Tutorialspoint

April Learning Carnival is here, Use code FEST10 for an extra 10% off

CCNP,CCIE Security SCOR (350-701) Training Part-1/2

person icon Ahmad Ali

3.9

CCNP,CCIE Security SCOR (350-701) Training Part-1/2

Implementing and Operating Cisco Security Core Technologies (SCOR 350-701) with Step by Step Lab Workbook

updated on icon Updated on Apr, 2024

language icon Language - English

person icon Ahmad Ali

English [CC]

category icon Network & Security,CCNP Security

Lectures -94

Duration -33.5 hours

3.9

price-loader

30-days Money-Back Guarantee

Training 5 or more people ?

Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.

Course Description

Security Concepts, Explain common threats against on-premises and cloud environments, Configure and verify network infrastructure security methods, Configure AAA for device and network access, Configure secure network management of perimeter security, Configure and verify site-to-site VPN and remote access VPN , Describe identity management and secure network access, Network security solutions that provide intrusion prevention and firewall, Network Security, Securing the Cloud, Content Security, Endpoint Protection and Detection , Secure Network Access, Visibility, and Enforcement, Secure network access, SDN and Network Automation Concepts, Describe the components, capabilities, and benefits of Cisco Umbrella, Endpoint Protection and Detection, Secure Network Access, Visibility, and Enforcement, Describe the benefits of network telemetry, Implement traffic redirection and capture methods, Describe the concept of DevSecOps, Identify security solutions for cloud environments, Compare the customer vs. provider security responsibility, Configure AAA for device and network access, Implement segmentation, access control policies, AVC, Explain North Bound and South Bound APIs in the SDN architecture, Describe security intelligence authoring, sharing, and consumption, Describe security intelligence authoring, sharing, and consumption, Interpret basic Python scripts used to call Cisco Security appliances APIs, Cloud service models: SaaS, PaaS, IaaS, Security assessment in the cloud, Patch management in the cloud, Describe the benefits of device compliance and application control

Who this course is for:

  • Course has been designed for anyone who wants to start learning Security
  • This course is for students trying to obtain the CCNP and CCIE SCOR
  • This course is for students trying to learn the CCNP Security
  • Any Network or Security Engineer want to learn or polish their Skills.


Goals

What will you learn in this course:

  • Compare common security vulnerabilities

  • Describe functions of the cryptography components

  • Compare site-to-site VPN and remote access VPN deployment types

  • Compare network security solutions that provide intrusion prevention

  • Configure and verify network infrastructure security methods

  • Device hardening of network infrastructure security devices

  • Implement segmentation, access control policies, AVC, URL filtering

  • Implement management options for network security solutions

  • Configure and verify site-to-site VPN and remote access VPN

  • Describe identity management and secure network access

  • common threats against on-premises and cloud environments

Prerequisites

What are the prerequisites for this course?

  • Basic IP and security knowledge is nice to have.

  • Students need to understand basic networking.

  • CCNA routing and Switching Knowledge

  • Students needs to understand Networking Fundamentals.

