  • Firewall and IPS: 4 x 5510 Cisco ASA, 1 x 4240 Cisco IPS Sensor and 2 x ACS, 1 x ISE, Iron Port, 1 x 2504 Cisco WLC, 2 x 1142 Cisco AP, 1 x Cisco IP Phone
  • Checkout the lab topology via Uninets Virtual Racks Login

Your Free Kit Include after Course enrolment:

  • Uninets T-Shirt
  • Uninets Notebook , Pen
  • Course Related Online Workbooks
  • Interview preparation and Communication skills training books
  • Free Virtual Rack Access




Students Review :

SauravSauravCheckpoint CCSA Security
I have 8 years of experience in networking but I was looking for enter in security profile. I heard the name of UniNets as one of the best networking training institute, so I enrolled for CCSA checkpoint training here. I have many things to say about UniNets, but in short, you can get 24*7 lab access, working professional trainers, workbook, virtual racks, flexible timings, minimum fees. So, I am highly recommending UniNets for security training.
RohanRohanCheckpoint, ASA, Palo Alto, F5 LTM
I was searching training institute for network security in Delhi NCR, finally I found UniNets for my professional courses training. I have done ASA, Checkpoint, Palo alto, F5 LTM training from this institute. The best part about UniNets is that they have industry best trainers and best lab facilities with virtual racks and 24*7 access facilities. I strongly recommending this institute for networking courses.
YatirajYatirajCisco CCNP Security
I have join UniNets for CCNP security. I don't know anything before joining this institute but with the help of trainers and supporting staff I am now able to configure, troubleshoot networking devices. Trainers provided me the basic idea about network security which helps to build my security foundation. They provides 24*7 Lab facility, flexible timings, workbooks, online virtual racks, professional trainers, etc, So UniNets is the best networking institute in India.
Krishna ChandraKrishna ChandraCheckpoint CCSA, F5 Load Balancer
Krishna Chandra has enrolled at UniNets for Checkpoint CCSA course. After completing his training of this certification course he has enrolled again for F5 Load balancer training. He is now able to fly high in IT professionals world.
AmitAmitCheckpoint CCSA
Amit has enrolled at UniNets for Checkpoint CCSA course training. He is very happy after enrollment at UniNets. He is getting 24*7 lab access, industry best CCSA professional trainers, expert lab instructors, online racks, etc. He is now planning to get training in other firewall certification courses like CCSA, Palo alto, etc.
Lalit PandeyLalit PandeyCCIE R&S, F5 LTM, Nexus
"UniNets really made the things easy and I became an expert from a novice. Now I am placed in a top MNC based on Routing and Switching technical expertise which I obtained from wonderful trainers at UniNets. Thank you for everything to team UNINETS"
KawshikKawshikPlacement Oriented Program
I am M.Tech graduate and my interest in networking brought me here. Once I joined freshers programmy networking concepts got cleared and received multiple offers. I am currently pursuing CCIE from here.
AnupamAnupamCCIE R&S, Nexus, F5 LTM
"I was struggling to get a good job before joining UniNets. I enrolled here for CCIE R&S training. My concepts were solidify after few months. Later on I obtained multiple offers from top companies. I really thanks to UniNets for building my career to the highest level. I also enrolled here for other courses such as Nexus and F5"
Ubaid ShahidUbaid ShahidCCNA, CCNA Security, CCNA Wireless
Being a fresher I was struggling to get a job, After getting enrolled for UniNets placement oriented program I got confidence and finally got placed in NetData Vault. I would definitely recommend UniNets for people like me. I will come back here for advance courses.
Piyush SinghPiyush SinghCCIE R&S, BGP+MPLS, Nexus, F5 LTM
"I have been to many other Institute for clearing my routing and switching concepts but unfortunately they were all so bad until I joined UniNets where I was trained by a CCIE R&S certified trainer himself. He helped me not only clearing my concepts but also helped me in preparing technical round of interviews. Thanks to UniNets for giving me such an expert level training"
Average Rating: 5.0 out of 5 (5 votes)
5 stars
4 stars
3 stars
2 stars
1 star
Swati Gupta

Nice arrangement by uninets

Before joining uninets, I searched many institutes to do my ccie security and finally i decided to join here because they gave me a demo which was impressive and the staff was very polite and respond very promptly. They arranged a PG and food facility near by the institute. Its hardly 5min away. More then that they provided me lab access and books from the very first day of joining. till now everything is good.

2 years ago
Mannat Benerjee

uninets review for ccie security

I am from Kolkota. I completed B.Tech and joined uninets as a fresher in ccie security integrated training program. As of now I have completed ccna and ccnp security in 4 months and I have given couple of interviews for placement but I want to pursue ccie security before getting a job. Uninets is forcing me to take a job first then keep doing your ccie security part time. I think they are very nice people but my goal is to achieve ccie security.

2 years ago
Daniel Heath

CCIE Security Training

I am from UK and I joined Uninets for CCIE Security end to end program. It has been 6 months now and I am really very impressed with their trainers and support team. I would love to continue and shall bring more of my friends to join Uninets.

