<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.nl/css/xml-course.xsl"?><course productid="21202" language="nl" source="https://portal.flane.nl/uu-its-smycl/xml-course/cisco-scor" lastchanged="2026-04-27T11:58:15+02:00" parent="https://portal.flane.nl/uu-its-smycl/xml-courses"><title>Implementing and Operating Cisco Security Core Technologies</title><productcode>SCOR</productcode><vendorcode>CI</vendorcode><vendorname>Cisco</vendorname><fullproductcode>CI-SCOR</fullproductcode><version>2.0</version><objective>&lt;p&gt;After taking this course, you should be able to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Describe information security concepts and strategies within the network&lt;/li&gt;&lt;li&gt;Describe common TCP/IP, network application, and endpoint attacks&lt;/li&gt;&lt;li&gt;Describe how various network security technologies work together to guard against attacks&lt;/li&gt;&lt;li&gt;Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall&lt;/li&gt;&lt;li&gt;Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance&lt;/li&gt;&lt;li&gt;Describe and implement web content security features and functions provided by Cisco Web Security Appliance&lt;/li&gt;&lt;li&gt;Describe Cisco Umbrella security capabilities, deployment models, policy management, and Investigate console&lt;/li&gt;&lt;li&gt;Introduce VPNs and describe cryptography solutions and algorithms&lt;/li&gt;&lt;li&gt;Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco IOS VTI-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco FirePower NGFW&lt;/li&gt;&lt;li&gt;Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and EAP authentication&lt;/li&gt;&lt;li&gt;Provide basic understanding of endpoint security and describe AMP for Endpoints architecture and basic features&lt;/li&gt;&lt;li&gt;Examine various defenses on Cisco devices that protect the control and management plane&lt;/li&gt;&lt;li&gt;Configure and verify Cisco IOS Software Layer 2 and Layer 3 Data Plane Controls&lt;/li&gt;&lt;li&gt;Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions&lt;/li&gt;&lt;li&gt;Describe basics of cloud computing and common cloud attacks and how to secure cloud environment&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;This course will help you:&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Gain hands-on experience implementing core security technologies and learn best practices using Cisco security solutions&lt;/li&gt;&lt;li&gt;Prepare for the Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) exam&lt;/li&gt;&lt;li&gt;Qualify for professional and expert-level security job roles&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;This course will help you prepare to take the Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) exam. This exam tests a candidate&amp;#039;s knowledge of implementing and operating core security technologies.&lt;/p&gt;</objective><essentials>&lt;p&gt;To fully benefit from this course, you should have the following knowledge and skills:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA) v1.0 course&lt;/li&gt;&lt;li&gt;Familiarity with Ethernet and TCP/IP networking&lt;/li&gt;&lt;li&gt;Working knowledge of the Windows operating system&lt;/li&gt;&lt;li&gt;Working knowledge of Cisco IOS networking and concepts&lt;/li&gt;&lt;li&gt;Familiarity with basics of networking security concepts&lt;/li&gt;&lt;/ul&gt;</essentials><audience>&lt;ul&gt;
