350-701 SCOR: Implementing and Operating Cisco Security Core Technologies

Short Description

Full Description

The Implementing and Operating Cisco Security Core Technologies (SCOR) course helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility, and enforcements. You will get extensive hands-on experience deploying Cisco Firepower® Next-Generation Firewall and Cisco Adaptive Security Appliance (ASA) Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch® Enterprise and Cisco Stealthwatch Cloud threat detection features.

  • Module 01: Describing Information Security Concepts

  • Module 02: Describing Common TCP/IP Attacks

  • Module 03: Describing Common Network Application Attacks

  • Module 04: Describing Common Endpoint Attacks

  • Module 05: Describing Network Security Technologies

  • Module 06: Deploying Cisco ASA Firewall

  • Module 07: Deploying Cisco Firepower Next-Generation Firewall

  • Module 08: Deploying Email Content Security

  • Module 09: Deploying Web Content Security

  • Module 10: Deploying Cisco Umbrella

  • Module 11: Explaining VPN Technologies and Cryptography

  • Module 12: Introducing Cisco Secure Site-to-Site VPN Solutions

  • Module 13: Deploying Cisco IOS VTI-Based Point-to-Point

  • Module 14: Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW

  • Module 15: Introducing Cisco Secure Remote Access VPN Solutions

  • Module 16: Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW

  • Module 17: Explaining Cisco Secure Network Access Solutions

  • Module 18: Describing 802.1X Authentication

  • Module 19: Configuring 802.1X Authentication

  • Module 20: Describing Endpoint Security Technologies

  • Module 21: Deploying Cisco AMP for Endpoints

  • Module 22: Introducing Network Infrastructure Protection

  • Module 23: Deploying Control Plane Security Controls

  • Module 24: Deploying Layer 2 Data Plane Security Controls

  • Module 25: Deploying Layer 3 Data Plane Security Controls

  • Module 26: Deploying Management Plane Security Controls

  • Module 27: Deploying Traffic Telemetry Methods

  • Module 28: Deploying Cisco Stealthwatch Enterprise t

  • Module 29: Describing Cloud and Common Cloud Attacks

  • Module 30: Securing the Cloud

  • Module 31: Deploying Cisco Stealthwatch Cloud

  • Module 32: Describing Software-Defined Networking (SDN)