Cisco Implementing and Operating Cisco Security Core Technologies v2.0 (SCOR)

Introduction:

The Implementing and Operating Cisco Security Core Technologies (SCOR) training helps you gain the skills and technologies needed to implement core Cisco security solutions. This training will ready you to provide advanced threat protection against cybersecurity attacks and prepare you for senior-level security roles.

This training prepares you for the 350-701 SCOR v1.0 exam. If passed, you earn the Cisco Certified Specialist – Security Core certification and satisfy the core exam requirement for the Cisco Certified Network Professional (CCNP) Security and Cisco Certified Internetwork Expert (CCIE) Security certifications. This training also earns you 64 Continuing Education (CE) credits towards recertification.

Objectives:

Describe information security concepts and strategies within the network
Describe security flaws in the transmission protocol/internet protocol (TCP/IP) and how they can be used to attack networks and hosts
Describe network application-based attacks
Describe how various network security technologies work together to guard against attacks
Implement access control on Cisco Secure Firewall Adaptive Security Appliance (ASA)
Deploy Cisco Secure Firewall Threat Defense basic configurations
Deploy Cisco Secure Firewall Threat Defense IPS, malware, and fire policies
Deploy Cisco Secure Email Gateway basic configurations
Deploy Cisco Secure Email Gateway policy configurations
Describe and implement basic web content security features and functions provided by Cisco Secure Web Appliance
Describe various attack techniques against the endpoints
Describe Cisco Umbrella® security capabilities, deployment models, policy management, and Investigate console
Provide basic understanding of endpoint security and be familiar with common endpoint security technologies
Describe Cisco Secure Endpoint architecture and basic features
Describe Cisco Secure Network Access solutions
Describe 802.1X and extensible authentication protocol (EAP) authentication
Configure devices for 802.1X operations
Introduce VPNs and describe cryptography solutions and algorithms
Describe Cisco secure site-to-site connectivity solutions
Deploy Cisco Internetwork Operating System (Cisco IOS®) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs
Configure point-to-point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
Describe Cisco secure remote access connectivity solutions
Deploy Cisco secure remote access connectivity solutions
Provide an overview of network infrastructure protection controls
Examine various defenses on Cisco devices that protect the control plane
Configure and verify Cisco IOS software layer 2 data plane controls
Configure and verify Cisco IOS software and Cisco ASA layer 3 data plane controls
Examine various defenses on Cisco devices that protect the management plane
Describe the baseline forms of telemetry recommended for network infrastructure and security devices
Describe deploying Cisco Secure Network Analytics
Describe basics of cloud computing and common cloud attacks
Describe how to secure cloud environment
Describe the deployment of Cisco Secure Cloud Analytics
Describe basics of software-defined networks and network programmability

Course Outline:

  • 1. Network Security Technologies
  • 2. Cisco Secure Firewall ASA Deployment
  • 3. Cisco Secure Firewall Threat Defense Basics
  • 4. Cisco Secure Firewall Threat Defense IPS, Malware, and File Policies
  • 5. Cisco Secure Email Gateway Basics
  • 6. Cisco Secure Email Policy Configuration
  • 7. Cisco Secure Web Appliance Deployment
  • 8. VPN Technologies and Cryptography Concepts
  • 9. Cisco Secure Site-to-Site VPN Solutions
  • 10. Cisco IOS VTI-Based Point-to-Point IPsec VPNs
  • 11. Point-to-Point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
  • 12. Cisco Secure Remote-Access VPN Solutions
  • 13. Remote-Access SSL VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
  • 14. Describing Information Security Concepts
  • 15. Describe Common TCP/IP Attacks
  • 16. Describe Common Network Application Attacks
  • 17. Common Endpoint Attacks
  • 18. Cisco Umbrella Deployment
  • 19. Endpoint Security Technologies
  • 20. Cisco Secure Endpoint
  • 21. Cisco Secure Network Access Solutions
  • 22. 802.1X Authentication
  • 23. 802.1X Authentication Configuration
  • 24. Network Infrastructure Protection
  • 25. Control Plane Security Solutions
  • 26. Layer 2 Data Plane Security Controls
  • 27. Layer 3 Data Plane Security Controls
  • 28. Management Plane Security Controls
  • 29. Traffic Telemetry Methods
  • 30. Cisco Secure Network Analytics Deployment
  • 31. Cloud Computing and Cloud Security
  • 32. Cloud Security
  • 33. Cisco Secure Cloud Analytics Deployment
  • 34. Software-Defined Networking

Enroll in this course

$5,784.51

Need Help Finding The Right Training Solution?

Our training advisors are here for you.

CAD Canadian dollar