ProductInfo 05-08-2020 0458
ProductInfo 05-08-2020 0458
ProductInfo 05-08-2020 0458
The Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 course helps you
prepare for the Cisco CCNP Security and CCIE Security certifications and for senior-level security
roles.
In this course, you will master the skills and technologies you need to implement core Cisco security
solutions to provide advanced threat protection against cybersecurity attacks. You will learn security
for networks, cloud and content, endpoint protection, secure network access, visibility, and
enforcements. You will get extensive hands-on experience deploying Cisco Firepower® Next-
Generation Firewall and Cisco Adaptive Security Appliance (Cisco ASA) Firewall; configuring access
control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice
on Cisco Stealthwatch® Enterprise and Cisco Stealthwatch Cloud threat detection features.
This course helps you prepare to take the Implementing and Operating Cisco Security Core
Technologies (350-701 SCOR) exam, which leads to the new CCNP Security, CCIE Security, and the
Cisco Certified Specialist - Security Core certifications.
Course Objectives:
Audience:
Security engineers
Network engineers, designers, administrators, and managers
Systems engineers
Consulting systems engineers
Technical solutions architects
Cisco integrators and partners
Prerequisite:
To fully benefit from this course, you should have the following knowledge and skills:
Skills and knowledge equivalent to those learned in Implementing and Administering Cisco
Solutions (CCNA®) v1.0 course
Familiarity with Ethernet and TCP/IP networking
Working knowledge of Microsoft Windows
Working knowledge of Cisco IOS networking and concepts
Familiarity with basics of networking security concepts
Course Outline:
Password Attacks
DNS-Based Attacks
DNS Tunneling
Web-Based Attacks
HTTP 302 Cushioning
Command Injections
SQL Injections
Cross-Site Scripting and Request Forgery
Email-Based Attacks
Buffer Overflow
Malware
Reconnaissance Attack
Gaining Access and Control
Gaining Access via Social Engineering
Gaining Access via Web-Based Attacks
Exploit Kits and Rootkits
Privilege Escalation
Post-Exploitation Phase
Angler Exploit Kit
Defense-in-Depth Strategy
Defending Across the Attack Continuum
Network Segmentation and Virtualization Overview
Stateful Firewall Overview
Security Intelligence Overview
Threat Information Standardization
Network-Based Malware Protection Overview
VPN Definition
VPN Types
Secure Communication and Cryptographic Services
Keys in Cryptography
Public Key Infrastructure
Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW
Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW
Infrastructure ACLs
Control Plane Policing
Control Plane Protection
Routing Protocol Security