Super Course
CCNP,CCIE Security SCOR (350-701) Training Part-1/2
Implementing and Operating Cisco Security Core Technologies (SCOR 350-701) with Step by Step Lab Workbook
Network & Security,CCNP Security
Lectures -94
Duration -33.5 hours
30-days Money-Back Guarantee
Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.
Course Description
Security Concepts, Explain common threats against on-premises and cloud environments, Configure and verify network infrastructure security methods, Configure AAA for device and network access, Configure secure network management of perimeter security, Configure and verify site-to-site VPN and remote access VPN , Describe identity management and secure network access, Network security solutions that provide intrusion prevention and firewall, Network Security, Securing the Cloud, Content Security, Endpoint Protection and Detection , Secure Network Access, Visibility, and Enforcement, Secure network access, SDN and Network Automation Concepts, Describe the components, capabilities, and benefits of Cisco Umbrella, Endpoint Protection and Detection, Secure Network Access, Visibility, and Enforcement, Describe the benefits of network telemetry, Implement traffic redirection and capture methods, Describe the concept of DevSecOps, Identify security solutions for cloud environments, Compare the customer vs. provider security responsibility, Configure AAA for device and network access, Implement segmentation, access control policies, AVC, Explain North Bound and South Bound APIs in the SDN architecture, Describe security intelligence authoring, sharing, and consumption, Describe security intelligence authoring, sharing, and consumption, Interpret basic Python scripts used to call Cisco Security appliances APIs, Cloud service models: SaaS, PaaS, IaaS, Security assessment in the cloud, Patch management in the cloud, Describe the benefits of device compliance and application control
Who this course is for:
- Course has been designed for anyone who wants to start learning Security
- This course is for students trying to obtain the CCNP and CCIE SCOR
- This course is for students trying to learn the CCNP Security
- Any Network or Security Engineer want to learn or polish their Skills.
Goals
What will you learn in this course:
Compare common security vulnerabilities
Describe functions of the cryptography components
Compare site-to-site VPN and remote access VPN deployment types
Compare network security solutions that provide intrusion prevention
Configure and verify network infrastructure security methods
Device hardening of network infrastructure security devices
Implement segmentation, access control policies, AVC, URL filtering
Implement management options for network security solutions
Configure and verify site-to-site VPN and remote access VPN
Describe identity management and secure network access
common threats against on-premises and cloud environments
Prerequisites
What are the prerequisites for this course?
Basic IP and security knowledge is nice to have.
Students need to understand basic networking.
CCNA routing and Switching Knowledge
Students needs to understand Networking Fundamentals.
Curriculum
Check out the detailed breakdown of what’s inside the course
CCNP, CCIE Security 350-701
94 Lectures
- Lecture-01:Introduction to CCNP Security SCOR. 07:15 07:15
- Lecture-02:Confidentiality,Integrity & Availability. 16:12 16:12
- Lecture-03:Common Network Security Terms Asset etc. 15:04 15:04
- Lecture-04:On-Premises, Cloud and Malware Theory. 29:00 29:00
- Lecture-05:SQL Database Injection Attack Theory and Lab. 12:53 12:53
