Vendors

LinkButton

Overview

The Implementing and Operating Cisco Security Core Technologies (SCOR) training helps you gain the skills and technologies needed to implement core Cisco security solutions. This training will ready you to provide advanced threat protection against cybersecurity attacks and prepare you for senior-level security roles.

This training prepares you for the 350-701 SCOR v1.0 exam. If passed, you earn the Cisco Certified Specialist - Security Core certification and satisfy the core exam requirement for the Cisco Certified Network Professional (CCNP) Security and Cisco Certified Internetwork Expert (CCIE) Security certifications. This training also earns you 64 Continuing Education (CE) credits towards recertification.

img-course-overview.jpg
LinkButton

Course Curriculum

Course Outline

  • Network Security Technologies
  • Cisco Secure Firewall ASA Deployment
  • Cisco Secure Firewall Threat Defense Basics
  • Cisco Secure Firewall Threat Defense IPS, Malware, and File Policies
  • Cisco Secure Email Gateway Basics
  • Cisco Secure Email Policy Configuration
  • Cisco Secure Web Appliance Deployment
  • VPN Technologies and Cryptography Concepts
  • Cisco Secure Site-to-Site VPN Solutions
  • Cisco IOS VTI-Based Point-to-Point IPsec VPNs
  • Point-to-Point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
  • Cisco Secure Remote-Access VPN Solutions
  • Remote-Access SSL VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
  • Describing Information Security Concepts
  • Describe Common TCP/IP Attacks
  • Describe Common Network Application Attacks
  • Common Endpoint Attacks
  • Cisco Umbrella Deployment
  • Endpoint Security Technologies
  • Cisco Secure Endpoint
  • Cisco Secure Network Access Solutions
  • 1X Authentication
  • 1X Authentication Configuration
  • Network Infrastructure Protection
  • Control Plane Security Solutions
  • Layer 2 Data Plane Security Controls
  • Layer 3 Data Plane Security Controls
  • Management Plane Security Controls
  • Traffic Telemetry Methods
  • Cisco Secure Network Analytics Deployment
  • Cloud Computing and Cloud Security
  • Cloud Security
  • Cisco Secure Cloud Analytics Deployment
  • Software-Defined Networking

Lab Outline

  • Configure Network Settings and NAT on Cisco Secure Firewall ASA
  • Configure Cisco Secure Firewall ASA Access Control Policies
  • Configure Cisco Secure Firewall Threat Defense NAT
  • Configure Cisco Secure Firewall Threat Defense Access Control Policy
  • Configure Cisco Secure Firewall Threat Defense Discovery and IPS Policy
  • Configure Cisco Secure Firewall Threat Defense Malware and File Policy
  • Configure Listener, HAT, and RAT on Cisco Email Secure Email Gateway
  • Configure Cisco Secure Email Policies
  • Configure Proxy Services, Authentication, and HTTPS Decryption
  • Enforce Acceptable Use Control and Malware Protection
  • Configure Static VTI Point-to-Point IPsec IKEv2 Tunnel
  • Configure Point-to-Point VPN between Cisco Secure Firewall Threat Defense Devices
  • Configure Remote Access VPN on the Cisco Secure Firewall Threat Defense
  • Examine Cisco Umbrella Dashboard and DNS Security
  • Examine Cisco Umbrella Secure Web Gateway and Cloud-Delivered Firewall
  • Explore Cisco Umbrella CASB Functionalities
  • Explore Cisco Secure Endpoint
  • Perform Endpoint Analysis Using Cisco Secure Endpoint Console
  • Explore File Ransomware Protection by Cisco Secure Endpoint Console
  • Explore Secure Network Analytics v7.4.2
  • Explore Global Threat Alerts Integration and ETA Cryptographic Audit
  • Explore Cloud Analytics Dashboard and Operations
  • Explore Secure Cloud Private and Public Cloud Monitoring
LinkButton