&lt;li&gt;Security Engineer&lt;/li&gt;&lt;li&gt;Network Engineer&lt;/li&gt;&lt;li&gt;Network Designer&lt;/li&gt;&lt;li&gt;Network Administrator&lt;/li&gt;&lt;li&gt;Systems Engineer&lt;/li&gt;&lt;li&gt;Consulting Systems Engineer&lt;/li&gt;&lt;li&gt;Technical Solutions Architect&lt;/li&gt;&lt;li&gt;Cisco Integrators/Partners&lt;/li&gt;&lt;li&gt;Network Manager&lt;/li&gt;&lt;li&gt;Cisco integrators and partners&lt;/li&gt;&lt;/ul&gt;</audience><contents>&lt;ul&gt;
&lt;li&gt;Describing Information Security Concepts*&lt;/li&gt;&lt;li&gt;Describing Common TCP/IP Attacks*&lt;/li&gt;&lt;li&gt;Describing Common Network Application Attacks*&lt;/li&gt;&lt;li&gt;Describing Common Endpoint Attacks*&lt;/li&gt;&lt;li&gt;Describing Network Security Technologies&lt;/li&gt;&lt;li&gt;Deploying Cisco ASA Firewall&lt;/li&gt;&lt;li&gt;Deploying Cisco Firepower Next-Generation Firewall&lt;/li&gt;&lt;li&gt;Deploying Email Content Security&lt;/li&gt;&lt;li&gt;Deploying Web Content Security&lt;/li&gt;&lt;li&gt;Deploying Cisco Umbrella*&lt;/li&gt;&lt;li&gt;Explaining VPN Technologies and Cryptography&lt;/li&gt;&lt;li&gt;Introducing Cisco Secure Site-to-Site VPN Solutions&lt;/li&gt;&lt;li&gt;Deploying Cisco IOS VTI-Based Point-to-Point&lt;/li&gt;&lt;li&gt;Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW&lt;/li&gt;&lt;li&gt;Introducing Cisco Secure Remote Access VPN Solutions&lt;/li&gt;&lt;li&gt;Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW&lt;/li&gt;&lt;li&gt;Explaining Cisco Secure Network Access Solutions&lt;/li&gt;&lt;li&gt;Describing 802.1X Authentication&lt;/li&gt;&lt;li&gt;Configuring 802.1X Authentication&lt;/li&gt;&lt;li&gt;Describing Endpoint Security Technologies*&lt;/li&gt;&lt;li&gt;Deploying Cisco AMP for Endpoints*&lt;/li&gt;&lt;li&gt;Introducing Network Infrastructure Protection*&lt;/li&gt;&lt;li&gt;Deploying Control Plane Security Controls*&lt;/li&gt;&lt;li&gt;Deploying Layer 2 Data Plane Security Controls*&lt;/li&gt;&lt;li&gt;Deploying Layer 3 Data Plane Security Controls*&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;* This section is self-study material that can be done at your own pace if you are taking the instructor-led version of this course.&lt;/p&gt;</contents><outline>&lt;h5&gt;Describing Information Security Concepts*&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Information Security Overview&lt;/li&gt;&lt;li&gt;Managing Risk&lt;/li&gt;&lt;li&gt;Vulnerability Assessment&lt;/li&gt;&lt;li&gt;Understanding CVSS&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Describing Common TCP/IP Attacks*&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Legacy TCP/IP Vulnerabilities&lt;/li&gt;&lt;li&gt;IP Vulnerabilities&lt;/li&gt;&lt;li&gt;ICMP Vulnerabilities&lt;/li&gt;&lt;li&gt;TCP Vulnerabilities&lt;/li&gt;&lt;li&gt;UDP Vulnerabilities&lt;/li&gt;&lt;li&gt;Attack Surface and Attack Vectors&lt;/li&gt;&lt;li&gt;Reconnaissance Attacks&lt;/li&gt;&lt;li&gt;Access Attacks&lt;/li&gt;&lt;li&gt;Man-In-The-Middle Attacks&lt;/li&gt;&lt;li&gt;Denial of Service and Distributed Denial of Service Attacks&lt;/li&gt;&lt;li&gt;Reflection and Amplification Attacks&lt;/li&gt;&lt;li&gt;Spoofing Attacks&lt;/li&gt;&lt;li&gt;DHCP Attacks&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Describing Common Network Application Attacks*&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Password Attacks&lt;/li&gt;&lt;li&gt;DNS-Based