Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0

CCNP Security Certification

Gain hands-on experience for implementing core security technologies, and learn Cisco security solutions' best practices with the 5-day Implementing and Operating Cisco Security Core Technologies course. Our seasoned instructors help you master the skills for Cisco security solution implementations and provide advanced threat protection against cyberattacks. The in-depth training also enables you to achieve three professional, expert-level, and specialist Cisco credentials.

COURSE SCHEDULE ENQUIRE NOW

  2056 Ratings

               8990 Participants

Group Discount

Upto 15%

5-days instructor-led training

Official Cisco courseware  + Cisco certified trainers

Conceptual + Scenario-based training approach

24x7 access to learning resources

Implementing and Operating Cisco Security Core Technologies Course Overview


Vinsys' Cisco SCOR v1.0 training covers security for networks, cloud and content, endpoint protection, secure network access, visibility, and enforcements. In addition, you get extensive hands-on experience in deploying Cisco Firepower® Next-Generation Firewall, Adaptive Security Appliance (ASA) Firewall, configuring access control and mail policies, and 802.1X Authentication. 

The Cisco Security Core Technologies course prepares you for the 350-701 exam, needed for earning CCNP Security, CCIE Security, and Cisco Certified Specialist-Security Core certifications.

Course Curriculum


Audience

  • Individuals who wish to qualify for professional/expert-level security job opportunities
  • Cisco Integrators/Partners, Consulting Systems Engineers, Network Administrators, Network Designers/Engineers/Managers, Security Engineers, Systems Engineers, and Technical Solutions Architects
  • Those interested in completing CCNP Security, CCIE Security, and Cisco Certified Specialist-Security Core credentials
     

Eligibility Criteria

  • Familiarity with Ethernet/TCP/IP networking and foundational networking security concepts
  • Working knowledge of the Windows operating system, Cisco IOS networking, and concepts
  • Skills equivalent to the ones learned in Implementing and Administering Cisco Solutions (CCNA®) v1.0 course 

Course Objectives

  • Learning information security concepts and strategies within the network
  • Common TCP/IP, network application, and endpoint attacks
  • Working together of various network security technologies for guarding against attacks
  • Implementing access control on Cisco ASA appliance and Firepower Next-Generation Firewall
  • Describing/implementing basic email content security features and functions provided by Cisco Email Security Appliance
  • Web content security features and functions provided by Cisco Web Security Appliance
  • Describing Cisco Umbrella® security capabilities, deployment models, policy management, and Investigate console
  • VPN, cryptography solutions, and algorithms' introduction
  • Cisco secure site-to-site connectivity solutions
  • Deploying Cisco Internetwork Operating System (Cisco IOS®) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Firepower Next-Generation Firewall (NGFW)
  • Describing/deploying Cisco secure remote access connectivity solutions
  • Configuring 802.1X and Extensible Authentication Protocol (EAP) authentication
  • Providing a basic understanding of endpoint security
  • Describing Advanced Malware Protection (AMP) for Endpoints architecture and basic features
  • Examining defenses on Cisco devices that protect the control and management plane
  • Configuring/verifying Cisco IOS software Layer 2/Layer 3 data plane controls
  • Describing Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions
  • Basics of cloud computing and common cloud attacks
  • Securing cloud environment
     

About the Certification - 350-701 SCOR : Implementing and Operating Cisco Security Core Technologies

CCNP Security, a professional accreditation, validates your or your team members' skills with security solutions. The following core and concentration exams must be cleared:

  • 350-701 SCOR
  • One out of 300-710 SNCF, 300-715 SISE, 300-720 SESA, 300-725 SWSA, 300-730 SVPN and 300-735 SAUTO

CCIE Security, an expert-level credential, certifies your skills with complex security solutions. One must pass the following qualifying and hands-on lab exams: 

  • 350-701 SCOR
  • Cisco CCIE Security (v6.0)

Cisco Certified Specialist-Security Core, a specialist certification, approves your skills for implementing/operating core security technologies, including network, cloud and content security, endpoint protection/detection, secure network access, visibility, and enforcements. The following exam is necessary: 

  • 350-701 SCOR

Read More..

