Prove you can design and implement cloud security architecture, user and device security, network security, assurance, and more. Protect the infrastructures that clients rely on with the Cisco Certified Network Professional (CCNP) Security certification.
Prove your skills in all things security infrastructure, including network, cloud, and content security, endpoint protection and detection, secure network access, visibility, and enforcement.
Identify common threats and vulnerabilities. Understand key concepts like encryption, virtual private networks (VPNs), and techniques used to prevent attacks.
Compare security solutions, be able to set up and manage firewalls, implement preventative security measures, and configure secure remote access solutions.
Describe different clouds and services, and understand how to securely manage cloud applications.
Understand how to redirect and capture web traffic, verify user identities, compare security solutions, and set up email security features, such as spam filtering and encryption.
There are no formal prerequisites for this certificate.
Learners often also have three to five years of experience implementing security solutions.
Professional-level certifications expand on the foundations of associate-level certifications. They cover more advanced topics and allow candidates to hone in on a specific focus area of their choice. Many professional-level certification candidates are looking to prove they’re the best of the best in a specialized field.
To earn this certification, you'll need to pass two exams:
A variety of resources are available to help you study - from guided learning to self-study and a community forum.
The CCNP Security certification positions yourself for advancement in the fast-paced world of IT. Choose where you want to focus. Choose where you want to take your career.
Implement and test new security features, plan upgrades, troubleshoot and respond to security incidents.
Identify security vulnerabilities, and develop security systems and procedures to defend against all types of cybercrime.
Curtail security breaches by identifying the causes and sources of threats.