Attacks&lt;/li&gt;&lt;li&gt;DNS Tunneling&lt;/li&gt;&lt;li&gt;Web-Based Attacks&lt;/li&gt;&lt;li&gt;HTTP 302 Cushioning&lt;/li&gt;&lt;li&gt;Command Injections&lt;/li&gt;&lt;li&gt;SQL Injections&lt;/li&gt;&lt;li&gt;Cross-Site Scripting and Request Forgery&lt;/li&gt;&lt;li&gt;Email-Based Attacks&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Describing Common Endpoint Attacks*&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Buffer Overflow&lt;/li&gt;&lt;li&gt;Malware&lt;/li&gt;&lt;li&gt;Reconnaissance Attack&lt;/li&gt;&lt;li&gt;Gaining Access and Control&lt;/li&gt;&lt;li&gt;Gaining Access via Social Engineering&lt;/li&gt;&lt;li&gt;Gaining Access via Web-Based Attacks&lt;/li&gt;&lt;li&gt;Exploit Kits and Rootkits&lt;/li&gt;&lt;li&gt;Privilege Escalation&lt;/li&gt;&lt;li&gt;Post-Exploitation Phase&lt;/li&gt;&lt;li&gt;Angler Exploit Kit&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Describing Network Security Technologies&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Defense-in-Depth Strategy&lt;/li&gt;&lt;li&gt;Defending Across the Attack Continuum&lt;/li&gt;&lt;li&gt;Network Segmentation and Virtualization Overview&lt;/li&gt;&lt;li&gt;Stateful Firewall Overview&lt;/li&gt;&lt;li&gt;Security Intelligence Overview&lt;/li&gt;&lt;li&gt;Threat Information Standardization&lt;/li&gt;&lt;li&gt;Network-Based Malware Protection Overview&lt;/li&gt;&lt;li&gt;IPS Overview&lt;/li&gt;&lt;li&gt;Next Generation Firewall Overview&lt;/li&gt;&lt;li&gt;Email Content Security Overview&lt;/li&gt;&lt;li&gt;Web Content Security Overview&lt;/li&gt;&lt;li&gt;Threat Analytic Systems Overview&lt;/li&gt;&lt;li&gt;DNS Security Overview&lt;/li&gt;&lt;li&gt;Authentication, Authorization, and Accounting Overview&lt;/li&gt;&lt;li&gt;Identity and Access Management Overview&lt;/li&gt;&lt;li&gt;Virtual Private Network Technology Overview&lt;/li&gt;&lt;li&gt;Network Security Device Form Factors Overview&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Deploying Cisco ASA Firewall&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Cisco ASA Deployment Types&lt;/li&gt;&lt;li&gt;Cisco ASA Interface Security Levels&lt;/li&gt;&lt;li&gt;Cisco ASA Objects and Object Groups&lt;/li&gt;&lt;li&gt;Network Address Translation&lt;/li&gt;&lt;li&gt;Cisco ASA Interface ACLs&lt;/li&gt;&lt;li&gt;Cisco ASA Global ACLs&lt;/li&gt;&lt;li&gt;Cisco ASA Advanced Access Policies&lt;/li&gt;&lt;li&gt;Cisco ASA High Availability Overview&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Deploying Cisco Firepower Next-Generation Firewall&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Cisco Firepower NGFW Deployments&lt;/li&gt;&lt;li&gt;Cisco Firepower NGFW Packet Processing and Policies&lt;/li&gt;&lt;li&gt;Cisco Firepower NGFW Objects&lt;/li&gt;&lt;li&gt;Cisco Firepower NGFW NAT&lt;/li&gt;&lt;li&gt;Cisco Firepower NGFW Prefilter Policies&lt;/li&gt;&lt;li&gt;Cisco Firepower NGFW Access Control Policies&lt;/li&gt;&lt;li&gt;Cisco Firepower NGFW Security Intelligence&lt;/li&gt;&lt;li&gt;Cisco Firepower NGFW Discovery Policies&lt;/li&gt;&lt;li&gt;Cisco Firepower NGFW IPS Policies&lt;/li&gt;&lt;li&gt;Cisco Firepower NGFW Malware and File Policies&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Deploying Email Content Security&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Cisco Email Content Security Overview&lt;/li&gt;&lt;li&gt;SMTP Overview&lt;/li&gt;&lt;li&gt;Email