Sale!

Cisco CCNP & CCIE Implementing and Operating Security Core Technologies 350-701

Original price was: $50.00.Current price is: $15.00.

Price: 15.00 USD | Size: 18.1 GB |  Duration : 33+  Hours  | 366 Video Lessons |  Bonus : 350-701 PDF Guides

BRAND:

ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️ 4.9

Description

Price: 15.00 USD | Size: 18.1 GB |  Duration : 33+  Hours  | 366 Video Lessons |  Bonus : 350-701 PDF Guides

BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️ 4.9

CCNP Security Core Online Training

This intermediate Cisco CCNP Security training covers the objectives in the 350-701 SCOR exam, which is the core exam for the CCNP Security certification.

Cisco’s 350-701 SCOR exam tests a broad skill set, including network, cloud, and content security; endpoint protection and detection; secure network access, visibility, and enforcement. Covering these core security technologies will provide you with the knowledge tested by the 350-701 SCOR.

The CCNP Security represents extreme familiarity with core security technologies — that’s why this training covers the essentials of implementing and operating core Cisco security technologies.

For anyone who manages their network — or the security of their network, this training is for you. This Cisco training can be also be used for 350-701 SCOR exam prep, onboarding new network engineers, individual or team training plans, or as a Cisco reference resource.

350-701 SCOR: What You Need to Know

For any network administrator using this training for exam preparation, our CCNP Security Core course maps to the Cisco 350-701 SCOR exam objectives, and covers topics such as:

  • Understanding information security concepts and strategies, including common attack vectors
  • Implementing access controls on Cisco appliances and security technologies
  • Implementing email content security features
  • Planning for the unique vulnerabilities VPNs can pose to network security
  • Locking down networks with Cisco-specific solutions like IOS, VTI VPNs and point-to-point IPsec VPNs

Who Should Take 350-701 SCOR Training?

This CCNP Security Core training is considered Professional-level Cisco training, which means it was designed for network administrators with three to five years of experience with advanced security practices.

New or aspiring network administrators. If you’re a new network administrator, getting the training for the CCNP Security Core exam will help ensure that your networks are secure. You don’t have to go on to take the exam, or even go for the certification, but instead you can learn the advanced procedures for locking down a network against breaches and hostile actors. There’s time for the certification later in your career, in the meantime, why not have a rock-solid and safe network?.

Experienced network administrators. If you’ve been working as a network administrator for a few years, you may be at a point in your career when you want to focus your expertise and choose a longer-term path. If network security interests you, this CCNP Security Core training can help you make wiser choices within your networks and very wise decisions about a career step toward network security.

 

 

Explain Common Threats Against On-premises and Cloud Environments
1. Introducing the Cybersecurity Landscape
1 min
2. Know Your Assets
6 mins
3. Know Your Vulnerabilities
4 mins
4. Know Your Threats
7 mins
5. Virus, Trojan, and Malware.. Oh my!
4 mins
6. Phishing and Social Engineering
5 mins
7. DDoS – Attacking Availability
4 mins
8. Spoofing and MitM Attacks
4 mins
9. Summarizing the Threat Landscape
1 min

Compare Common Security Vulnerabilities
1. Introducing Common Attack Vectors
1 min
2. Get to Know OWASP
5 mins
3. The SQL Injection’; SELECT * FROM table
10 mins
4. Cross-Site Scripting; var doCode{}
6 mins
5. Password Protection
7 mins
6. Plain-Text Protocols
6 mins
7. The Buffer Overflow
3 mins
8. Summarizing Common Vulnerabilities
1 min

Components of Cryptography
1. Introduction to Components of Cryptography
1 min
2. Data Integrity
6 mins
3. Data Privacy
4 mins
4. SSL and TLS
7 mins
5. Public Key Infrastructure (PKI)
4 mins
6. IPsec
3 mins
7. Authentication
5 mins
8. Components of Cryptography Summary
1 min

IPsec Fundamentals
1. Introduction to IPsec
1 min
2. IPsec Overview
5 mins
3. IKEv1 and IKEv2
7 mins
4. Crypto Map IPsec
4 mins
5. VTI IPsec
4 mins
6. DMVPNs
3 mins
7. FlexVPN
2 mins
8. GET VPN
3 mins
9. NAT Traversal
5 mins
10. IPsec Fundamentals Summary
1 min

Cisco Router Site-To-Site VPNs
1. Introducing Site-To-Site VPNs
1 min
2. Planning for IPsec Site-To-Site
8 mins
3. Designing a Site-To-Site VPN
4 mins
4. Configuring an IKE Phase 1 Policy
8 mins
5. Configuring an IKE Phase 2 (IPsec) Policy
11 mins
6. Enabling the IPsec Policy
11 mins
7. Protocol Analysis IPsec
5 mins

Cisco Point-To-Point GRE over IPsec VPNs
1. Introduction to P2P GRE over IPsec VPNs
1 min
2. Overview of GRE over IPsec VPNs
6 mins
3. P2P GRE Tunnel Design
2 mins
4. P2P GRE Tunnel Implementation
5 mins
5. P2P GRE Tunnel Verification
5 mins
6. IPsec Tunnel Protection Design
2 mins
7. IPsec Virtual Tunnel Interface Configuration
8 mins
8. IPsec Static VTI Verification
2 mins