Get in touch

By providing your contact details, you agree to our Privacy policy

Training Options


ONLINE TRAINING

Instructor-Led Session


  • 5-days Instructor-led Online Training
  • Experienced Subject Matter Experts
  • Approved and Quality Ensured Training Material
  • 24*7 Leaner Assistance And Support

CORPORATE TRAINING

Customized to your team's need


  • Blended Learning Delivery Model (Self-Paced E-Learning And/Or Instructor-Led Options)
  • Course, Category, And All-Access Pricing
  • Enterprise-Class Learning Management System (LMS)
  • Enhanced Reporting For Individuals And Teams
  • 24x7 Teaching Assistance And Support 

Course Outline


  • Defense-in-depth Strategy
  • Defending Across the Attack Continuum
  • Network Segmentation and Virtualization Overview
  • Cisco ASA Deployment Types
  • Interface Security Levels
  • Objects/Object Groups
  • Cisco Firepower NGFW Deployments
  • Packet Processing and Policies
  • Objects
  • Cisco Email Content Security Overview
  • Simple Mail Transfer Protocol (SMTP)
  • Email Pipeline Overview
  • Cisco Web Security Appliance (WSA) Overview
  • Deployment Options
  • Network Users’ Authentication
  • VPN Definition/Types
  • Secure Communication and Cryptographic Services
  • Site-to-Site VPN Topologies
  • IPsec VPN Overview
  • IPsec Static Crypto Maps
  • Cisco IOS VTIs
  • Static VTI Point-to-point IPsec Internet Key Exchange (IKE) v2 VPN Configuration
  • Point-to-point VPNs on the Cisco ASA/Firepower NGFW
  • Cisco ASA Point-to-point VPN Configuration
  • Firepower NGFW Point-to-point VPN Configuration
  • Remote Access VPN Components/Technologies
  • Secure Sockets Layer (SSL) Overview
  • Remote Access Configuration Concepts
  • Connection Profiles
  • Group Policies
     
  • Cisco Secure Network Access
  • Secure Network Access Components
  • AAA Role in Cisco Secure Network Access Solution
  • 802.1X and Extensible Authentication Protocol (EAP)
  • EAP Methods
  • Role of Remote Authentication Dial-in User Service (RADIUS) in 802.1X Communications
     
  • Cisco Catalyst® Switch 802.1X Configuration
  • Wireless LAN Controller (WLC) 802.1X Configuration
  • Identity Services Engine (ISE) 802.1X Configuration
  • Configuring Network Settings and NAT on Cisco ASA
  • Configuring Cisco ASA Access Control Policies
  • Cisco Firepower NGFW NAT
  • Cisco Firepower NGFW Access Control Policy
  • Firepower NGFW Discovery/IPS Policy
  • NGFW Malware and File Policy
  • Configuring Listener, Host Access Table (HAT), and Recipient Access Table (RAT) on Cisco Email Security Appliance (ESA)
  • Configuring Mail Policies, Proxy Services, Authentication, and HTTPS Decryption
  • Enforcing the Acceptable Use Control and Malware Protection
  • Examining the Umbrella Dashboard and Umbrella Investigate
  • Exploring DNS Ransomware Protection by Cisco Umbrella
  • Configuring Static VTI Point-to-point IPsec IKEv2 Tunnel
  • Point-to-point VPN Between the Cisco ASA and Firepower NGFW
  • Configuring Remote Access VPN on the Cisco Firepower NGFW
  • Exploring Cisco AMP for Endpoints
  • Performing Endpoint Analysis through AMP for Endpoints Console
  • Exploring File Ransomware Protection by Cisco AMP for Endpoints Console
  • Cisco Stealthwatch Enterprise v6.9
  • Cognitive Threat Analytics (CTA) in Stealthwatch Enterprise v7.0
  • The Cisco Cloudlock Dashboard and User Security
  • Exploring Cisco Cloudlock Application and Data Security
  • Cisco Stealthwatch Cloud
  • Exploring Stealthwatch Cloud Alert Settings, Watchlists, and Sensors