Pipeline Overview&lt;/li&gt;&lt;li&gt;Public and Private Listeners&lt;/li&gt;&lt;li&gt;Host Access Table Overview&lt;/li&gt;&lt;li&gt;Recipient Access Table Overview&lt;/li&gt;&lt;li&gt;Mail Policies Overview&lt;/li&gt;&lt;li&gt;Protection Against Spam and Graymail&lt;/li&gt;&lt;li&gt;Anti-virus and Anti-malware Protection&lt;/li&gt;&lt;li&gt;Outbreak Filters&lt;/li&gt;&lt;li&gt;Content Filters&lt;/li&gt;&lt;li&gt;Data Loss Prevention&lt;/li&gt;&lt;li&gt;Email Encryption&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Deploying Web Content Security&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Cisco WSA Overview&lt;/li&gt;&lt;li&gt;Deployment Options&lt;/li&gt;&lt;li&gt;Network Users Authentication&lt;/li&gt;&lt;li&gt;HTTPS Traffic Decryption&lt;/li&gt;&lt;li&gt;Access Policies and Identification Profiles&lt;/li&gt;&lt;li&gt;Acceptable Use Controls Settings&lt;/li&gt;&lt;li&gt;Anti-Malware Protection&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Deploying Cisco Umbrella*&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Cisco Umbrella Architecture&lt;/li&gt;&lt;li&gt;Deploying Cisco Umbrella&lt;/li&gt;&lt;li&gt;Cisco Umbrella Roaming Client&lt;/li&gt;&lt;li&gt;Managing Cisco Umbrella&lt;/li&gt;&lt;li&gt;Cisco Umbrella Investigate Overview&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Explaining VPN Technologies and Cryptography&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;VPN Definition&lt;/li&gt;&lt;li&gt;VPN Types&lt;/li&gt;&lt;li&gt;Secure Communication and Cryptographic Services&lt;/li&gt;&lt;li&gt;Keys in Cryptography&lt;/li&gt;&lt;li&gt;Public Key Infrastructure&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Introducing Cisco Secure Site-to-Site VPN Solutions&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Site-to-Site VPN Topologies&lt;/li&gt;&lt;li&gt;IPsec VPN Overview&lt;/li&gt;&lt;li&gt;IPsec Static Crypto Maps&lt;/li&gt;&lt;li&gt;IPsec Static Virtual Tunnel Interface&lt;/li&gt;&lt;li&gt;Dynamic Multipoint VPN&lt;/li&gt;&lt;li&gt;Cisco IOS FlexVPN&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Deploying Cisco IOS VTI-Based Point-to-Point&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Cisco IOS VTIs&lt;/li&gt;&lt;li&gt;Static VTI Point-to-Point IPsec IKEv2 VPN Configuration&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW&lt;/li&gt;&lt;li&gt;Cisco ASA Point-to-Point VPN Configuration&lt;/li&gt;&lt;li&gt;Cisco Firepower NGFW Point-to-Point VPN Configuration&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Introducing Cisco Secure Remote Access VPN Solutions&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Remote Access VPN Components&lt;/li&gt;&lt;li&gt;Remote Access VPN Technologies&lt;/li&gt;&lt;li&gt;SSL Overview&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Remote Access Configuration Concepts&lt;/li&gt;&lt;li&gt;Connection Profiles&lt;/li&gt;&lt;li&gt;Group Policies&lt;/li&gt;&lt;li&gt;Cisco ASA Remote Access VPN Configuration&lt;/li&gt;&lt;li&gt;Cisco Firepower NGFW Remote Access VPN Configuration&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Explaining Cisco Secure Network Access Solutions&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Cisco Secure Network Access&lt;/li&gt;&lt;li&gt;Cisco Secure Network Access Components&lt;/li&gt;&lt;li&gt;AAA Role in Cisco Secure Network Access Solution&lt;/li&gt;&lt;li&gt;Cisco Identity Services