Super Course
CCNP,CCIE Security SCOR (350-701) Training Part-1/2
Implementing and Operating Cisco Security Core Technologies (SCOR 350-701) with Step by Step Lab Workbook
Course Description
Security Concepts, Explain common threats against on-premises and cloud environments, Configure and verify network infrastructure security methods, Configure AAA for device and network access, Configure secure network management of perimeter security, Configure and verify site-to-site VPN and remote access VPN , Describe identity management and secure network access, Network security solutions that provide intrusion prevention and firewall, Network Security, Securing the Cloud, Content Security, Endpoint Protection and Detection , Secure Network Access, Visibility, and Enforcement, Secure network access, SDN and Network Automation Concepts, Describe the components, capabilities, and benefits of Cisco Umbrella, Endpoint Protection and Detection, Secure Network Access, Visibility, and Enforcement, Describe the benefits of network telemetry, Implement traffic redirection and capture methods, Describe the concept of DevSecOps, Identify security solutions for cloud environments, Compare the customer vs. provider security responsibility, Configure AAA for device and network access, Implement segmentation, access control policies, AVC, Explain North Bound and South Bound APIs in the SDN architecture, Describe security intelligence authoring, sharing, and consumption, Describe security intelligence authoring, sharing, and consumption, Interpret basic Python scripts used to call Cisco Security appliances APIs, Cloud service models: SaaS, PaaS, IaaS, Security assessment in the cloud, Patch management in the cloud, Describe the benefits of device compliance and application control
Who this course is for:
- Course has been designed for anyone who wants to start learning Security
- This course is for students trying to obtain the CCNP and CCIE SCOR
- This course is for students trying to learn the CCNP Security
- Any Network or Security Engineer want to learn or polish their Skills.
Goals
What will you learn in this course:
Compare common security vulnerabilities
Describe functions of the cryptography components
Compare site-to-site VPN and remote access VPN deployment types
Compare network security solutions that provide intrusion prevention
Configure and verify network infrastructure security methods
Device hardening of network infrastructure security devices
Implement segmentation, access control policies, AVC, URL filtering
Implement management options for network security solutions
Configure and verify site-to-site VPN and remote access VPN
Describe identity management and secure network access
common threats against on-premises and cloud environments
Prerequisites
What are the prerequisites for this course?
Basic IP and security knowledge is nice to have.
Students need to understand basic networking.
CCNA routing and Switching Knowledge
Students needs to understand Networking Fundamentals.

Curriculum
Check out the detailed breakdown of what’s inside the course
CCNP, CCIE Security 350-701
94 Lectures
-
Lecture-01:Introduction to CCNP Security SCOR. 07:15 07:15
-
Lecture-02:Confidentiality,Integrity & Availability. 16:12 16:12
-
Lecture-03:Common Network Security Terms Asset etc. 15:04 15:04
-
Lecture-04:On-Premises, Cloud and Malware Theory. 29:00 29:00
-
Lecture-05:SQL Database Injection Attack Theory and Lab. 12:53 12:53
-
Lecture-06:Cross Site Scripting Attack Theory and Lab. 07:45 07:45
-
Lecture-07:Phishing Social Engineer Engineering Attack Lab. 11:06 11:06
-
Lecture-08:Man-In-The-Middle Attack Theory and Lab. 24:02 24:02
-
Lecture-09:Denial Of Service (DoS) Attack Theory and Lab. 23:52 23:52
-
Lecture-10:Path Traversal Attack Theory and Lab. 06:24 06:24
-
Lecture-11:Buffer Overflow Attack Theory and Lab. 04:16 04:16
-
Lecture-12:Common Vulnerability Terms Theory. 07:51 07:51
-
Lecture-13:VLAN (Virtual Local Area Network) Theory. 23:52 23:52
-
Lecture-14:Layer 2 Attacks (DHCP Snooping) Theory & Lab. 35:20 35:20
-
Lecture-15:ARP (Address Resolution Protocol) Theory. 06:07 06:07
-
Lecture-16:ARP Poisoning or ARP Spoofing Attack Lab. 27:24 27:24
