Cisco Implementing and Operating Cisco Security Core Technologies v2.0 (SCOR)
- 5 Days Course
- Language: English
Introduction:
The Implementing and Operating Cisco Security Core Technologies (SCOR) training helps you gain the skills and technologies needed to implement core Cisco security solutions. This training will ready you to provide advanced threat protection against cybersecurity attacks and prepare you for senior-level security roles.
This training prepares you for the 350-701 SCOR v1.0 exam. If passed, you earn the Cisco Certified Specialist – Security Core certification and satisfy the core exam requirement for the Cisco Certified Network Professional (CCNP) Security and Cisco Certified Internetwork Expert (CCIE) Security certifications. This training also earns you 64 Continuing Education (CE) credits towards recertification.
Objectives:
Describe information security concepts and strategies within the network
 Describe security flaws in the transmission protocol/internet protocol (TCP/IP) and how they can be used to attack networks and hosts
 Describe network application-based attacks
 Describe how various network security technologies work together to guard against attacks
 Implement access control on Cisco Secure Firewall Adaptive Security Appliance (ASA)
 Deploy Cisco Secure Firewall Threat Defense basic configurations
 Deploy Cisco Secure Firewall Threat Defense IPS, malware, and fire policies
 Deploy Cisco Secure Email Gateway basic configurations
 Deploy Cisco Secure Email Gateway policy configurations
 Describe and implement basic web content security features and functions provided by Cisco Secure Web Appliance
 Describe various attack techniques against the endpoints
 Describe Cisco Umbrella® security capabilities, deployment models, policy management, and Investigate console
 Provide basic understanding of endpoint security and be familiar with common endpoint security technologies
 Describe Cisco Secure Endpoint architecture and basic features
 Describe Cisco Secure Network Access solutions
 Describe 802.1X and extensible authentication protocol (EAP) authentication
 Configure devices for 802.1X operations
 Introduce VPNs and describe cryptography solutions and algorithms
 Describe Cisco secure site-to-site connectivity solutions
 Deploy Cisco Internetwork Operating System (Cisco IOS®) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs
 Configure point-to-point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
 Describe Cisco secure remote access connectivity solutions
 Deploy Cisco secure remote access connectivity solutions
 Provide an overview of network infrastructure protection controls
 Examine various defenses on Cisco devices that protect the control plane
 Configure and verify Cisco IOS software layer 2 data plane controls
 Configure and verify Cisco IOS software and Cisco ASA layer 3 data plane controls
 Examine various defenses on Cisco devices that protect the management plane
 Describe the baseline forms of telemetry recommended for network infrastructure and security devices
 Describe deploying Cisco Secure Network Analytics
 Describe basics of cloud computing and common cloud attacks
 Describe how to secure cloud environment
 Describe the deployment of Cisco Secure Cloud Analytics
 Describe basics of software-defined networks and network programmability
Course Outline:
- 1. Network Security Technologies
- 2. Cisco Secure Firewall ASA Deployment
- 3. Cisco Secure Firewall Threat Defense Basics
- 4. Cisco Secure Firewall Threat Defense IPS, Malware, and File Policies
- 5. Cisco Secure Email Gateway Basics
- 6. Cisco Secure Email Policy Configuration
- 7. Cisco Secure Web Appliance Deployment
- 8. VPN Technologies and Cryptography Concepts
- 9. Cisco Secure Site-to-Site VPN Solutions
- 10. Cisco IOS VTI-Based Point-to-Point IPsec VPNs
- 11. Point-to-Point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
- 12. Cisco Secure Remote-Access VPN Solutions
- 13. Remote-Access SSL VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
- 14. Describing Information Security Concepts
- 15. Describe Common TCP/IP Attacks
- 16. Describe Common Network Application Attacks
- 17. Common Endpoint Attacks
- 18. Cisco Umbrella Deployment
- 19. Endpoint Security Technologies
- 20. Cisco Secure Endpoint
- 21. Cisco Secure Network Access Solutions
- 22. 802.1X Authentication
- 23. 802.1X Authentication Configuration
- 24. Network Infrastructure Protection
- 25. Control Plane Security Solutions
- 26. Layer 2 Data Plane Security Controls
- 27. Layer 3 Data Plane Security Controls
- 28. Management Plane Security Controls
- 29. Traffic Telemetry Methods
- 30. Cisco Secure Network Analytics Deployment
- 31. Cloud Computing and Cloud Security
- 32. Cloud Security
- 33. Cisco Secure Cloud Analytics Deployment
- 34. Software-Defined Networking
Enroll in this course
$4,295.00