Engine&lt;/li&gt;&lt;li&gt;Cisco TrustSec&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Describing 802.1X Authentication&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;802.1X and EAP&lt;/li&gt;&lt;li&gt;EAP Methods&lt;/li&gt;&lt;li&gt;Role of RADIUS in 802.1X Communications&lt;/li&gt;&lt;li&gt;RADIUS Change of Authorization&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Configuring 802.1X Authentication&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Cisco Catalyst Switch 802.1X Configuration&lt;/li&gt;&lt;li&gt;Cisco WLC 802.1X Configuration&lt;/li&gt;&lt;li&gt;Cisco ISE 802.1X Configuration&lt;/li&gt;&lt;li&gt;Supplicant 802.1x Configuration&lt;/li&gt;&lt;li&gt;Cisco Central Web Authentication&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Describing Endpoint Security Technologies*&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Host-Based Personal Firewall&lt;/li&gt;&lt;li&gt;Host-Based Anti-Virus&lt;/li&gt;&lt;li&gt;Host-Based Intrusion Prevention System&lt;/li&gt;&lt;li&gt;Application Whitelists and Blacklists&lt;/li&gt;&lt;li&gt;Host-Based Malware Protection&lt;/li&gt;&lt;li&gt;Sandboxing Overview&lt;/li&gt;&lt;li&gt;File Integrity Checking&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Deploying Cisco AMP for Endpoints*&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Cisco AMP for Endpoints Architecture&lt;/li&gt;&lt;li&gt;Cisco AMP for Endpoints Engines&lt;/li&gt;&lt;li&gt;Retrospective Security with Cisco AMP&lt;/li&gt;&lt;li&gt;Cisco AMP Device and File Trajectory&lt;/li&gt;&lt;li&gt;Managing Cisco AMP for Endpoints&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Introducing Network Infrastructure Protection*&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Identifying Network Device Planes&lt;/li&gt;&lt;li&gt;Control Plane Security Controls&lt;/li&gt;&lt;li&gt;Management Plane Security Controls&lt;/li&gt;&lt;li&gt;Network Telemetry&lt;/li&gt;&lt;li&gt;Layer 2 Data Plane Security Controls&lt;/li&gt;&lt;li&gt;Layer 3 Data Plane Security Controls&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Deploying Control Plane Security Controls*&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Infrastructure ACLs&lt;/li&gt;&lt;li&gt;Control Plane Policing&lt;/li&gt;&lt;li&gt;Control Plane Protection&lt;/li&gt;&lt;li&gt;Routing Protocol Security&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Deploying Layer 2 Data Plane Security Controls*&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Overview of Layer 2 Data Plane Security Controls&lt;/li&gt;&lt;li&gt;VLAN-Based Attacks Mitigation&lt;/li&gt;&lt;li&gt;STP Attacks Mitigation&lt;/li&gt;&lt;li&gt;Port Security&lt;/li&gt;&lt;li&gt;Private VLANs&lt;/li&gt;&lt;li&gt;DHCP Snooping&lt;/li&gt;&lt;li&gt;ARP Inspection&lt;/li&gt;&lt;li&gt;Storm Control&lt;/li&gt;&lt;li&gt;MACsec Encryption&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Deploying Layer 3 Data Plane Security Controls*&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Infrastructure Antispoofing ACLs&lt;/li&gt;&lt;li&gt;Unicast Reverse Path Forwarding&lt;/li&gt;&lt;li&gt;IP Source Guard&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;* This section is self-study material that can be done at your own pace if you are taking the instructor-led version of this course.&lt;/p&gt;</outline><objective_plain>After taking this course, you should be able to:


- Describe information security concepts and strategies within the network
- Describe common TCP/IP, network application, and endpoint attacks
- Describe how various network security technologies work together to guard against attacks
- Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall
- Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance
- Describe and implement web content security features and functions provided by Cisco Web Security Appliance
- Describe Cisco Umbrella security capabilities, deployment models, policy management, and Investigate console
- Introduce VPNs and describe cryptography solutions and algorithms
- Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco IOS VTI-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco FirePower NGFW
- Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and EAP authentication
- Provide basic understanding of endpoint security and describe AMP for Endpoints architecture and basic features
- Examine various defenses on Cisco devices that protect the control and management plane
- Configure and verify Cisco IOS Software Layer 2 and Layer 3 Data Plane Controls
- Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions
- Describe basics of cloud computing and common cloud attacks and how to secure cloud environment
This course will help you:


- Gain hands-on experience implementing core security technologies and learn best practices using Cisco security solutions
- Prepare for the Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) exam
- Qualify for professional and expert-level security job roles
This course will help you prepare to take the Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) exam. This exam tests a candidate's knowledge of implementing and operating core security technologies.</objective_plain><essentials_plain>To fully benefit from this course, you should have the following knowledge and skills:


- Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA) v1.0 course
- Familiarity with Ethernet and TCP/IP networking
- Working knowledge of the Windows operating system
- Working knowledge of Cisco IOS networking and concepts
- Familiarity with basics of networking security concepts</essentials_plain><audience_plain>- Security Engineer
- Network Engineer
- Network Designer
- Network Administrator
- Systems Engineer
- Consulting Systems Engineer
- Technical Solutions Architect
- Cisco Integrators/Partners
- Network Manager
- Cisco integrators and partners</audience_plain><contents_plain>- Describing Information Security Concepts*
- Describing Common TCP/IP Attacks*
- Describing Common Network Application Attacks*
- Describing Common Endpoint Attacks*
- Describing Network Security Technologies
- Deploying Cisco ASA Firewall
- Deploying Cisco Firepower Next-Generation Firewall
- Deploying Email Content Security
- Deploying Web Content Security
- Deploying Cisco Umbrella*
- Explaining VPN Technologies and Cryptography
- Introducing Cisco Secure Site-to-Site VPN Solutions
- Deploying Cisco IOS VTI-Based Point-to-Point
- Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW
- Introducing Cisco Secure Remote Access VPN Solutions
- Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW
- Explaining Cisco Secure Network Access Solutions
- Describing 802.1X Authentication
- Configuring 802.1X Authentication
- Describing Endpoint Security Technologies*
- Deploying Cisco AMP for Endpoints*
- Introducing Network Infrastructure Protection*
- Deploying Control Plane Security Controls*
- Deploying Layer 2 Data Plane Security Controls*
- Deploying Layer 3 Data Plane Security Controls*
* This section is self-study material that can be done at your own pace if you are taking the instructor-led version of this course.</contents_plain><outline_plain>Describing Information Security Concepts*


