Note that this announcement from Cisco is sort of a “pre-announcement” in that the official CCIE Security 4.0 change hasn’t been announced but will be really soon. This means if you want to take the v3 Security lab you should book your date ASAP.
From Cisco.com: The Real Life of an Expert: Introducing the New CCIE Security CCIE Security 4.0 is unusual among security certificates for its up-to-date, real-world content. It emphasizes security competency and efficient problem solving in networks that use cloud services, carry voice and ** traffic, and are accessed by a variety of wireless devices.The content, currently in development, may include real-world applications that involve: Securing both wireless and wired networks, including managing security policy by device and service Extending application awareness to security devices, moving security up to Layer 7 from the stateless packets of Layers 3 and 4, and applying policy on a per-identity basis Applying security policy in a network that has voice and video traffic Securing networks that use managed services, dual ISPs, IPv6, or IP multicast Cisco will soon announce the blueprints for the CCIE Security 4.0 written and lab exams; the first exam will take place approximately six months later.- Lesson 1: Evaluating Cisco ASA Adaptive Security Appliance Technologies
- Firewalls and Security Domains
- Firewall Technologies
- Cisco ASA Adaptive Security Appliance Features
- Cisco ASA Adaptive Security Appliance Hardware
- Cisco ASA Appliance SSMs
- Cisco ASA Adaptive Security Appliance Licensing Options
- Cisco ASA Adaptive Security Appliance Licensing Requirements
- Lesson 1: Preparing the Cisco ASA Adaptive Security Appliance for Network Integration
- Managing the Cisco ASA Adaptive Security Appliance Boot Process
- Managing the Cisco ASA Adaptive Security Appliance Using the CLI
- Managing the Cisco ASA Adaptive Security Appliance Using Cisco ASDM
- Navigating Basic Cisco ASDM Features
- Managing the Cisco ASA Adaptive Security Appliance Basic Upgrade
- Managing Cisco ASA Adaptive Security Appliance Security Levels
- Configuring and Verifying Basic Connectivity Parameters
- Configuring and Verifying Interface VLANs
- Configuring a Default Route
- Configuring and Verifying the Cisco ASA Security Appliance DHCP Server
- Troubleshooting Basic Connectivity
- Configuring and Verifying Basic Device Management Settings
- File System Management Overview
- Managing Cisco ASA Software and Feature Activation
- Configuring and Verifying Time Settings
- Configuring and Verifying Event and Session Logging
- Configuring and Verifying Remote Management Channels
- Configuring and Verifying AAA for Management Access
- Troubleshooting AAA for Management Access
- Lesson 1: Configuring Cisco ASA Adaptive Security Appliance NAT Features
- NAT on Cisco ASA Software Version 8.2 and Earlier
- NAT on Cisco ASA Software Version 8.3 and Later
- Configuring Object (Auto) NAT
- Configuring Manual NAT
- Tuning and Troubleshooting NAT on the Cisco ASA Adaptive Security Appliance
- Connection Table and Local Host Table
- Configuring and Verifying Interface ACLs
- Configuring and Verifying Global ACLs
- Configuring and Verifying Object Groups
- Configuring and Verifying Public Servers
- Configuring and Verifying Other Basic Access Controls
- Troubleshooting ACLs
- Static Routing
- Dynamic Routing
- EIGRP Configuration and Verification
- Multicast Support
- Transparent Firewall Essentials
- Configuring and Verifying Transparent Firewall Mode
- Configuring and Verifying Transparent Firewall Layer 3 Through Layer 7 Access Controls
- Configuring and Verifying Transparent Firewall Layer 2 Access Controls
- Troubleshooting Transparent Firewall
- Lesson 1: Defining the Cisco ASA Adaptive Security Appliance MPF
- Cisco MPF Overview
- Configuring and Verifying Layer 3 and Layer 4 Policies
- Configuring and Verifying a Policy for Management Traffic
- Basic Stateful Inspection Tuning Features
- Tuning Basic OSI Layer 3 and Layer 4 Inspection
- Configuring and Verifying Advanced Connection Settings
- Configuring and Verifying Support for Dynamic Protocols
- Configuring the Botnet Traffic Filter
- Configuring QoS on the Cisco ASA Adaptive Security Appliance
- Troubleshooting OSI Layer 3 and Layer 4 Inspection
- Layer 5 to Layer 7 Policy Control Overview
- Configuring and Verifying HTTP Inspection
- Configuring and Verifying FTP Inspection
- Supporting Other Layer 5 to Layer 7 Applications
- Troubleshooting Application Layer Inspection
- AAA and Cut-Through Proxy Overview
- Configuring and Verifying Cut-Through Proxy Authentication
- Configuring Authentication Prompts and Timeouts
- Configuring and Verifying Cut-Through Proxy Authorization
- Configuring and Verifying Cut-Through Proxy Accounting
- Troubleshooting Cut-Through Proxy Operations
- Lesson 1: Configuring Cisco ASA Adaptive Security Appliance Interface Redundancy Features
- Configuring and Verifying EtherChannel
- Configuring and Verifying Redundant Interfaces
- Troubleshooting EtherChannel and Redundant Interfaces
- Configuration Choices, Basic Procedures, and Required Input Parameters
- Configuring and Verifying Active/Standby Failover
- Tuning and Managing Active/Standby Failover
- Remote Command Execution
- Troubleshooting Active/Standby Failover
- Multiple-Context Mode
- Configuring Security Contexts
- Verifying and Managing Security Contexts
- Configuring and Verifying Resource Management
- Troubleshooting Security Contexts
- Active/Active Failover
- Configuring and Verifying Active/Active Failover
- Tuning and Managing Active/Active Failover
- Troubleshooting Active/Active Failover
- Lab 2-1: Preparing the Cisco ASA Adaptive Security Appliance for Network Integration
- Lab 2-2: Configuring the Cisco ASA Adaptive Security Appliance for Secure Network Integration
- Lab 2-3: Configuring Management Features
- Lab 3-1: Configuring NAT
- Lab 3-2: Configuring Basic Cisco Access Control Features
- Lab 3-3: Configuring Transparent Firewall (Optional)
- Lab 4-1: Configuring MPF, Basic Stateful Inspections, and QoS
- Lab 4-2: Configuring MPF Advanced Application Inspections
- Lab 4-3: Configuring Cut-Through Proxy
- Lab 5-1: Configuring Active/Standby High Availability
- Lab 5-2: Configuring Active/Active High Availability