CCNP,CCIE Security SCOR (350-701) Training Part-1/2

Curriculum

Check out the detailed breakdown of what’s inside the course

CCNP, CCIE Security 350-701
94 Lectures
  • play icon Lecture-01:Introduction to CCNP Security SCOR. 07:15 07:15
  • play icon Lecture-02:Confidentiality,Integrity & Availability. 16:12 16:12
  • play icon Lecture-03:Common Network Security Terms Asset etc. 15:04 15:04
  • play icon Lecture-04:On-Premises, Cloud and Malware Theory. 29:00 29:00
  • play icon Lecture-05:SQL Database Injection Attack Theory and Lab. 12:53 12:53
  • play icon Lecture-06:Cross Site Scripting Attack Theory and Lab. 07:45 07:45
  • play icon Lecture-07:Phishing Social Engineer Engineering Attack Lab. 11:06 11:06
  • play icon Lecture-08:Man-In-The-Middle Attack Theory and Lab. 24:02 24:02
  • play icon Lecture-09:Denial Of Service (DoS) Attack Theory and Lab. 23:52 23:52
  • play icon Lecture-10:Path Traversal Attack Theory and Lab. 06:24 06:24
  • play icon Lecture-11:Buffer Overflow Attack Theory and Lab. 04:16 04:16
  • play icon Lecture-12:Common Vulnerability Terms Theory. 07:51 07:51
  • play icon Lecture-13:VLAN (Virtual Local Area Network) Theory. 23:52 23:52
  • play icon Lecture-14:Layer 2 Attacks (DHCP Snooping) Theory & Lab. 35:20 35:20
  • play icon Lecture-15:ARP (Address Resolution Protocol) Theory. 06:07 06:07
  • play icon Lecture-16:ARP Poisoning or ARP Spoofing Attack Lab. 27:24 27:24
  • play icon Lecture-17:MAC (Media Access Control Address) Theory. 06:20 06:20
  • play icon Lecture-18:MAC (Media Access Control Address) Flooding Attack. 04:19 04:19
  • play icon Lecture-19:Configure and Verify Port Security Theory & Lab. 46:45 46:45
  • play icon Lecture-20:STP (Spanning Tree Protocols) Theory. 12:23 12:23
  • play icon Lecture-21:STP Spanning Tree Protocols Attacks Labs. 17:07 17:07
  • play icon Lecture-22:VLAN (Virtual Local Area Network) Hopping Attack Lab. 20:33 20:33
  • play icon Lecture-23:Configure and Verify Storm Control Theory & Lab. 19:58 19:58
  • play icon Lecture-24:Configure and Verify Private VLAN Theory & Lab. 30:12 30:12
  • play icon Lecture-25:Configure and Verify VRF Lite Theory & Lab. 33:09 33:09
  • play icon Lecture-26:Configure and Verify Management Plane Theory & Lab Part-1 54:41 54:41
  • play icon Lecture-27:Configure and Verify Management Plane Theory & Lab Part-2 45:51 45:51
  • play icon Lecture-28:Configure and Verify Control Plane Theory & Lab 28:45 28:45
  • play icon Lecture-29:Introduction to Layer 2 and Layer 3 Data Plane. 03:22 03:22
  • play icon Lecture-30:Introduction and Compare In-Band and Out-of-Band. 07:50 07:50
  • play icon Lecture-31:Securing Routing Protocols (Authentication on RIP). 23:41 23:41
  • play icon Lecture-32:Securing Routing Protocols (Authentication on EIGRP & OSPF). 31:14 31:14
  • play icon Lecture-33:CDP, Risk, Reconnaissance and Flooding Attack. 13:45 13:45
  • play icon Lecture-34:Introduction DNS,DNS Spoofing,DNS Caching & DNSSEC. 22:24 22:24
  • play icon Lecture-35:Configure and Verify TFTP, FTP, SFTP and SCP. 22:47 22:47
  • play icon Lecture-36:Configure and Verify SNMP Version 2 and SNMP Version 3. 31:54 31:54
  • play icon Lecture-37:Configure and Verify Syslog (Logging) in Cisco Router. 31:16 31:16
  • play icon Lecture-38:Introduction & Concept of Network Time Protocol (NTP). 12:14 12:14
  • play icon Lecture-39:Configure and Verify Network Time Protocol and Security. 55:11 55:11
  • play icon Lecture-40:Introduction and Concept of Cryptography & Terminologies. 15:02 15:02
  • play icon Lecture-41:Introduction & Concept of Symmetric & Asymmetric Encryption. 18:13 18:13
  • play icon Lecture-42:Introduction and Concept of Cryptography Hash (SHA, MD5). 15:43 15:43
  • play icon Lecture-43:Introduction and Concept of Virtual Private Network VPN. 18:59 18:59
  • play icon Lecture-44:Introduction and Concept of IPSec Protocols Features. 18:02 18:02
  • play icon Lecture-45:Introduction and Concept of Diffie-Hellman (DH). 19:22 19:22
  • play icon Lecture-46:Introduction and Concept of SSL/TLS and Handshake. 21:24 21:24
  • play icon Lecture-47:Introduction and Concept of IKE, Versions & Modes. 20:56 20:56
  • play icon Lecture-48:Internet Key Exchange IKE Phase 1 two Modes Lab. 12:23 12:23
  • play icon Lecture-49:Configure and Verify Site to Site IPSec VPN Routers. 51:55 51:55
  • play icon Lecture-50:Troubleshoot Site to Site IPSec VPN on Cisco Routers. 48:05 48:05
  • play icon Lecture-51:VPN ISAKMP Policy,Encryption Domain,Crypto Maps. 10:49 10:49