What You'll Learn

What You'll Learn

  • Describe information security concepts and strategies within the network
  • Describe security flaws in the transmission protocol/internet protocol (TCP/IP) and how they can be used to attack networks and hosts
  • Describe network application-based attacks
  • Describe how various network security technologies work together to guard against attacks
  • Implement access control on Cisco Secure Firewall Adaptive Security Appliance (ASA)
  • Deploy Cisco Secure Firewall Threat Defense basic configurations
  • Deploy Cisco Secure Firewall Threat Defense IPS, malware, and fire policies
  • Deploy Cisco Secure Email Gateway basic configurations
  • Deploy Cisco Secure Email Gateway policy configurations
  • Describe and implement basic web content security features and functions provided by Cisco Secure Web Appliance
  • Describe various attack techniques against the endpoints
  • Describe Cisco Umbrella® security capabilities, deployment models, policy management, and Investigate console
  • Provide basic understanding of endpoint security and be familiar with common endpoint security technologies
  • Describe Cisco Secure Endpoint architecture and basic features
  • Describe Cisco Secure Network Access solutions
  • Describe 802.1X and extensible authentication protocol (EAP) authentication
  • Configure devices for 802.1X operations
  • Introduce VPNs and describe cryptography solutions and algorithms
  • Describe Cisco secure site-to-site connectivity solutions
  • Deploy Cisco Internetwork Operating System (Cisco IOS®) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs
  • Configure point-to-point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
  • Describe Cisco secure remote access connectivity solutions
  • Deploy Cisco secure remote access connectivity solutions
  • Provide an overview of network infrastructure protection controls
  • Examine various defenses on Cisco devices that protect the control plane
  • Configure and verify Cisco IOS software layer 2 data plane controls
  • Configure and verify Cisco IOS software and Cisco ASA layer 3 data plane controls
  • Examine various defenses on Cisco devices that protect the management plane
  • Describe the baseline forms of telemetry recommended for network infrastructure and security devices
  • Describe deploying Cisco Secure Network Analytics
  • Describe basics of cloud computing and common cloud attacks
  • Describe how to secure cloud environment
  • Describe the deployment of Cisco Secure Cloud Analytics
  • Describe basics of software-defined networks and network programmability
LinkButton

Who Should Attend

Who Should Attend

  • Security Engineers
  • Network Engineers
  • Network Designers
  • Network Administrators
  • Systems Engineers
  • Consulting Systems Engineers
  • Technical Solutions Architects
  • Cisco Integrators and Partners
  • Network Managers
  • Program Managers
  • Project Managers
img-who-should-learn.png
LinkButton

Prerequisites

Prerequisites

There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:

  • Familiarity with Ethernet and TCP/IP networking
  • Working knowledge of the Windows operating system
  • Working knowledge of Cisco IOS networking and concepts
  • Familiarity with basics of networking security concepts

These skills can be found in the following Cisco Learning Offering:

  • Implementing and Administering Cisco Solutions (CCNA®)
LinkButton

Training Schedule

LinkButton

Exam & Certification

This course helps prepare you to take the exam, Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) , which leads to the new CCNP Security, CCIE Security, and the Cisco Certified Specialist - Security Core certifications.
LinkButton

Learning Journey

Learning Journey

LinkButton

Frequently Asked Questions

Frequently Asked Questions (FAQs)

  • Why get Cisco certified?

    Cisco certifications validate your expertise in networking and cybersecurity, making you a sought-after professional in the IT industry.

    These globally recognized credentials demonstrate your ability to design, implement, and manage complex networks, enhancing your career prospects and earning potential.

    Cisco-certified professionals are highly valued by employers worldwide for their knowledge and skills in managing critical infrastructure and ensuring secure communications.

  • What to expect for the examination?

    Cisco offers a wide range of certification exams, catering to various levels of expertise and specializations.

    The exams typically consist of multiple-choice questions, simulations, and sometimes lab exercises. Exam formats and content vary depending on the specific certification level and track you choose.

    Note: Certification requirements and policies may be updated by Cisco from time to time. We apologize for any discrepancies; do get in touch with us if you have any questions.

  • How long is Cisco certification valid for?

    Most Cisco certifications are active for three years from the date you earn the certification.

    You can recertify at any time during the active period by re-taking the exam for your existing certification, advancing to the next level of certifications, earning Continuing Education credits, or a combination of both.

    Note: Certification requirements and policies may be updated by Cisco from time to time. We apologize for any discrepancies; do get in touch with us if you have any questions.

  • Why take this course with Trainocate?

    Here’s what sets us apart:

    - Global Reach, Localized Accessibility: Benefit from our geographically diverse training hubs in 24 countries (and counting!).

    - Top-Rated Instructors: Our team of subject matter experts (with high average CSAT and MTM scores) are passionate to help you accelerate your digital transformation.

    - Customized Training Solutions: Choose from on-site, virtual classrooms, or self-paced learning to fit your organization and individual needs.

    - Experiential Learning: Dive into interactive training with our curated lesson plans. Participate in hands-on labs, solve real-world challenges, and take on comprehensive assessments.

    - Learn From The Best: With 30+ authorized training partnerships and countless awards from Microsoft, AWS, Google – you're guaranteed learning from the industry's elite.

    - Your Bridge To Success: We provide up-to-date course materials, helpful exam guides, and dedicated support to validate your expertise and elevate your career.

The Implementing and Operating Cisco Security Core Technologies (SCOR) training helps you gain the skills and technologies needed to implement core Cisco security solutions. This training will ready you to provide advanced threat protection against cybersecurity attacks and prepare you for senior-level security roles.

