Course Description

The Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 course helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility, and enforcements. You will get extensive hands-on experience deploying Cisco Firepower® Next-Generation Firewall and Cisco Adaptive Security Appliance (ASA) Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch® Enterprise and Cisco Stealthwatch Cloud threat detection features. This course, including the self-paced material, helps prepare you to take the exam, Implementing and Operating Cisco Security Core Technologies (350-701 SCOR), which leads to the new CCNP Security, CCIE Security, and the Cisco Certified Specialist - Security Core certifications.

Course Outline

  • Information Security Concepts
  • Common TCP/IP Attacks 
  • Common Network Application Attacks 
  • Common Endpoint Attacks 
  • Network Security Technologies
  • Deploying Cisco ASA Firewall
  • Deploying Email Content Security
  • Deploying Web Content Security
  • Deploying Cisco Umbrella
  • Explaining VPN Technologies and Cryptography
  • Introducing Cisco Secure Site-to-Site VPN Solutions
  • Deploying Cisco IOS VTI-Based Point-to-Point IPsec VPNs
  • Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW
  • Introducing Cisco Secure Remote Access VPN Solutions o Remote Access VPN Components
  • Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW
  • Explaining Cisco Secure Network Access Solutions o Cisco Secure Network Access
  • 802.1X Authentication  
  • Configuring 802.1X Authentication
  • Describing Endpoint Security Technologies 
  • Deploying Cisco Advanced Malware Protection (AMP) for Endpoints 
  • Introducing Network Infrastructure Protection
  • Deploying Control Plane Security Controls 
  • Deploying Layer 2 Data Plane Security Controls 
  • Deploying Layer 3 Data Plane Security Controls 
  • Deploying Management Plane Security Controls
  • Deploying Traffic Telemetry Methods 
  • Cisco Stealthwatch Enterprise 
  • Cloud and Common Cloud Attacks 
  • Securing the Cloud 
  • Cisco Stealthwatch Cloud 
  • Software-Defined Networking (SDN*)

Learner Outcomes

At the end of this course, the learner will be able to:

  • Describe information security concepts and strategies within the network

  • Describe common TCP/IP, network application, and endpoint attacks

  • Describe how various network security technologies work together to guard against attacks

  • Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall

  • Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance

  • Describe and implement web content security features and functions provided by Cisco Web Security Appliance

  • Describe Cisco Umbrella® security capabilities, deployment models, policy management, and Investigate console

  • Introduce VPNs and describe cryptography solutions and algorithms

  • Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco Internetwork Operating System (Cisco IOS®) Virtual Tunnel Interface (VTI)-based point-topoint IPsec VPNs, and point- to-point IPsec VPN on the Cisco ASA and Cisco Firepower NextGeneration Firewall (NGFW)

  • Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and Extensible Authentication Protocol (EAP) authentication

  • Provide basic understanding of endpoint security and describe Advanced Malware Protection (AMP) for Endpoints architecture and basic features

  • Examine various defenses on Cisco devices that protect the control and management plane

  • Configure and verify Cisco IOS software Layer 2 and Layer 3 data plane controls

  • Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions

  • Describe basics of cloud computing and common cloud attacks and how to secure cloud environment

Thank you for your interest in this course. Unfortunately, the course you have selected is currently not open for enrollment. Please complete a Course Inquiry so that we may promptly notify you when enrollment opens.
Required fields are indicated by .