-
Lecture-17:MAC (Media Access Control Address) Theory. 06:20 06:20
-
Lecture-18:MAC (Media Access Control Address) Flooding Attack. 04:19 04:19
-
Lecture-19:Configure and Verify Port Security Theory & Lab. 46:45 46:45
-
Lecture-20:STP (Spanning Tree Protocols) Theory. 12:23 12:23
-
Lecture-21:STP Spanning Tree Protocols Attacks Labs. 17:07 17:07
-
Lecture-22:VLAN (Virtual Local Area Network) Hopping Attack Lab. 20:33 20:33
-
Lecture-23:Configure and Verify Storm Control Theory & Lab. 19:58 19:58
-
Lecture-24:Configure and Verify Private VLAN Theory & Lab. 30:12 30:12
-
Lecture-25:Configure and Verify VRF Lite Theory & Lab. 33:09 33:09
-
Lecture-26:Configure and Verify Management Plane Theory & Lab Part-1 54:41 54:41
-
Lecture-27:Configure and Verify Management Plane Theory & Lab Part-2 45:51 45:51
-
Lecture-28:Configure and Verify Control Plane Theory & Lab 28:45 28:45
-
Lecture-29:Introduction to Layer 2 and Layer 3 Data Plane. 03:22 03:22
-
Lecture-30:Introduction and Compare In-Band and Out-of-Band. 07:50 07:50
-
Lecture-31:Securing Routing Protocols (Authentication on RIP). 23:41 23:41
-
Lecture-32:Securing Routing Protocols (Authentication on EIGRP & OSPF). 31:14 31:14
-
Lecture-33:CDP, Risk, Reconnaissance and Flooding Attack. 13:45 13:45
-
Lecture-34:Introduction DNS,DNS Spoofing,DNS Caching & DNSSEC. 22:24 22:24
-
Lecture-35:Configure and Verify TFTP, FTP, SFTP and SCP. 22:47 22:47
-
Lecture-36:Configure and Verify SNMP Version 2 and SNMP Version 3. 31:54 31:54
-
Lecture-37:Configure and Verify Syslog (Logging) in Cisco Router. 31:16 31:16
-
Lecture-38:Introduction & Concept of Network Time Protocol (NTP). 12:14 12:14
-
Lecture-39:Configure and Verify Network Time Protocol and Security. 55:11 55:11
-
Lecture-40:Introduction and Concept of Cryptography & Terminologies. 15:02 15:02
-
Lecture-41:Introduction & Concept of Symmetric & Asymmetric Encryption. 18:13 18:13
-
Lecture-42:Introduction and Concept of Cryptography Hash (SHA, MD5). 15:43 15:43
-
Lecture-43:Introduction and Concept of Virtual Private Network VPN. 18:59 18:59
-
Lecture-44:Introduction and Concept of IPSec Protocols Features. 18:02 18:02
-
Lecture-45:Introduction and Concept of Diffie-Hellman (DH). 19:22 19:22
-
Lecture-46:Introduction and Concept of SSL/TLS and Handshake. 21:24 21:24
-
Lecture-47:Introduction and Concept of IKE, Versions & Modes. 20:56 20:56
-
Lecture-48:Internet Key Exchange IKE Phase 1 two Modes Lab. 12:23 12:23
-
Lecture-49:Configure and Verify Site to Site IPSec VPN Routers. 51:55 51:55
-
Lecture-50:Troubleshoot Site to Site IPSec VPN on Cisco Routers. 48:05 48:05
-
Lecture-51:VPN ISAKMP Policy,Encryption Domain,Crypto Maps. 10:49 10:49
-
Lecture-52:Configure and Verify NAT-T (Traversal) on Routers. 25:59 25:59
-
Lecture-53:Concept of Dynamic Multi-point Virtual Private Network. 29:01 29:01
-
Lecture-54:Configure and Verify Dynamic Multipoint VPN Phase-1 Lab. 27:33 27:33
-
Lecture-55:Configure and Verify Client-Based Remote-Access VPN Lab. 27:57 27:57
-
Lecture-56:Introduction & Concept of FlexVPN (Virtual Private Network). 15:43 15:43
-
Lecture-57:FlexVPN Flexible Virutal Private Network SVTI Lab. 18:02 18:02
-
Lecture-58:Site-to-Site & Remote VNP High Availability Considerations. 07:28 07:28
-
Lecture-59:PKI (Public Key Infrastructure) Theory and Lab. 20:43 20:43
-
Lecture-60:Introduction to Firewall Technologies and Types. 20:39 20:39
-
Lecture-61:Introduction to Cisco ASA Firewall,Features & Services. 07:51 07:51
-
Lecture-62:Install Cisco ASA Clustering Enable Firewall in GNS3. 10:24 10:24
-
Lecture-63:Install Cisco ASA Clustering Enable Firewall in EVE NG. 10:01 10:01
-
Lecture-64:Cisco ASA Firewall Basic Commands and Configuration. 49:52 49:52
-
Lecture-65:Device Management In Cisco ASA Firewall Console. 10:03 10:03
-
Lecture-66:Device Management In Cisco ASA Firewall SSH. 20:46 20:46
-
Lecture-67:Device Management In Cisco ASA Firewall ASDM. 31:29 31:29
-
Lecture-68:Device Management In Cisco ASA Firewall TFTP. 20:47 20:47
-
Lecture-69:Device Management In Cisco ASA Firewall FTP. 11:12 11:12
-
Lecture-70:Security Levels and Zoning in Cisco ASA Firewall. 40:17 40:17
-
Lecture-71:Implement Access Control Lists in Cisco ASA Firewall. 35:59 35:59
