CCNP,CCIE Security SCOR (350-701) Training Part-2/2

person icon Ahmad Ali

CCNP,CCIE Security SCOR (350-701) Training Part-2/2

Implementing and Operating Cisco Security Core Technologies (SCOR 350-701) with Step by Step Lab Workbook

updated on icon Updated on Sep, 2023

language icon Language - English

person icon Ahmad Ali

architecture icon IT & Software,Network & Security,CCNP Security


30-days Money-Back Guarantee

Training 5 or more people ?

Get your team access to 19,000+ top Tutorialspoint courses anytime, anywhere.

Course Description

Security Concepts, Explain common threats against on-premises and cloud environments, Configure and verify network infrastructure security methods, Configure AAA for device and network access, Configure secure network management of perimeter security, Configure and verify site-to-site VPN and remote access VPN , Describe identity management and secure network access, Network security solutions that provide intrusion prevention and firewall, Network Security, Securing the Cloud, Content Security, Endpoint Protection and Detection , Secure Network Access, Visibility, and Enforcement, Secure network access, SDN and Network Automation Concepts, Describe the components, capabilities, and benefits of Cisco Umbrella, Endpoint Protection and Detection, Secure Network Access, Visibility, and Enforcement, Describe the benefits of network telemetry, Implement traffic redirection and capture methods, Describe the concept of DevSecOps, Identify security solutions for cloud environments, Compare the customer vs. provider security responsibility, Configure AAA for device and network access, Implement segmentation, access control policies, AVC, Explain North Bound and South Bound APIs in the SDN architecture, Describe security intelligence authoring, sharing, and consumption, Describe security intelligence authoring, sharing, and consumption, Interpret basic Python scripts used to call Cisco Security appliances APIs, Cloud service models: SaaS, PaaS, IaaS, Security assessment in the cloud, Patch management in the cloud, Describe the benefits of device compliance and application control

Who this course is for:

  • Course has been designed for anyone who wants to start learning Security
  • This course is for students trying to obtain the CCNP and CCIE SCOR
  • This course is for students trying to learn the CCNP Security
  • Any Network or Security Engineer want to learn or polish their Skills.