- Lecture-06:Cross Site Scripting Attack Theory and Lab. 07:45 07:45
- Lecture-07:Phishing Social Engineer Engineering Attack Lab. 11:06 11:06
- Lecture-08:Man-In-The-Middle Attack Theory and Lab. 24:02 24:02
- Lecture-09:Denial Of Service (DoS) Attack Theory and Lab. 23:52 23:52
- Lecture-10:Path Traversal Attack Theory and Lab. 06:24 06:24
- Lecture-11:Buffer Overflow Attack Theory and Lab. 04:16 04:16
- Lecture-12:Common Vulnerability Terms Theory. 07:51 07:51
- Lecture-13:VLAN (Virtual Local Area Network) Theory. 23:52 23:52
- Lecture-14:Layer 2 Attacks (DHCP Snooping) Theory & Lab. 35:20 35:20
- Lecture-15:ARP (Address Resolution Protocol) Theory. 06:07 06:07
- Lecture-16:ARP Poisoning or ARP Spoofing Attack Lab. 27:24 27:24
- Lecture-17:MAC (Media Access Control Address) Theory. 06:20 06:20
- Lecture-18:MAC (Media Access Control Address) Flooding Attack. 04:19 04:19
- Lecture-19:Configure and Verify Port Security Theory & Lab. 46:45 46:45
- Lecture-20:STP (Spanning Tree Protocols) Theory. 12:23 12:23
- Lecture-21:STP Spanning Tree Protocols Attacks Labs. 17:07 17:07
- Lecture-22:VLAN (Virtual Local Area Network) Hopping Attack Lab. 20:33 20:33
- Lecture-23:Configure and Verify Storm Control Theory & Lab. 19:58 19:58
- Lecture-24:Configure and Verify Private VLAN Theory & Lab. 30:12 30:12
- Lecture-25:Configure and Verify VRF Lite Theory & Lab. 33:09 33:09
- Lecture-26:Configure and Verify Management Plane Theory & Lab Part-1 54:41 54:41
- Lecture-27:Configure and Verify Management Plane Theory & Lab Part-2 45:51 45:51
- Lecture-28:Configure and Verify Control Plane Theory & Lab 28:45 28:45
- Lecture-29:Introduction to Layer 2 and Layer 3 Data Plane. 03:22 03:22
- Lecture-30:Introduction and Compare In-Band and Out-of-Band. 07:50 07:50
- Lecture-31:Securing Routing Protocols (Authentication on RIP). 23:41 23:41
- Lecture-32:Securing Routing Protocols (Authentication on EIGRP & OSPF). 31:14 31:14
- Lecture-33:CDP, Risk, Reconnaissance and Flooding Attack. 13:45 13:45
- Lecture-34:Introduction DNS,DNS Spoofing,DNS Caching & DNSSEC. 22:24 22:24
- Lecture-35:Configure and Verify TFTP, FTP, SFTP and SCP. 22:47 22:47
- Lecture-36:Configure and Verify SNMP Version 2 and SNMP Version 3. 31:54 31:54
- Lecture-37:Configure and Verify Syslog (Logging) in Cisco Router. 31:16 31:16
- Lecture-38:Introduction & Concept of Network Time Protocol (NTP). 12:14 12:14
- Lecture-39:Configure and Verify Network Time Protocol and Security. 55:11 55:11
- Lecture-40:Introduction and Concept of Cryptography & Terminologies. 15:02 15:02
- Lecture-41:Introduction & Concept of Symmetric & Asymmetric Encryption. 18:13 18:13
- Lecture-42:Introduction and Concept of Cryptography Hash (SHA, MD5). 15:43 15:43
- Lecture-43:Introduction and Concept of Virtual Private Network VPN. 18:59 18:59
- Lecture-44:Introduction and Concept of IPSec Protocols Features. 18:02 18:02
- Lecture-45:Introduction and Concept of Diffie-Hellman (DH). 19:22 19:22
- Lecture-46:Introduction and Concept of SSL/TLS and Handshake. 21:24 21:24
- Lecture-47:Introduction and Concept of IKE, Versions & Modes. 20:56 20:56
- Lecture-48:Internet Key Exchange IKE Phase 1 two Modes Lab. 12:23 12:23
- Lecture-49:Configure and Verify Site to Site IPSec VPN Routers. 51:55 51:55
- Lecture-50:Troubleshoot Site to Site IPSec VPN on Cisco Routers. 48:05 48:05
- Lecture-51:VPN ISAKMP Policy,Encryption Domain,Crypto Maps. 10:49 10:49
- Lecture-52:Configure and Verify NAT-T (Traversal) on Routers. 25:59 25:59
- Lecture-53:Concept of Dynamic Multi-point Virtual Private Network. 29:01 29:01