This training prepares you for the 350-701 SCOR v1.0 exam. If passed, you earn the Cisco Certified Specialist - Security Core certification and satisfy the core exam requirement for the Cisco Certified Network Professional (CCNP) Security and Cisco Certified Internetwork Expert (CCIE) Security certifications. This training also earns you 64 Continuing Education (CE) credits towards recertification.

img-course-overview.jpg

What You'll Learn

  • Describe information security concepts and strategies within the network
  • Describe security flaws in the transmission protocol/internet protocol (TCP/IP) and how they can be used to attack networks and hosts
  • Describe network application-based attacks
  • Describe how various network security technologies work together to guard against attacks
  • Implement access control on Cisco Secure Firewall Adaptive Security Appliance (ASA)
  • Deploy Cisco Secure Firewall Threat Defense basic configurations
  • Deploy Cisco Secure Firewall Threat Defense IPS, malware, and fire policies
  • Deploy Cisco Secure Email Gateway basic configurations
  • Deploy Cisco Secure Email Gateway policy configurations
  • Describe and implement basic web content security features and functions provided by Cisco Secure Web Appliance
  • Describe various attack techniques against the endpoints
  • Describe Cisco Umbrella® security capabilities, deployment models, policy management, and Investigate console
  • Provide basic understanding of endpoint security and be familiar with common endpoint security technologies
  • Describe Cisco Secure Endpoint architecture and basic features
  • Describe Cisco Secure Network Access solutions
  • Describe 802.1X and extensible authentication protocol (EAP) authentication
  • Configure devices for 802.1X operations
  • Introduce VPNs and describe cryptography solutions and algorithms
  • Describe Cisco secure site-to-site connectivity solutions
  • Deploy Cisco Internetwork Operating System (Cisco IOS®) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs
  • Configure point-to-point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
  • Describe Cisco secure remote access connectivity solutions
  • Deploy Cisco secure remote access connectivity solutions
  • Provide an overview of network infrastructure protection controls
  • Examine various defenses on Cisco devices that protect the control plane
  • Configure and verify Cisco IOS software layer 2 data plane controls
  • Configure and verify Cisco IOS software and Cisco ASA layer 3 data plane controls
  • Examine various defenses on Cisco devices that protect the management plane
  • Describe the baseline forms of telemetry recommended for network infrastructure and security devices
  • Describe deploying Cisco Secure Network Analytics
  • Describe basics of cloud computing and common cloud attacks
  • Describe how to secure cloud environment
  • Describe the deployment of Cisco Secure Cloud Analytics
  • Describe basics of software-defined networks and network programmability

Who Should Attend

  • Security Engineers
  • Network Engineers
  • Network Designers
  • Network Administrators
  • Systems Engineers
  • Consulting Systems Engineers
  • Technical Solutions Architects
  • Cisco Integrators and Partners
  • Network Managers
  • Program Managers
  • Project Managers
img-who-should-learn.png

Prerequisites

There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:

  • Familiarity with Ethernet and TCP/IP networking
  • Working knowledge of the Windows operating system
  • Working knowledge of Cisco IOS networking and concepts
  • Familiarity with basics of networking security concepts

These skills can be found in the following Cisco Learning Offering:

  • Implementing and Administering Cisco Solutions (CCNA®)

Learning Journey

Coming Soon...

Course Outline

  • Network Security Technologies
  • Cisco Secure Firewall ASA Deployment
  • Cisco Secure Firewall Threat Defense Basics
  • Cisco Secure Firewall Threat Defense IPS, Malware, and File Policies
  • Cisco Secure Email Gateway Basics
  • Cisco Secure Email Policy Configuration
  • Cisco Secure Web Appliance Deployment
  • VPN Technologies and Cryptography Concepts
  • Cisco Secure Site-to-Site VPN Solutions
  • Cisco IOS VTI-Based Point-to-Point IPsec VPNs
  • Point-to-Point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
  • Cisco Secure Remote-Access VPN Solutions
  • Remote-Access SSL VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
  • Describing Information Security Concepts
  • Describe Common TCP/IP Attacks
  • Describe Common Network Application Attacks
  • Common Endpoint Attacks
  • Cisco Umbrella Deployment
  • Endpoint Security Technologies
  • Cisco Secure Endpoint
  • Cisco Secure Network Access Solutions
  • 1X Authentication
  • 1X Authentication Configuration
  • Network Infrastructure Protection
  • Control Plane Security Solutions
  • Layer 2 Data Plane Security Controls
  • Layer 3 Data Plane Security Controls
  • Management Plane Security Controls
  • Traffic Telemetry Methods
  • Cisco Secure Network Analytics Deployment
  • Cloud Computing and Cloud Security
  • Cloud Security
  • Cisco Secure Cloud Analytics Deployment
  • Software-Defined Networking

