SCOR

Class Overview

Cisco’s Implementing and Operating Cisco Security Core Technologies , or SCOR, training helps you prepare for the Cisco CCNP Security and CCIE Security certifications and for senior-level security roles.

In this training class, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility, and enforcements.

You will get extensive hands-on experience deploying Cisco Firepower Next-Generation Firewall and Cisco Adaptive Security Appliance (ASA) Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch Enterprise and Cisco Stealthwatch Cloud threat detection features.

This training class, including the self-paced material, prepares you for the Cisco exam: Implementing and Operating Cisco Security Core Technologies, which leads to the CCNP Security, CCIE Security, and the Cisco Certified Specialist - Security Core certifications.

Class Details

Objectives


After taking this training, the student should be able to:
- Describe information security concepts and strategies within the network.
- Describe common TCP/IP, network application, and endpoint attacks.
- Describe how various network security technologies work together to guard against attacks.
- Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall.
- Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance.
- Describe and implement web content security features and functions provided by Cisco Web Security Appliance.
- Describe Cisco Umbrella security capabilities, deployment models, policy management, and Investigate console.
- Introduce VPNs and describe cryptography solutions and algorithms.
- Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco Internetwork Operating System (Cisco IOS) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco Firepower Next-Generation Firewall (NGFW).
- Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and Extensible Authentication Protocol (EAP) authentication.
- Provide basic understanding of endpoint security and describe Advanced Malware Protection (AMP) for Endpoints architecture and basic features.
- Examine various defenses on Cisco devices that protect the control and management plane.
- Configure and verify Cisco IOS software Layer 2 and Layer 3 data plane controls.
- Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions.
- Describe basics of cloud computing and common cloud attacks and how to secure cloud environment.

Prerequisite Knowledge Advisory

Although there are no formal prerequisites, before taking this class you should have:
- Familiarity with Ethernet and TCP/IP networking.
- Working knowledge of the Windows operating system.
- Working knowledge of Cisco IOS networking and concepts.
- Familiarity with basics of networking security concepts.

Required Exam for SCOR Certification


Exam: 350-701 SCOR
Proctor: PearsonVUE
Recertification: 3 years

SCOR Training Class Outline


Describing Network Security Technologies
Deploying Cisco ASA Firewall
Deploying Cisco Firepower Next-Generation Firewall
Deploying Email Content Security
Deploying Web Content Security
Explaining VPN Technologies and Cryptography
Introducing Cisco Secure Site-to-Site VPN Solutions
Deploying Cisco IOS VTI-Based Point-to-Point IPsec VPNs
Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW
Introducing Cisco Secure Remote Access VPN Solutions
Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW
Explaining Cisco Secure Network Access Solutions
Describing 802.1X Authentication
Configuring 802.1X Authentication

The following section describes the associated self-study material that can be studied at your own pace, after taking the instructor-led portion of this course...
Describing Information Security Concepts
Describing Common TCP/IP Attacks
Describing Common Network Application Attacks
Describing Common Endpoint Attacks
Deploying Cisco Umbrella
Describing Endpoint Security Technologies
Deploying Cisco Advanced Malware Protection (AMP) for Endpoints
Introducing Network Infrastructure Protection
Deploying Control Plane Security Controls
Deploying Layer 2 Data Plane Security Controls
Deploying Layer 3 Data Plane Security Controls
Deploying Management Plane Security Controls
Deploying Traffic Telemetry Methods
Deploying Cisco Stealthwatch Enterprise
Describing Cloud and Common Cloud Attacks
Securing the Cloud
Deploying Cisco Stealthwatch Cloud
Describing Software-Defined Networking (SDN)

Share by: