SCOR | Implementing and Operating Cisco Security Core Technologies

What you’ll learn in this course:

The Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 course helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility, and enforcements. You will get extensive hands-on experience deploying Cisco Firepower® Next-Generation Firewall and Cisco Adaptive Security Appliance (ASA) Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch® Enterprise and Cisco Stealthwatch Cloud threat detection features. This course, including the self-paced material, helps prepare you to take the exam, Implementing and Operating Cisco Security Core Technologies (350-701 SCOR), which leads to the new CCNP Security, CCIE Security, and the Cisco Certified Specialist - Security Core certifications.


How you’ll benefit:

This course will help you:

● Gain hands-on experience implementing core security technologies and learn best practices using Cisco security solutions

● Prepare for the Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) exam

● Qualify for professional and expert-level security job roles


What to expect in the exam:

This course will help you prepare to take the Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) exam. This exam tests a candidate's knowledge of implementing and operating core security technologies. After you pass 350-701 SCOR:

● You earn the Cisco Certified Specialist - Security Core certification

● You satisfy the core requirement for CCNP Security and CCIE Security. To complete your CCNP Security certification, pass one of the security concentration exams. To complete your CCIE Security certification, pass the CCIE Security v6.0 Lab Exam


Who should enroll:

● Security engineer

● Network engineer

● Network designer

● Network administrator

● Systems engineer

● Consulting systems engineer

● Technical solutions architect

● Network manager

● Cisco integrators and partners


Course details


After taking this course, you should be able to:

● Describe information security concepts and strategies within the network

● Describe common TCP/IP, network application, and endpoint attacks

● Describe how various network security technologies work together to guard against attacks ● Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall

● Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance

● Describe and implement web content security features and functions provided by Cisco Web Security Appliance

● Describe Cisco Umbrella® security capabilities, deployment models, policy management, and Investigate console

● Introduce VPNs and describe cryptography solutions and algorithms...



● To fully benefit from this course, you should have the following knowledge and skills:

● Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA®) v1.0 course

● Familiarity with Ethernet and TCP/IP networking

● Working knowledge of the Windows operating system

● Working knowledge of Cisco IOS networking and concepts

● Familiarity with basics of networking security concepts These Cisco courses are recommended to help you meet these prerequisites:

● Implementing and Administering Cisco Solutions (CCNA) v1.0



● Describing Information Security Concepts*

◦ Information Security Overview

◦ Assets, Vulnerabilities, and Countermeasures

◦ Managing Risk

◦ Vulnerability Assessment

◦ Understanding Common Vulnerability Scoring System (CVSS)

● Describing Common TCP/IP Attacks*

◦ Legacy TCP/IP Vulnerabilities

◦ IP Vulnerabilities

◦ Internet Control Message Protocol (ICMP) Vulnerabilities

◦ TCP Vulnerabilities

◦ User Datagram Protocol (UDP) Vulnerabilities

◦ Attack Surface and Attack Vectors

◦ Reconnaissance Attacks

◦ Access Attacks

◦ Man-in-the-Middle Attacks

◦ Denial of Service and Distributed Denial of Service Attacks

◦ Reflection and Amplification Attacks

◦ Spoofing Attacks

◦ Dynamic Host Configuration Protocol (DHCP) Attacks

● Describing Common Network Application Attacks*

◦ Password Attacks

◦ Domain Name System (DNS)-Based Attacks

◦ DNS Tunneling

◦ Web-Based Attacks

◦ HTTP 302 Cushioning

◦ Command Injections

◦ SQL Injections

◦ Cross-Site Scripting and Request Forgery

◦ Email-Based Attacks

● Describing Common Endpoint Attacks*

◦ Buffer Overflow

◦ Malware

◦ Reconnaissance Attack

◦ Gaining Access and Control

◦ Gaining Access via Social Engineering

◦ Gaining Access via Web-Based Attacks

◦ Exploit Kits and Rootkits

◦ Privilege Escalation

◦ Post-Exploitation Phase

◦ Angler Exploit Kit.....


    SCOR | Implementing and Operating Cisco Security Core Technologies

    Suscríbase a nuestro newsletter

    Copyright 2020 Netec. Todos los derechos reservados.