Lab Outline

  • Configure Network Settings and NAT on Cisco Secure Firewall ASA
  • Configure Cisco Secure Firewall ASA Access Control Policies
  • Configure Cisco Secure Firewall Threat Defense NAT
  • Configure Cisco Secure Firewall Threat Defense Access Control Policy
  • Configure Cisco Secure Firewall Threat Defense Discovery and IPS Policy
  • Configure Cisco Secure Firewall Threat Defense Malware and File Policy
  • Configure Listener, HAT, and RAT on Cisco Email Secure Email Gateway
  • Configure Cisco Secure Email Policies
  • Configure Proxy Services, Authentication, and HTTPS Decryption
  • Enforce Acceptable Use Control and Malware Protection
  • Configure Static VTI Point-to-Point IPsec IKEv2 Tunnel
  • Configure Point-to-Point VPN between Cisco Secure Firewall Threat Defense Devices
  • Configure Remote Access VPN on the Cisco Secure Firewall Threat Defense
  • Examine Cisco Umbrella Dashboard and DNS Security
  • Examine Cisco Umbrella Secure Web Gateway and Cloud-Delivered Firewall
  • Explore Cisco Umbrella CASB Functionalities
  • Explore Cisco Secure Endpoint
  • Perform Endpoint Analysis Using Cisco Secure Endpoint Console
  • Explore File Ransomware Protection by Cisco Secure Endpoint Console
  • Explore Secure Network Analytics v7.4.2
  • Explore Global Threat Alerts Integration and ETA Cryptographic Audit
  • Explore Cloud Analytics Dashboard and Operations
  • Explore Secure Cloud Private and Public Cloud Monitoring
This course helps prepare you to take the exam, Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) , which leads to the new CCNP Security, CCIE Security, and the Cisco Certified Specialist - Security Core certifications.

Frequently Asked Questions (FAQs)

  • Why get Cisco certified?

    Cisco certifications validate your expertise in networking and cybersecurity, making you a sought-after professional in the IT industry.

    These globally recognized credentials demonstrate your ability to design, implement, and manage complex networks, enhancing your career prospects and earning potential.

    Cisco-certified professionals are highly valued by employers worldwide for their knowledge and skills in managing critical infrastructure and ensuring secure communications.

  • What to expect for the examination?

    Cisco offers a wide range of certification exams, catering to various levels of expertise and specializations.

    The exams typically consist of multiple-choice questions, simulations, and sometimes lab exercises. Exam formats and content vary depending on the specific certification level and track you choose.

    Note: Certification requirements and policies may be updated by Cisco from time to time. We apologize for any discrepancies; do get in touch with us if you have any questions.

  • How long is Cisco certification valid for?

    Most Cisco certifications are active for three years from the date you earn the certification.

    You can recertify at any time during the active period by re-taking the exam for your existing certification, advancing to the next level of certifications, earning Continuing Education credits, or a combination of both.

    Note: Certification requirements and policies may be updated by Cisco from time to time. We apologize for any discrepancies; do get in touch with us if you have any questions.

  • Why take this course with Trainocate?

    Here’s what sets us apart:

    - Global Reach, Localized Accessibility: Benefit from our geographically diverse training hubs in 24 countries (and counting!).

    - Top-Rated Instructors: Our team of subject matter experts (with high average CSAT and MTM scores) are passionate to help you accelerate your digital transformation.

    - Customized Training Solutions: Choose from on-site, virtual classrooms, or self-paced learning to fit your organization and individual needs.

    - Experiential Learning: Dive into interactive training with our curated lesson plans. Participate in hands-on labs, solve real-world challenges, and take on comprehensive assessments.

    - Learn From The Best: With 30+ authorized training partnerships and countless awards from Microsoft, AWS, Google – you're guaranteed learning from the industry's elite.

    - Your Bridge To Success: We provide up-to-date course materials, helpful exam guides, and dedicated support to validate your expertise and elevate your career.

Keep Exploring

Course Curriculum

Course Curriculum

Training Schedule

Training Schedule

Exam & Certification

Exam & Certification

FAQs

Frequently Asked Questions

img-improve-career.jpg

Improve yourself and your career by taking this course.

img-get-info.jpg

Ready to Take Your Business from Great to Awesome?

Level-up by partnering with Trainocate. Get in touch today.

Name
Email
Phone
I'm inquiring for
Inquiry Details

By submitting this form, you consent to Trainocate processing your data to respond to your inquiry and provide you with relevant information about our training programs, including occasional emails with the latest news, exclusive events, and special offers.

You can unsubscribe from our marketing emails at any time. Our data handling practices are in accordance with our Privacy Policy.