Cisco CCNP SCORE

Cisco CCNP SCORE

The Implementing and Operating Cisco Security Core Technologies (SCOR) Exam Prep course helps you prepare for the Cisco CCNP Security, CCIE Security certifications and for senior-level security roles.

In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cyber-security attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility, and enforcement. You will get extensive hands-on experience deploying Cisco Firepower® Next-Generation Firewall and Cisco Adaptive Security Appliance (Cisco ASA) Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch® Enterprise and Cisco Stealthwatch Cloud threat detection features.

Course Objectives

After completing this course, students will be able to :

  • Describe information security concepts and strategies within the network
  • Describe common TCP/IP, network application, and endpoint attacks
  • Describe how various network security technologies work together to guard against attacks
  • Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall
  • Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance
  • Describe and implement web content security features and functions provided by Cisco Web Security Appliance
  • Describe Cisco Umbrella® security capabilities, deployment models, policy management, and Investigate console
  • Introduce VPNs and describe cryptography solutions and algorithms
  • Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco IOS Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco Firepower Next-Generation Firewall (NGFW)
  • Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and Extensible Authentication Protocol (EAP) authentication
  • Provide basic understanding of endpoint security and describe Advanced Malware Protection (AMP) for Endpoints architecture and basic features
  • Examine various defenses on Cisco devices that protect the control and management plane
  • Configure and verify Cisco IOS Software Layer 2 and Layer 3 data plane controls
  • Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions
  • Describe basics of cloud computing and common cloud attacks and how to secure cloud environment

Target Audience

  • Security engineer
  • Network engineer
  • Network designer
  • Network administrator
  • Systems engineer
  • Consulting systems engineer
  • Technical solutions architect
  • Network manager
  • Cisco integrators and partners

Course Pre-requisite

  • Familiarity with Ethernet and TCP/IP networking
  • Working knowledge of the Windows operating system
  • Working knowledge of Cisco IOS networking and concepts
  • Familiarity with the basics of networking security concepts

Course Duration

Introduction

1
Describing information Security Concepts
2
Describing Common TCP/IP Attacks
3
Describing Common Network Application Attacks
4
Describing Common Endpoint Attacks
5
Describing Network Security Technologies

Cisco ASA Firewall

1
Deploying Cisco ASA Firewall
2
Cisco ASA interface Security levels
3
Cisco ASA Objects and object groups
4
Network Address translation
5
Configure network settings and NAT on Cisco ASA includes labs
6
Cisco ASA interface ACLs
7
Cisco ASA Advanced Access Policies

Cisco Firepower

1
Deploying Cisco Firepower NEXT-Generation Firewall
2
Cisco Firepower NGFW Deployments
3
Cisco Firepower NGFW Packet Processing and Policies
4
Cisco Firepower NGFW Objects
5
Cisco Firepower NGFW NAT

Cisco Email Content Security Overview

1
Deploying Email Content Security
2
Cisco Email Content Security Overview
3
SMTP Overview
4
Email Pipeline Overview
5
Public and Private Listeners
6
Host Access Table Overview
7
Recipient Access Table Overview

Deploying Web Content Security

1
Deploying Web Content Security
2
Cisco WSA Overview
3
Deployment Options
4
Network Users Authentication
5
HTTPS Traffic Decryption

Cisco Umbrella

1
Deploying Cisco Umbrella
2
Cisco Umbrella Architecture
3
Deploying Cisco Umbrella
4
Cisco Umbrella Roaming Client
5
Managing Cisco Umbrella
6
Cisco Umbrella Investigate Overview

Explaining VPN Technologies and Cryptography Concepts

1
Explaining VPN Technologies and Cryptography Concepts
2
VPN Definition
3
VPN Types
4
Secure Communication and Cryptographic Services
5
Keys in Cryptography
6
Public Key Infrastructure

Introducing Cisco Secure Site to Site VPN

1
Introducing Cisco Secure Site-to-Site VPN Solutions
2
Site-to-Site VPN Technologies
3
IPsec VPN Overview
4
IPsec Static Crypto Maps
5
IPsec Static Virtual Tunnel Interface
6
Dynamic Multipoint VPN
7
Cisco IOS FlexVPN

Deploying Cisco IOS VTI Based Point to Point IPsec VPNs

1
Deploying Cisco IOS VTI-Based Point-to-Point IPsec VPNs
2
Cisco IOS VTIs
3
Static VTI Point-to-Point IPsec IKEv2 Tunnel