CCNP,CCIE Security SCOR (350-701) Training Part-2/2


Check out the detailed breakdown of what’s inside the course

CCNP, CCIE Security 350-701
91 Lectures
  • play icon Lecture-95:Configure Initial Working Lab Cisco FTD and Cisco FMC. 38:09 38:09
  • play icon Lecture-96:Configure and Verify Access Control Policies. 13:51 13:51
  • play icon Lecture-97:Configure and Verify Pre-Filter Policy in FTD. 12:55 12:55
  • play icon Lecture-98:Configure and Verify Intrusion Policy in FTD. 10:17 10:17
  • play icon Lecture-99:Configure and Verify SSL Policy in Cisco FTD. 16:45 16:45
  • play icon Lecture-100:Configure and Verify Malware & File Policy in FTD. 03:45 03:45
  • play icon Lecture-101:Configure and Verify DNS Policy in Cisco FTD. 08:11 08:11
  • play icon Lecture-102:Introduction and Concept of Security Intelligence in FTD. 06:39 06:39
  • play icon Lecture-103:Introduction and Concept of IPS and Deployment Modes. 14:37 14:37
  • play icon Lecture-104:Install and Add Cisco NGIPS 6.2.3-83 on EVE-NG Lab. 07:24 07:24
  • play icon Lecture-105:Cisco Firepower NGIPS First Time Configuration Lab. 09:23 09:23
  • play icon Lecture-106:Basic Terminologies Proxy,Forward and Reverse Proxy etc. 13:41 13:41
  • play icon Lecture-107:Introduction to Cisco Ironport WSA, Need and Features. 09:17 09:17
  • play icon Lecture-108:Introduction to Cisco Ironport WSA Deployment Modes. 07:36 07:36
  • play icon Lecture-109:Install Cisco Ironport WSA Version 10 on EVE NG Lab. 08:56 08:56
  • play icon Lecture-110:Configure Basic Topology for Cisco WSA in EVE NG Lab. 21:46 21:46
  • play icon Lecture-111:Cisco Ironport WSA First Time CLI Configuration Lab. 08:24 08:24
  • play icon Lecture-112:Configure License Cisco Ironport WSA Version 10 Lab. 08:19 08:19
  • play icon Lecture-113:Cisco WSA First Time Configuration Setup Wizard Lab. 05:26 05:26
  • play icon Lecture-114:Traffic Redirection Explicit Mode Cisco Ironport WSA. 16:08 16:08
  • play icon Lecture-115:Access Policies & Identification Profile in Cisco WSA. 17:57 17:57
  • play icon Lecture-116:Configure and Verify Custom URL Category Cisco in WSA. 07:21 07:21
  • play icon Lecture-117:Application Visibility, Objects & Anti-Malware Policies. 18:46 18:46
  • play icon Lecture-118:Traffic Redirection Transparent Mode Cisco Ironport WSA. 26:28 26:28
  • play icon Lecture-119:Introduction to Cisco Ironport ESA Features and Functions. 13:20 13:20
  • play icon Lecture-120:Basic Terminologies of Cisco Ironport ESA and EMail. 12:32 12:32
  • play icon Lecture-121:Install Cisco Ironport ESA Version 10 on EVE NG. 05:06 05:06
  • play icon Lecture-122:Configure Basic Topology for Cisco ESA in EVE NG. 09:44 09:44
  • play icon Lecture-123:Cisco Ironport ESA First Time CLI Configuration Lab. 05:42 05:42
  • play icon Lecture-124:Configure License Cisco Ironport ESA Version 10 Lab. 03:01 03:01
  • play icon Lecture-125:Cisco ESA First Time Configuration Setup Wizard Lab. 05:19 05:19
  • play icon Lecture-126:Windows DNS Server Installation and Configuration Lab. 12:54 12:54
  • play icon Lecture-127:Install, Setup and Configure hMailServer Email Server. 11:58 11:58
  • play icon Lecture-128:Install, Setup and Configure Thunderbird Email Client. 18:43 18:43
  • play icon Lecture-129:Cisco ESA Incoming Content Filters & Email Policies Lab. 31:29 31:29
  • play icon Lecture-130:Cisco ESA Outgoing Content Filters & Email Policies Lab. 10:57 10:57
  • play icon Lecture-131:Introduction and Concept of OpenDNS and Cisco Umbrella. 18:57 18:57
  • play icon Lecture-132:Introduction and Concept of Endpoint EPP and EDR. 06:18 06:18
  • play icon Lecture-133:Introduction and Concept of Multifactor Authentication. 05:20 05:20
  • play icon Lecture-134:Introduction and Concept of Mobile Device Management MDM. 05:34 05:34
  • play icon Lecture-135:Role of The Endpoint Protection from Phishing Attacks. 05:34 05:34
  • play icon Lecture-136:Introduction & Concept of Advanced Malware Protection. 19:53 19:53
  • play icon Lecture-137:Introduction and Concept of Endpoint Patching Strategy. 04:52 04:52
  • play icon Lecture-138:Interpret Basic Python Scripts Network Automation Lab. 28:26 28:26
  • play icon Lecture-139:Introduction to Application Programming Interface API. 06:44 06:44
  • play icon Lecture-140:NETCONF Application Programming Interface Theory & Lab. 29:17 29:17
  • play icon Lecture-141:RESTCONF Application Programming Interface Theory & Lab. 12:06 12:06
  • play icon Lecture-142:Introduction and Concept of Software Defined Networking. 15:08 15:08
  • play icon Lecture-143:Introduction to North Bound API and South Bound API. 04:46 04:46
  • play icon Lecture-144:Introduction & Concept of Cisco DNA Center (Cisco DNAC). 14:25 14:25
  • play icon Lecture-145:Introduction to Cloud and Different Types of Cloud. 23:26 23:26
  • play icon Lecture-146:Introduction and Concept of Cloud Service Models. 13:17 13:17
  • play icon Lecture-147:Introduction and Concept of Cloud Patch Management. 07:36 07:36
  • play icon Lecture-148:Introduction to Security Assessment in the Cloud. 04:54 04:54
  • play icon Lecture-149:Introduction to Cloud Access Security Brokder (CASB). 05:24 05:24
  • play icon Lecture-150:Introduction and Concept of DevOps and DevSecOps. 14:33 14:33
  • play icon Lecture-151:Introduction and Concept of CI/CD Pipeline in DevOps. 09:30 09:30
  • play icon Lecture-152:Concept of Docker, Container & Container Orchestration. 15:31 15:31
  • play icon Lecture-153:Cloud Logging and Monitoring Secure Cloud Analytics. 06:55 06:55
  • play icon Lecture-154:Introduction to Cisco Identity Services Engine (ISE). 16:30 16:30
  • play icon Lecture-155:Install and Configure Cisco ISE on VMware Workstation. 17:56 17:56
  • play icon Lecture-156:Add, Install and Configure Cisco ISE on EVE-NG. 17:18 17:18
  • play icon Lecture-157:Cisco Identity Services Engine (ISE) CLI Commands. 08:03 08:03
  • play icon Lecture-158:Cisco Identity Services Engine Dashboard Walkthrough. 15:09 15:09
  • play icon Lecture-159:Cisco Identity Services Engine Basic Terminologies. 09:46 09:46
  • play icon Lecture-160:Cisco Identity Services Engine Three Persona Theory. 12:41 12:41
  • play icon Lecture-161:Cisco Identity Services Engine Deployment Options. 13:38 13:38
  • play icon Lecture-162:Introduction to Device Administration & Network Access. 11:05 11:05
  • play icon Lecture-163:Introduction, Theory and Concept of AAA Server. 14:59 14:59
  • play icon Lecture-164:Introduction to AAA Options TACACS+ and RADIUS Protocols. 06:40 06:40
  • play icon Lecture-165:Introduction and Concept of 802.1X (Dot1x) & Components. 13:53 13:53
  • play icon Lecture-166:Introduction to 802.1X (Dot1x) Port States and Host Modes. 11:27 11:27
  • play icon Lecture-167:Configure and Verify AAA 802.1X (Dot1x) Lab. 36:14 36:14
  • play icon Lecture-168:Introduction to Media Access Control Authentication Bypass. 07:03 07:03
  • play icon Lecture-169:Configure Media Access Control Authentication Bypass Lab. 21:26 21:26
  • play icon Lecture-170:Introduction and Concept of Downloadable ACL (DACL). 05:36 05:36
  • play icon Lecture-171:Configure and Verify Downloadable ACL (DACL) Lab. 27:01 27:01
  • play icon Lecture-172:Introduction and Concept of Dynamic VLAN (DVLAN). 04:04 04:04
  • play icon Lecture-173:Configure and Verify Dynamic VLAN (DVLAN) Lab. 11:16 11:16
  • play icon Lecture-174:Introduction to Central Web Authentication (CWA). 07:00 07:00
  • play icon Lecture-175:Configure and Verify Central Web Authentication Lab. 42:22 42:22
  • play icon Lecture-176:Configure and Verify Device Administration Lab. 41:19 41:19
  • play icon Lecture-177:Introduction and Concept of Guest Services in ISE. 26:57 26:57
  • play icon Lecture-178:Introduction and Concept of BYOD in Cisco ISE. 08:07 08:07
  • play icon Lecture-179:Introduction and Concept of Change of Authorization CoA. 09:38 09:38
  • play icon Lecture-180:Introduction to Profiling, Profiler Services & Probes. 27:16 27:16
  • play icon Lecture-181:Configure and Verify Profiling using ISE Probes Lab. 29:33 29:33
  • play icon Lecture-182:Introduction and Concept of Posture in Cisco ISE. 05:07 05:07
  • play icon Lecture-183:Introduction to Endpoint Compliance in Cisco ISE. 13:00 13:00
  • play icon Lecture-184:Introduction and Concept of Network Telemetry. 08:14 08:14
  • play icon Lecture-185:Introduction and Concept of Data Ex-filtration. 14:46 14:46

