SCOR - Implementing and Operating Cisco Security Core Technologies v1.0

The Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 course helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility, and enforcements. You will get extensive hands-on experience deploying Cisco Firepower® Next-Generation Firewall and Cisco Adaptive Security Appliance (ASA) Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch® Enterprise and Cisco Stealthwatch Cloud threat detection features.

Course syllabus:

  1. Describing Information Security Concepts

  2. Describing Common TCP/IP Attacks

  3. Describing Common Network Application Attacks

  4. Describing Common Endpoint Attacks

  5. Describing Network Security Technologies

  6. Deploying Cisco ASA Firewall

  7. Deploying Cisco Firepower Next-Generation Firewall

  8. Deploying Email Content Security

  9. Deploying Web Content Security

  10. Deploying Cisco Umbrella

  11. Explaining VPN Technologies and Cryptography

  12. Introducing Cisco Secure Site-to-Site VPN Solutions

  13. Deploying Cisco IOS VTI-Based Point-to-Point IPsec VPNs

  14. Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW

  15. Introducing Cisco Secure Remote Access VPN Solutions

  16. Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW

  17. Explaining Cisco Secure Network Access Solutions

  18. Describing 802.1X Authentication

  19. Configuring 802.1X Authentication

  20. Describing Endpoint Security Technologies

  21. Deploying Cisco Advanced Malware Protection (AMP) for Endpoints

  22. Introducing Network Infrastructure Protection

  23. Deploying Control Plane Security Controls

  24. Deploying Layer 2 Data Plane Security Controls

  25. Deploying Layer 3 Data Plane Security Controls

  26. Deploying Management Plane Security Controls

  27. Deploying Traffic Telemetry Methods

  28. Deploying Cisco Stealthwatch Enterprise

  29. Describing Cloud and Common Cloud Attacks

  30. Securing the Cloud

  31. Deploying Cisco Stealthwatch Cloud

  32. Describing Software-Defined Networking (SDN)