- Lecture-54:Configure and Verify Dynamic Multipoint VPN Phase-1 Lab. 27:33 27:33
- Lecture-55:Configure and Verify Client-Based Remote-Access VPN Lab. 27:57 27:57
- Lecture-56:Introduction & Concept of FlexVPN (Virtual Private Network). 15:43 15:43
- Lecture-57:FlexVPN Flexible Virutal Private Network SVTI Lab. 18:02 18:02
- Lecture-58:Site-to-Site & Remote VNP High Availability Considerations. 07:28 07:28
- Lecture-59:PKI (Public Key Infrastructure) Theory and Lab. 20:43 20:43
- Lecture-60:Introduction to Firewall Technologies and Types. 20:39 20:39
- Lecture-61:Introduction to Cisco ASA Firewall,Features & Services. 07:51 07:51
- Lecture-62:Install Cisco ASA Clustering Enable Firewall in GNS3. 10:24 10:24
- Lecture-63:Install Cisco ASA Clustering Enable Firewall in EVE NG. 10:01 10:01
- Lecture-64:Cisco ASA Firewall Basic Commands and Configuration. 49:52 49:52
- Lecture-65:Device Management In Cisco ASA Firewall Console. 10:03 10:03
- Lecture-66:Device Management In Cisco ASA Firewall SSH. 20:46 20:46
- Lecture-67:Device Management In Cisco ASA Firewall ASDM. 31:29 31:29
- Lecture-68:Device Management In Cisco ASA Firewall TFTP. 20:47 20:47
- Lecture-69:Device Management In Cisco ASA Firewall FTP. 11:12 11:12
- Lecture-70:Security Levels and Zoning in Cisco ASA Firewall. 40:17 40:17
- Lecture-71:Implement Access Control Lists in Cisco ASA Firewall. 35:59 35:59
- Lecture-72:Configure and Verify Extended ACLs in Cisco ASA Firewall. 01:22:34 01:22:34
- Lecture-73:Configure and Verify Infrastructure ACLs in Cisco ASA. 18:16 18:16
- Lecture-74:Configure and Verify Time-Based ACLs in Cisco ASA Firewall. 21:58 21:58
- Lecture-75:Configure and Verify Standard ACLs in Cisco ASA Firewall. 32:34 32:34
- Lecture-76:Configure and Verify Object Groups ACLs in Cisco ASA Firewall. 41:49 41:49
- Lecture-77:Introduction and Theory of NAT and PAT in Cisco ASA Firewall. 22:48 22:48
- Lecture-78:Creating Lab Topology for NAT and PAT for Cisco ASA Firewall. 24:32 24:32
- Lecture-79:Configure and Verify Static NAT in Cisco ASA Firewall. 34:55 34:55
- Lecture-80:Configure and Verify Static PAT in Cisco ASA Firewall. 24:31 24:31
- Lecture-81:Configure and Verify Dynamic NAT in Cisco ASA Firewall. 26:21 26:21
- Lecture-82:Configure and Verify Dynamic PAT in Cisco ASA Firewall. 16:02 16:02
- Lecture-83:Configure and Verify Identity NAT in Cisco ASA Firewall. 22:59 22:59
- Lecture-84:Configure and Verify Policy NAT in Cisco ASA Firewall. 16:16 16:16
- Lecture-85:Configure and Verify Transparent Firewall Cisco ASA Firewall. 33:59 33:59
- Lecture-86:Introduction and Concept of Cisco Firepower (FTD and FMC). 13:33 13:33
- Lecture-87:Install and Add Cisco FTD 6.2.3-83 on EVE-NG. 08:33 08:33
- Lecture-88:Install and Add Cisco FMC 6.2.3-83 on EVE-NG. 06:00 06:00
- Lecture-89:Firepower Thread Defense FTD First Time Configuration. 16:13 16:13
- Lecture-90:How to Configure and Add Manager in Cisco FTD. 02:48 02:48
- Lecture-91:Firepower Management Center FMC First Time Configuration. 05:46 05:46
- Lecture-92:Firepower Management Center FMC First Time Login Setup. 04:16 04:16
- Lecture-93:Enable Evaluation Smart Licenses in Cisco FMC. 01:16 01:16
- Lecture-94:How Integrate Cisco FTD Firewall with Cisco FMC. 06:28 06:28
Instructor Details
Ahmad Ali
eCourse Certificate
Use your certificate to make a career change or to advance in your current career.
Our students work
with the Best
Feedbacks
Can you send me the ettercapt document?
Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe nowOnline Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now