Deploying Point to Point IPsec VPNs on the Cisco ASA and Cisco Fire

1
Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower
2
Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW
3
Cisco ASA Point-to-Point VPN Configuration
4
Cisco Firepower NGFW Point-to-Point VPN Configuration

Introducing Cisco Secure Remote Access VPN Solutions

1
Introducing Cisco Secure Remote Access VPN Solutions
2
Remote Access VPN Components
3
Remote Access VPN Technologies
4
SSL Overview

Deploying Remote Acess SSL VPNs On the Cisco ASA and Cisco Firepower

1
Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower
2
Remote Access Configuration Concepts
3
Connection Profiles
4
Group Policies
5
Cisco ASA Remote Access VPN Configuration
6
Cisco Firepower NGFW Remote Access VPN Configuration

Explaining Cisco Service Network Access Solutions

1
Explaining Cisco Service Network Access Solutions
2
Cisco Secure Network Access
3
Cisco Secure Network Access Components
4
AAA Role in Cisco Secure Network Access solution
5
Cisco Identity Services Engine
6
Cisco TrustSec

Describing 802.1x Authentication

1
Describing 802.1 X Authentication
2
802.1X Authentication
3
EAP Methods
4
Role of RADIUS in 802.1X Communications
5
RADIUS Change of Authorization

Describing Endpoint Security Technologies

1
Introduction

Deploying Cisco AMP For Engpoints

1
Introduction
2
Cisco AMP for Endpoints Architecture
3
Cisco AMP for Endpoints Engines
4
Retrospective security with Cisco AMP
5
Cisco AMP Device and File Trajectory
6
Managing Cisco AMP for Endpoints

Introducing Network Infrastructure Protection

1
Introduction
2
Identifying Network Device Planes
3
Control Plane Security Controls
4
Management Plane Security Controls
5
Network Telemetry
6
Layer 2 & 3 Data Plane Security Controls

Deploying Control Plane Security Controls

1
Introduction
2
Infrastructure ACLs
3
Control Plane Policing
4
Control Plane Protection
5
Routing Protocol Security

Deploying Layer 2 Data Planing Security Controls

1
Overview of Layer 2 Data Plane Security Controls
2
VLAN-Based Attacks Mitigation
3
STP Attacks Mitigation
4
Port Security & Private VLANs
5
DHCP Snooping & ARP Inspection
6
Storm Control
7
MACsec Encryption

Deploying Layer 3 Data Planing Security Controls

1
Introduction
2
Infrastructure Antispoofing ACLs
3
Unicast Reverse Path Forwading
4
IP Source Guard

Deploying Management Planing Security Controls

1
Introduction
2
Cisco Secure Management Access
3
Secure Access to Cisco Devices
4
AAA for Management Access

Deploying Traffic Telemetry Methods

1
Introduction
2
Network Time Protocol
3
Device and Network Events Logging and Export
4
Network Traffic Monitoring Using NetFlow

Deploying Cisco Stealth watch Enterprise

1
Introduction
2
Cisco Stealthwatch Offerings Overview
3
Flow Stitching and Deduplication
4
Stealthwatch Enterprise and ISE Integration
5
Cisco Encrypted Traffic Analytics
6
Host Groups
7
Security Events and Alarms
8
Host, Role, and Default Policies

Describing Cloud and Common Cloud Attacks

1
introduction
2
Evolution of Cloud Computing
3
Security Responsibility in Cloud
4
Common Security Threats in Cloud
5
Security Assessment in the Cloud

Securing the Cloud

1
Introduction
2
Cisco Threat-Centric Approach to Network Security
3
Application and Workload Security
4
Network Function Virtualization (NFV) and Virtual Network Functions (VNF)
5
Reporting and Threat Visibility in Cloud
6
Cloud Access Security Broker
7
OAuth and OAuth Attacks

Deploying Cisco Stealthwatch Cloud

1
Introduction
2
Cisco Stealthwatch Cloud for Public Cloud Monitoring
3
Cisco Stealthwatch Cloud Operations

Discribing SDN

1
Introduction
2
Software-Defined Networking Concepts
3
Network Programmability and Automation
4
Cisco Platforms and APIs

Be the first to add a review.

Please, login to leave a review
Add to Wishlist
Lectures: 140
Video: 90 Hours

Archive

Working hours

Monday 9:30 am - 6.00 pm
Tuesday 9:30 am - 6.00 pm
Wednesday 9:30 am - 6.00 pm
Thursday 9:30 am - 6.00 pm
Friday 9:30 am - 5.00 pm
Saturday Closed
Sunday Closed

Login Or Register