3 years ago
Satpal Jattan

Great training at UniNets

Best training I got here. My trainers, lab facilities, ready to supports anytime are the positive points. There fees are competitive and reasonable. I had paid them in EMI. Now I am working in Gurgaon with good package. Thanks UniNets.

3 years ago
Rajiv Rohilla

Best training for CCIE security

I have enrolled at UniNets for CCIE security training. I am working professional and have already 6 years of industry experience but when I met my trainers I was extremely happy that they were highly experienced and working at top MNC. UniNets lab facilities are the best. They are open for 24*7. Any help you can call anytime. Very supportive team. Thanks

3 years ago

Review CCIE Security Integrated Course.

Your email address will not be published. Required fields are marked *



Network Data & Security – EXPERT

He is a Network Security Professional having 6+ years of working experience as a Security Consultant. He has been handling various security design, operation and information security projects. He is currently holding certifications includes CCNP security, CCNA Security, CCSA, CCSE and other cisco specialist certifications. Pankaj is currently preparing for CCIE Security version 5 lab exam. In the past he has associated with companies like British Telecom, HCL and Wipro.

He has been in the IT security trainings for the last 2 years and has succefully delivered over 50+ trainings which includes corporate and individual trainings.


Data Network Expert

He has been in the IT networking industry for the last 8+ years. He is into Data Networks and has an expertise over BGP, MPLS, OSPF, EIGRP, STP and other routing and switching protocols. He delivers various network design and implementation projects besides delivering trainings on CCIE RS, CCNP RS, CCNA RS, F5 LTM etc. Himanshu has strong passion towards delivering trainings.He has been associated with companies like Accenture, TCS etc.

He is currently working on achieving his CCIE RS lab exam. In the past he has devivered over 200+ trainings in the last 5 years.

Rahul Singh (CCIE#35273)

Dual CCIE (R&S and SP)

An extremely driven and highly skilled 2 x CCIE#35273 RS & SP Senior Network Consultant. He is a Master Instructor with extensive experience of 14 years in delivering IP networks. He has an experience in network design and consultancy, IT technical management, project handling implementation and training. Rahul has been associated with various companies like HCL, TCS, Dell, etc.

He has been in the IT Industry for Over 15 years. His achievements include acquiring the prestigious Cisco CCIE Certifications in RS and SP. He is currently working on achieving his CCIE DC lab exam. In the past he has devivered over 100+ trainings in the last 3 years.

Alok (CCIE#42872)

Data Center Solution Expert

He has an extensive in-depth experience of 10+ years in data center design and transformation including requirements gathering and analysis; business case and consolidation strategy development; transition roadmap and migration planning; industry best practices; and solutions architecture promoting excellence, best-in-class methodologies, and continuing professional development.

He has an expertise in VMware, Data Center Virtualization, Nexus 9000/7000//5000/2000, Nexus ACI, Nexus 1000v, vPC, FabricPath, VDC, OTV / LISP, ASA Clustering, F5 LTM & GTM, FCoE, Unified Fabri, Routing and Switching.

He has been assocaited with companies like BT, HCL, Orange etc. His achievements include the prestigious CCIE#42872 Certifications in DC, RS (Q), NSX and VCP6. He is currently working on achieving CCDE exam. In the past he has devivered over 100+ corporate trainings in the last 6 years.

Abhishek Pal (CCIE#48843)

R & S Trainer

He is having 7+ years of IT networking experience He works as a senior consultant as a network and security consultant. He has an expertise over Cisco ASA, ISE, ACS, BGP, MPLS, OSPF, EIGRP, STP and other routing and switching protocols. He has delivered various network & security design and implementation complex projects over the years. Abhishek is inclined towards delivering structured and client oriented focus trainings. He has been associated with companies like Cisco, Accenture etc.

He holds CCIE#48843 RS certification and now he is working on achieving his CCIE Security lab exam. In the past he has devivered over 20+ trainings in the last 3 years.

Deepak (CCIE#37340)

Senior IT Consultant

Senior security IT Consultant focused on Network Security Consulting including Designing and Implementation of network security architecture, Routing Protocols, Switching, BGP, MPLS, Multicast, QoS, IPsec VPNs, Cisco ASA etc. He has a vast experience of 14 years in Information Security, Process Control, Vulnerability Assessment & Penetration Testing, IT Audit and Presales Consulting. He has a strong experience in IT Data and security Management.

His specialties includes Network & Security design Implementation and Review for smaller to larger enterprise and Data Centers across multiple domains. He holds certifications include Cisco CCIE# 37340, ITIL, CEH, RHCE, CCNA, MCP and many more. He has been in the IT Industry for Over 15 years. In the past he has associated with companies like KPMG, HCL, Satyam etc. He is currently heading and managing Uninets operations in Delhi and Gurgaon locations.


Enquire Form

Fill out this simple form for detailed discussion on how can we help you better.

Book Your Seat








Interested in UniNets Training?
Fill out this simple form for detailed discussion on how can we help you better.

Please fill the form to start Download.

Enrollment Student