Instructor Details

Ahmad Ali

Ahmad Ali

Cyber Security Consultant & Cisco Certified Instructor

I am Cyber Security Consultant and Cisco Certified Trainer with several years of experience. Teaching part time for more than 10 years’ providing classroom, on-site and online training on various network, security topics and Certifications like CCNA R&S,  CCNA, CCNA Security, CCNP R&S, CCNP Security, VPN, Firewalls etc. My utmost desire as an instructor is to bring my field experience into classroom in order to give my students' a feel of real-world hands-on.


CCIE Routing and Switching

Cisco Certified Specialist - Web Content Security Certificate

Cisco Certified Specialist - Security Identity Management Implementation Certificate

Cisco Certified Specialist - Security Core Certificate

Cisco Certified Specialist - Network Security VPN Implementation

Cisco Certified Specialist - Network Security Firepower Certificate

Cisco Certified Specialist - Enterprise Core Certificate

Cisco Certified Specialist - Enterprise Advanced Infrastructure Implementation Certificate

Cisco Certified Network Professional CCNP (Routing & Switching)

Cisco Certified Network Associate CCNA (Routing & Switching)

Cisco Certified Network Professional CCNP (Security)

Cisco Certified Network Associate CCNA (Security)

Cisco Certified Academy Instructor CCAI

Microsoft Certified Solutions Associate MCSA Server 2012

Microsoft Certified Solutions Associate MCSA Server 2008

Microsoft Certified IT Professional MCITP Server 2008

Microsoft Certified Technology Specialist MCTS Windows 7

Microsoft Certified Technology Specialist MCTS  2008

Microsoft Technology Associate MTA

EC-Council Certified Secure Computer User CSCU

Palo Alto Networks Certified Network Security Engineer (PCNSE)

Palo Alto Accredited Configuration Engineer (ACE)

EC-Council Certified, Certified Ethical Hacker (CEH)

Fortinet NSE1, NSE2, NSE3 , NSE4 and NSE7

F5 Certified BIG-IP Administrator

Course Certificate

User your certification to make a career change or to advance in your current career. Salaries are among the highest in the world.

sample Tutorialspoint certificate

Our students work
with the Best


Related Video Courses

View More

Annual Membership

Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses

Subscribe now
People having fun around a laptop

Online Certifications

Master prominent technologies at full length and become a valued certified professional.

Explore Now
People having fun around a laptop

Talk to us