CSI Exam Blueprint
The CSI exam focuses on the SAFE blueprints published by Cisco Systems, Inc. These blueprints cover designing and securing a wide range of networks, from small and medium networks to Enterprise networks. In addition, the blueprints cover certain technologies, such as IP telephony and wireless LANs (WLANs), in depth.The CSI course provides the knowledge and skills needed to implement and use the principles and axioms presented in the whitepaper. The primary focus of the course is the labs, which allow students to build complete end-to-end security solutions using the SAFE whitepapers as the blueprints. The following devices are covered in the course, along with their configuration and functionality regarding the SAFE whitepapers:
- Cisco IOS routers
- PIX firewalls
- VPN concentrators
- Cisco network IDS sensors
- Cisco host-based IPS
- Cisco VPN client (software and hardware)
- Cisco IP telephony devices
- Cisco WLAN access points (APs)
The CSI exam covers a variety of topics related to the course and the SAFE whitepapers. These topics are provided in Table I-3, along with the applicable chapter in which information can be found in this guide. Note that Cisco Systems reserves the right to change exam objectives without notice. Prior to taking the exams, view the current exam objectives by visiting Cisco.com, clicking Learning & Events, and navigating to the CCSP certification page.
Topic Number | Objective | Chapter Covering the Objective |
---|---|---|
Security Fundamentals | ||
1 | Need for network security | 5 |
2 | Network attack taxonomy | 7,8 |
3 | Network security policy | 5 |
4 | Management protocols and functions | 11 |
Architectural Overview | ||
5 | Design fundamentals | 2 |
6 | SAFE axioms | 3 |
7 | Security wheel | 5 |
Cisco Security Portfolio | ||
8 | Secure connectivityVPNs | 13 |
9 | Secure connectivity3000 concentrator | 13 |
10 | Secure connectivityCisco IOS VPN routers | 13 |
11 | Perimeter security firewalls | 13 |
12 | Intrusion protection | 12 |
13 | Host intrusion prevention systemCisco Security Agent | 12 |
14 | Identity | 13 |
15 | Security Management | 13 |
16 | AVVID | 13 |
SAFE Small Network Design | ||
17 | Small network Corporate Internet module | 14 |
18 | Small network Campus module | 14 |
19 | Implementation ISP router | 15 |
20 | ImplementationCisco IOS firewall features and configuration | 15 |
21 | ImplementationPIX firewall | 15 |
SAFE Medium Network Design | ||
22 | Medium-size network Corporate Internet module | 16 |
23 | Medium-size network Corporate Internet module design guidelines | 16 |
24 | Medium-size network Campus module | 16 |
25 | Medium-size network Campus module design guidelines | 16 |
26 | Medium-size network WAN module | 16 |
27 | ImplementationISP router | 17 |
28 | Implementationedge router | 17 |
29 | ImplementationCisco IOS firewall | 17 |
30 | ImplementationPIX firewall | 17 |
31 | ImplementationNIDS | 17 |
32 | ImplementationHIDS | 17 |
33 | ImplementationVPN concentrator | 17 |
34 | ImplementationLayer 3 switch | 17 |
SAFE Enterprise Network Design | ||
35 | Enterprise network Edge module | 18 |
36 | Enterprise network Edge module design guidelines | 18 |
37 | Enterprise network Campus module | 18 |
38 | Enterprise network Campus Module design guidelines | 18 |
39 | Review Questions | 18 |
SAFE Remote User Network Implementation | ||
40 | Key devices | 18 |
41 | Threat mitigation | 18 |
42 | Software access option | 18 |
43 | Remote site firewall option | 18 |
44 | Hardware VPN option | 18 |
45 | Remote site router option | 18 |
SAFE IP Telephony Design | ||
46 | Basic IP telephony concepts | 19 |
47 | Cisco IP telephony product line | 19 |
48 | IP telephony design approach | 19 |
49 | Small network IP telephony | 19 |
50 | Medium-size network IP telephony | 19 |
51 | Enterprise network IP telephony | 19 |
SAFE Wireless LAN Design | ||
52 | Basic wireless LAN concepts | 20 |
53 | Cisco wireless LAN product line | 20 |
54 | Wireless LAN design approach | 20 |
55 | Small wireless LAN design | 20 |
56 | Medium-size wireless LAN design | 20 |
57 | Enterprise wireless LAN design | 20 |
58 | Remote wireless LAN design | 20 |