  • play icon Lecture-52:Configure and Verify NAT-T (Traversal) on Routers. 25:59 25:59
  • play icon Lecture-53:Concept of Dynamic Multi-point Virtual Private Network. 29:01 29:01
  • play icon Lecture-54:Configure and Verify Dynamic Multipoint VPN Phase-1 Lab. 27:33 27:33
  • play icon Lecture-55:Configure and Verify Client-Based Remote-Access VPN Lab. 27:57 27:57
  • play icon Lecture-56:Introduction & Concept of FlexVPN (Virtual Private Network). 15:43 15:43
  • play icon Lecture-57:FlexVPN Flexible Virutal Private Network SVTI Lab. 18:02 18:02
  • play icon Lecture-58:Site-to-Site & Remote VNP High Availability Considerations. 07:28 07:28
  • play icon Lecture-59:PKI (Public Key Infrastructure) Theory and Lab. 20:43 20:43
  • play icon Lecture-60:Introduction to Firewall Technologies and Types. 20:39 20:39
  • play icon Lecture-61:Introduction to Cisco ASA Firewall,Features & Services. 07:51 07:51
  • play icon Lecture-62:Install Cisco ASA Clustering Enable Firewall in GNS3. 10:24 10:24
  • play icon Lecture-63:Install Cisco ASA Clustering Enable Firewall in EVE NG. 10:01 10:01
  • play icon Lecture-64:Cisco ASA Firewall Basic Commands and Configuration. 49:52 49:52
  • play icon Lecture-65:Device Management In Cisco ASA Firewall Console. 10:03 10:03
  • play icon Lecture-66:Device Management In Cisco ASA Firewall SSH. 20:46 20:46
  • play icon Lecture-67:Device Management In Cisco ASA Firewall ASDM. 31:29 31:29
  • play icon Lecture-68:Device Management In Cisco ASA Firewall TFTP. 20:47 20:47
  • play icon Lecture-69:Device Management In Cisco ASA Firewall FTP. 11:12 11:12
  • play icon Lecture-70:Security Levels and Zoning in Cisco ASA Firewall. 40:17 40:17
  • play icon Lecture-71:Implement Access Control Lists in Cisco ASA Firewall. 35:59 35:59
  • play icon Lecture-72:Configure and Verify Extended ACLs in Cisco ASA Firewall. 01:22:34 01:22:34
  • play icon Lecture-73:Configure and Verify Infrastructure ACLs in Cisco ASA. 18:16 18:16
  • play icon Lecture-74:Configure and Verify Time-Based ACLs in Cisco ASA Firewall. 21:58 21:58
  • play icon Lecture-75:Configure and Verify Standard ACLs in Cisco ASA Firewall. 32:34 32:34
  • play icon Lecture-76:Configure and Verify Object Groups ACLs in Cisco ASA Firewall. 41:49 41:49
  • play icon Lecture-77:Introduction and Theory of NAT and PAT in Cisco ASA Firewall. 22:48 22:48
  • play icon Lecture-78:Creating Lab Topology for NAT and PAT for Cisco ASA Firewall. 24:32 24:32
  • play icon Lecture-79:Configure and Verify Static NAT in Cisco ASA Firewall. 34:55 34:55
  • play icon Lecture-80:Configure and Verify Static PAT in Cisco ASA Firewall. 24:31 24:31
  • play icon Lecture-81:Configure and Verify Dynamic NAT in Cisco ASA Firewall. 26:21 26:21
  • play icon Lecture-82:Configure and Verify Dynamic PAT in Cisco ASA Firewall. 16:02 16:02
  • play icon Lecture-83:Configure and Verify Identity NAT in Cisco ASA Firewall. 22:59 22:59
  • play icon Lecture-84:Configure and Verify Policy NAT in Cisco ASA Firewall. 16:16 16:16
  • play icon Lecture-85:Configure and Verify Transparent Firewall Cisco ASA Firewall. 33:59 33:59
  • play icon Lecture-86:Introduction and Concept of Cisco Firepower (FTD and FMC). 13:33 13:33
  • play icon Lecture-87:Install and Add Cisco FTD 6.2.3-83 on EVE-NG. 08:33 08:33
  • play icon Lecture-88:Install and Add Cisco FMC 6.2.3-83 on EVE-NG. 06:00 06:00
  • play icon Lecture-89:Firepower Thread Defense FTD First Time Configuration. 16:13 16:13
  • play icon Lecture-90:How to Configure and Add Manager in Cisco FTD. 02:48 02:48
  • play icon Lecture-91:Firepower Management Center FMC First Time Configuration. 05:46 05:46
  • play icon Lecture-92:Firepower Management Center FMC First Time Login Setup. 04:16 04:16
  • play icon Lecture-93:Enable Evaluation Smart Licenses in Cisco FMC. 01:16 01:16
  • play icon Lecture-94:How Integrate Cisco FTD Firewall with Cisco FMC. 06:28 06:28

Instructor Details

Ahmad Ali

Ahmad Ali

e


Course Certificate

Use your certificate to make a career change or to advance in your current career.

sample Tutorialspoint certificate

Our students work
with the Best

Feedbacks

A

Ahmed Elsaied

e

Super Course

C

chungbv

e

Can you send me the ettercapt document?

Related Video Courses

View More

Annual Membership

Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses

Subscribe now
Annual Membership

Online Certifications

Master prominent technologies at full length and become a valued certified professional.

Explore Now
Online Certifications

Talk to us

1800-202-0515