Describe Information Security Concepts

  • Information Security Overview
  • Assets/Vulnerabilities/Countermeasures
  • Managing Risk

Common TCP/IP Attacks

  • Legacy TCP/IP Vulnerabilities
  • Internet Control Message Protocol (ICMP) Vulnerabilities

Common Network Application Attack

  • Password Attacks
  • Domain Name System (DNS)-based Attacks
  • DNS Tunneling

Describe Common Endpoint Attacks

  • Buffer Overflow
  • Malware
  • Reconnaissance Attack

Deploy Cisco Umbrella

  • Cisco Umbrella Architecture
  • Deploying Cisco Umbrella
  • Cisco Umbrella Roaming Client

Describe Endpoint Security Technologies

  • Host-based Personal Firewall, Anti-virus, and Intrusion Prevention System

Deploy Cisco Advanced Malware Protection (AMP) for Endpoints

  • Cisco AMP for Endpoints Architecture
  • AMP for Endpoints Engines
  • Retrospective Security with Cisco AMP

Introduction to Network Infrastructure Protection

  • Identifying Network Device Planes
  • Control Plane Security Controls
  • Management Plane Security Controls

Deploy Control Plane Security Controls

  • Infrastructure ACLs
  • Control Plane Policing
  • Control Plane Protection

2 Data PlaLayerne Security Controls

  • Overview of Layer 2 Data Plane Security Controls
  • Virtual LAN (VLAN)-based Attacks Mitigatio
  • Spanning Tree Protocol (STP) Attacks Mitigation

Layer 3 Data Plane Security Controls

  • Infrastructure Antispoofing ACLs
  • Unicast Reverse Path Forwarding
  • IP Source Guard

Deploy Management Plane Security Controls

  • Cisco Secure Management Access
  • Simple Network Management Protocol Version 3
  • Secure Access to Cisco Devices

Traffic Telemetry Methods

  • Network Time Protocol
  • Device/Network Events Logging and Export
  • Network Traffic Monitoring Using NetFlow

Cisco Stealthwatch Enterprise

  • Cisco Stealthwatch Offerings Overview
  • Stealthwatch Enterprise Required Components
  • Flow Stitching/Deduplication

Describe Cloud & Common Cloud Attacks

  • Evolution of Cloud Computing
  • Cloud Service Models
  • Security Responsibilities in Cloud

Secure the Cloud

  • Cisco Threat-Centric Approach to Network Security
  • Cloud Physical Environment Security
  • Application/Workload Security

Deploy Cisco Stealthwatch Cloud

  • Cisco Stealthwatch Cloud for Public Cloud Monitoring and Private Network Monitoring
  • Stealthwatch Cloud Operations

Describe Software-Defined Networking (SDN)

  • Software-Defined Networking Concepts
  • Network Programmability and Automation
  • Cisco Platforms/APIs

Course Reviews


FAQ's


Vinsys is a globally admired Corporate and Individual training provider with 25+ years of verifiable experience. Our instructor-led online courses, internationally-acclaimed expertise, customizable skill-development programs, and 24*7 learner support ensure the most comprehensive upskilling arrangement, a must for capitalizing on valuable Cisco security opportunities.

Yes, the equivalent of 3 days of self-paced material.

It will let you secure only the Cisco Certified Specialist-Security Core credential. However, you will be required to clear concentration and hands-on labs exams for completing the other two certifications.

Skills for implementing/operating core security technologies, from network, cloud and content security, endpoint protection/detection, secure network access, to visibility and enforcement.

Security Concepts and Network Security.

The 64 CE credits you receive after completing this training can be used for recertification, as barring the CCIE, exams for all other credentials are valid only for three years