- Information Security Overview
- Managing Risk
- Vulnerability Assessment
- Understanding CVSS
Describing Common TCP/IP Attacks*


- Legacy TCP/IP Vulnerabilities
- IP Vulnerabilities
- ICMP Vulnerabilities
- TCP Vulnerabilities
- UDP Vulnerabilities
- Attack Surface and Attack Vectors
- Reconnaissance Attacks
- Access Attacks
- Man-In-The-Middle Attacks
- Denial of Service and Distributed Denial of Service Attacks
- Reflection and Amplification Attacks
- Spoofing Attacks
- DHCP Attacks
Describing Common Network Application Attacks*


- Password Attacks
- DNS-Based Attacks
- DNS Tunneling
- Web-Based Attacks
- HTTP 302 Cushioning
- Command Injections
- SQL Injections
- Cross-Site Scripting and Request Forgery
- Email-Based Attacks
Describing Common Endpoint Attacks*


- Buffer Overflow
- Malware
- Reconnaissance Attack
- Gaining Access and Control
- Gaining Access via Social Engineering
- Gaining Access via Web-Based Attacks
- Exploit Kits and Rootkits
- Privilege Escalation
- Post-Exploitation Phase
- Angler Exploit Kit
Describing Network Security Technologies


- Defense-in-Depth Strategy
- Defending Across the Attack Continuum
- Network Segmentation and Virtualization Overview
- Stateful Firewall Overview
- Security Intelligence Overview
- Threat Information Standardization
- Network-Based Malware Protection Overview
- IPS Overview
- Next Generation Firewall Overview
- Email Content Security Overview
- Web Content Security Overview
- Threat Analytic Systems Overview
- DNS Security Overview
- Authentication, Authorization, and Accounting Overview
- Identity and Access Management Overview
- Virtual Private Network Technology Overview
- Network Security Device Form Factors Overview
Deploying Cisco ASA Firewall


- Cisco ASA Deployment Types
- Cisco ASA Interface Security Levels
- Cisco ASA Objects and Object Groups
- Network Address Translation
- Cisco ASA Interface ACLs
- Cisco ASA Global ACLs
- Cisco ASA Advanced Access Policies
- Cisco ASA High Availability Overview
Deploying Cisco Firepower Next-Generation Firewall


- Cisco Firepower NGFW Deployments
- Cisco Firepower NGFW Packet Processing and Policies
- Cisco Firepower NGFW Objects
- Cisco Firepower NGFW NAT
- Cisco Firepower NGFW Prefilter Policies
- Cisco Firepower NGFW Access Control Policies
- Cisco Firepower NGFW Security Intelligence
- Cisco Firepower NGFW Discovery Policies
- Cisco Firepower NGFW IPS Policies
- Cisco Firepower NGFW Malware and File Policies
Deploying Email Content Security


- Cisco Email Content Security Overview
- SMTP Overview
- Email Pipeline Overview
- Public and Private Listeners
- Host Access Table Overview
- Recipient Access Table Overview
- Mail Policies Overview
- Protection Against Spam and Graymail
- Anti-virus and Anti-malware Protection
- Outbreak Filters
- Content Filters
- Data Loss Prevention
- Email Encryption
Deploying Web Content Security


- Cisco WSA Overview
- Deployment Options
- Network Users Authentication
- HTTPS Traffic Decryption
- Access Policies and Identification Profiles
- Acceptable Use Controls Settings
- Anti-Malware Protection
Deploying Cisco Umbrella*


- Cisco Umbrella Architecture
- Deploying Cisco Umbrella
- Cisco Umbrella Roaming Client
- Managing Cisco Umbrella
- Cisco Umbrella Investigate Overview
Explaining VPN Technologies and Cryptography


- VPN Definition
- VPN Types
- Secure Communication and Cryptographic Services
- Keys in Cryptography
- Public Key Infrastructure
Introducing Cisco Secure Site-to-Site VPN Solutions


- Site-to-Site VPN Topologies
- IPsec VPN Overview
- IPsec Static Crypto Maps
- IPsec Static Virtual Tunnel Interface
- Dynamic Multipoint VPN
- Cisco IOS FlexVPN
Deploying Cisco IOS VTI-Based Point-to-Point


- Cisco IOS VTIs
- Static VTI Point-to-Point IPsec IKEv2 VPN Configuration
Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW


- Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW
- Cisco ASA Point-to-Point VPN Configuration
- Cisco Firepower NGFW Point-to-Point VPN Configuration
Introducing Cisco Secure Remote Access VPN Solutions


- Remote Access VPN Components
- Remote Access VPN Technologies
- SSL Overview
Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW


- Remote Access Configuration Concepts
- Connection Profiles
- Group Policies
- Cisco ASA Remote Access VPN Configuration
- Cisco Firepower NGFW Remote Access VPN Configuration
Explaining Cisco Secure Network Access Solutions


- Cisco Secure Network Access
- Cisco Secure Network Access Components
- AAA Role in Cisco Secure Network Access Solution
- Cisco Identity Services Engine
- Cisco TrustSec
Describing 802.1X Authentication


- 802.1X and EAP
- EAP Methods
- Role of RADIUS in 802.1X Communications
- RADIUS Change of Authorization
Configuring 802.1X Authentication