-
Lecture-72:Configure and Verify Extended ACLs in Cisco ASA Firewall. 01:22:34 01:22:34
-
Lecture-73:Configure and Verify Infrastructure ACLs in Cisco ASA. 18:16 18:16
-
Lecture-74:Configure and Verify Time-Based ACLs in Cisco ASA Firewall. 21:58 21:58
-
Lecture-75:Configure and Verify Standard ACLs in Cisco ASA Firewall. 32:34 32:34
-
Lecture-76:Configure and Verify Object Groups ACLs in Cisco ASA Firewall. 41:49 41:49
-
Lecture-77:Introduction and Theory of NAT and PAT in Cisco ASA Firewall. 22:48 22:48
-
Lecture-78:Creating Lab Topology for NAT and PAT for Cisco ASA Firewall. 24:32 24:32
-
Lecture-79:Configure and Verify Static NAT in Cisco ASA Firewall. 34:55 34:55
-
Lecture-80:Configure and Verify Static PAT in Cisco ASA Firewall. 24:31 24:31
-
Lecture-81:Configure and Verify Dynamic NAT in Cisco ASA Firewall. 26:21 26:21
-
Lecture-82:Configure and Verify Dynamic PAT in Cisco ASA Firewall. 16:02 16:02
-
Lecture-83:Configure and Verify Identity NAT in Cisco ASA Firewall. 22:59 22:59
-
Lecture-84:Configure and Verify Policy NAT in Cisco ASA Firewall. 16:16 16:16
-
Lecture-85:Configure and Verify Transparent Firewall Cisco ASA Firewall. 33:59 33:59
-
Lecture-86:Introduction and Concept of Cisco Firepower (FTD and FMC). 13:33 13:33
-
Lecture-87:Install and Add Cisco FTD 6.2.3-83 on EVE-NG. 08:33 08:33
-
Lecture-88:Install and Add Cisco FMC 6.2.3-83 on EVE-NG. 06:00 06:00
-
Lecture-89:Firepower Thread Defense FTD First Time Configuration. 16:13 16:13
-
Lecture-90:How to Configure and Add Manager in Cisco FTD. 02:48 02:48
-
Lecture-91:Firepower Management Center FMC First Time Configuration. 05:46 05:46
-
Lecture-92:Firepower Management Center FMC First Time Login Setup. 04:16 04:16
-
Lecture-93:Enable Evaluation Smart Licenses in Cisco FMC. 01:16 01:16
-
Lecture-94:How Integrate Cisco FTD Firewall with Cisco FMC. 06:28 06:28
Instructor Details

Ahmad Ali
Cyber Security Consultant & Cisco Certified InstructorI am Cyber Security Consultant and Cisco Certified Trainer with several years of experience. Teaching part time for more than 10 years’ providing classroom, on-site and online training on various network, security topics and Certifications like CCNA R&S, CCNA, CCNA Security, CCNP R&S, CCNP Security, VPN, Firewalls etc. My utmost desire as an instructor is to bring my field experience into classroom in order to give my students' a feel of real-world hands-on.
Certifications:
CCIE Routing and Switching
Cisco Certified Specialist - Web Content Security Certificate
Cisco Certified Specialist - Security Identity Management Implementation Certificate
Cisco Certified Specialist - Security Core Certificate
Cisco Certified Specialist - Network Security VPN Implementation
Cisco Certified Specialist - Network Security Firepower Certificate
Cisco Certified Specialist - Enterprise Core Certificate
Cisco Certified Specialist - Enterprise Advanced Infrastructure Implementation Certificate
Cisco Certified Network Professional CCNP (Routing & Switching)
Cisco Certified Network Associate CCNA (Routing & Switching)
Cisco Certified Network Professional CCNP (Security)
Cisco Certified Network Associate CCNA (Security)
Cisco Certified Academy Instructor CCAI
Microsoft Certified Solutions Associate MCSA Server 2012
Microsoft Certified Solutions Associate MCSA Server 2008
Microsoft Certified IT Professional MCITP Server 2008
Microsoft Certified Technology Specialist MCTS Windows 7
Microsoft Certified Technology Specialist MCTS 2008
Microsoft Technology Associate MTA
EC-Council Certified Secure Computer User CSCU
Palo Alto Networks Certified Network Security Engineer (PCNSE)
Palo Alto Accredited Configuration Engineer (ACE)
EC-Council Certified, Certified Ethical Hacker (CEH)
Fortinet NSE1, NSE2, NSE3 , NSE4 and NSE7
F5 Certified BIG-IP Administrator
Course Certificate
User your certification to make a career change or to advance in your current career. Salaries are among the highest in the world.

Our students work
with the Best


































Feedbacks
Can you send me the ettercapt document?
Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe now
Online Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now