- Cisco Catalyst Switch 802.1X Configuration
- Cisco WLC 802.1X Configuration
- Cisco ISE 802.1X Configuration
- Supplicant 802.1x Configuration
- Cisco Central Web Authentication
Describing Endpoint Security Technologies*


- Host-Based Personal Firewall
- Host-Based Anti-Virus
- Host-Based Intrusion Prevention System
- Application Whitelists and Blacklists
- Host-Based Malware Protection
- Sandboxing Overview
- File Integrity Checking
Deploying Cisco AMP for Endpoints*


- Cisco AMP for Endpoints Architecture
- Cisco AMP for Endpoints Engines
- Retrospective Security with Cisco AMP
- Cisco AMP Device and File Trajectory
- Managing Cisco AMP for Endpoints
Introducing Network Infrastructure Protection*


- Identifying Network Device Planes
- Control Plane Security Controls
- Management Plane Security Controls
- Network Telemetry
- Layer 2 Data Plane Security Controls
- Layer 3 Data Plane Security Controls
Deploying Control Plane Security Controls*


- Infrastructure ACLs
- Control Plane Policing
- Control Plane Protection
- Routing Protocol Security
Deploying Layer 2 Data Plane Security Controls*


- Overview of Layer 2 Data Plane Security Controls
- VLAN-Based Attacks Mitigation
- STP Attacks Mitigation
- Port Security
- Private VLANs
- DHCP Snooping
- ARP Inspection
- Storm Control
- MACsec Encryption
Deploying Layer 3 Data Plane Security Controls*


- Infrastructure Antispoofing ACLs
- Unicast Reverse Path Forwarding
- IP Source Guard
* This section is self-study material that can be done at your own pace if you are taking the instructor-led version of this course.</outline_plain><duration unit="d" days="5">5 dagen</duration><pricelist><price country="UA" currency="USD">3000.00</price><price country="PL" currency="EUR">2290.00</price><price country="AE" currency="USD">2800.00</price><price country="P3" currency="USD">3495.00</price><price country="CR" currency="USD">3495.00</price><price country="PA" currency="USD">3495.00</price><price country="CL" currency="USD">3495.00</price><price country="AR" currency="USD">3495.00</price><price country="CO" currency="USD">3495.00</price><price country="PE" currency="USD">3495.00</price><price country="MX" currency="USD">3495.00</price><price country="BR" currency="USD">3495.00</price><price country="IT" currency="EUR">2990.00</price><price country="CH" currency="CHF">4150.00</price><price country="US" currency="USD">4300.00</price><price country="SI" currency="EUR">2625.00</price><price country="GB" currency="GBP">3305.00</price><price country="IL" currency="ILS">11070.00</price><price country="GR" currency="EUR">2625.00</price><price country="MK" currency="EUR">2625.00</price><price country="HU" currency="EUR">2625.00</price><price country="FR" currency="EUR">4060.00</price><price country="AU" currency="USD">4300.00</price><price country="SG" currency="USD">3440.00</price><price country="IN" currency="USD">2580.00</price><price country="DE" currency="EUR">3595.00</price><price country="SE" currency="EUR">3595.00</price><price country="AT" currency="EUR">3595.00</price><price country="NL" currency="EUR">2995.00</price><price country="RU" currency="RUB">195500.00</price><price country="BE" currency="EUR">2995.00</price><price country="CA" currency="CAD">5935.00</price></pricelist><miles><milesvalue country="CL" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">35.00</milesvalue><milesvalue country="MX" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">35.00</milesvalue><milesvalue country="GB" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="PL" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="FR" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="S2" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="CA" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="ES" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="SG" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="BR" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="PE" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="PA" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="AR" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="P3" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="CR" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="NL" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="AE" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="US" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="CO" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="IT" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="SI" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="SE" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="IL" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="EG" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="AT" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="UA" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="CH" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="DE" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue></miles></course>