Cisco DMVPN
1. Introduction to DMVPN
1 min
2. DMVPN Overview
3 mins
3. Planning for the mGRE Tunnel
2 mins
4. mGRE Tunnel Configuration
3 mins
5. NHRP Overview and Design
5 mins
6. Configuring NHRP for DMVPN
6 mins
7. Adding Routing to DMVPN
7 mins
8. Verifying DMVPNs
5 mins
9. Adding IPsec Protection Profiles
6 mins
10. DMVPN Summary
1 min

Cisco GET VPN
1. Introduction to GET VPN
1 min
2. GET VPN Overview
5 mins
3. GET VPN Key Servers (KS)
6 mins
4. GET VPN Members (GM)
5 mins
5. GET VPN Design
5 mins
6. Implementing KS Configuration
8 mins
7. Implementing GM Configuration
6 mins
8. GET VPN verification
8 mins
9. GET VPN Summary
1 min

Cisco FlexVPN
1. Introduction to FlexVPN
1 min
2. FlexVPN Overview
3 mins
3. FlexVPN Components
5 mins
4. IKEv2 Flex VPN Site-To-Site Planning
4 mins
5. IKEv2 FlexVPN Site-To-Site Configuration
5 mins
6. IKEv2 FlexVPN Verification
4 mins
7. Adding Routing to FlexVPN
4 mins
8. FlexVPN Summary
1 min

Cisco Remote Access VPNs
1. Introduction to RA VPNs
1 min
2. RA VPN Overview
4 mins
3. FlexVPN IPsec RA VPNs
5 mins
4. FlexVPN RA Design
3 mins
5. Setting CA Services in IOS
6 mins
6. Configuring FlexVPN RA
7 mins
7. AnyConnect Profile Editor
5 mins
8. Testing and Verifying the RA VPN
7 mins
9. Flex VPN RA Summary
1 min

Debugging for IPsec Tunnels
1. Introduction to Debugging IPsec
1 min
2. Overview of IPsec Options
2 mins
3. Troubleshooting Tips for IPsec
5 mins
4. IKEv1, Phase 1, Missing Routes
8 mins
5. IKEv1, Phase 1, Bad Config
6 mins
6. IKEv1, Phase 2 Bad Config
7 mins
7. IKEv2 Troubleshooting
8 mins
8. Summary Troubleshooting IPsec
1 min

Security Intelligence
1. Introduction to Security Intelligence
1 min
2. Security Intelligence Overview
4 mins
3. Cisco Talos Overview
3 mins
4. Talos Vulnerability Information
5 mins
5. Talos Reputation Center
4 mins
6. Security Intelligence Summary
1 min

Explain APIs in the SDN Architecture
1. Introducing APIs and SDN
1 min
2. What is an API anyway?
13 mins
3. The Northbound API
4 mins
4. The Southbound API
2 mins
5. The Eastbound API
3 mins
6. The Westbound API
2 mins
7. Summarizing APIs and SDN
1 min

DNA Center Foundations
1. Introducing DNA Center
1 min
2. What DNA Center Does
12 mins
3. What an SD-Access Fabric Does
9 mins
4. The Four Workflows of DNA Center
9 mins
5. The DNA Center Platform APIs
7 mins
6. Summarizing DNA Center
1 min

Interpret Basic Python Scripts used with Cisco Security
1. Introducing Basic Python Security Scripts
1 min
2. Extending Python and Setting Variables
11 mins
3. Getting Authenticated
11 mins
4. Getting Monitored Applications
8 mins
5. Summarizing Interpreting Python Scripts
1 min

Troubleshoot NetFlow
1. Introduction to Troubleshooting NetFlow
1 min
2. NetFlow Overview
3 mins
3. Flavors of NetFlow
5 mins
4. NetFlow v5
4 mins
5. Flexible NetFlow
6 mins
6. NetFlow Collectors and Analyzers
3 mins

The Components of Network Security Design
1. Intro to components of Network Security Design
1 min
2. Network Access Control
5 mins
3. End Point Security
2 mins
4. Next Generation Firewalls and IPS
3 mins
5. TrustSec and MACsec
3 mins

Configure and Verify Cisco Port Security
1. Introducing Port Security
1 min
2. Understanding Port Security and Why we Need It
6 mins
3. Port Security Defaults
4 mins
4. Implementing Port Security on Layer 2 Interface
6 mins
5. Customizing Port Security
9 mins
6. Configuring Auto Errdisable Recovery
7 mins
7. Applying Port Security Skills in Production
5 mins
8. Review of Configure and Verify Cisco Port Security
2 mins

Configure and Verify Cisco DHCP Snooping
1. Introducing DHCP Snooping
1 min
2. Why is DHCP Snooping Needed
4 mins
3. The Recipe for DHCP Snooping
5 mins
4. Building and Implementing DHCP Snooping in PT
11 mins
5. Adding Source Guard to a Switch
5 mins
6. Applying DHCP Snooping in Production
12 mins
7. Review of Configure and Verify Cisco DHCP Snooping
3 mins

Configure and Verify Cisco Dynamic ARP Inspection
1. Introducing Dynamic ARP Inspection (DAI)
1 min
2. Why is DAI Needed
3 mins
3. The Recipe and Commands for DAI
3 mins
4. Implementing DAI
5 mins
5. ARP Access Lists for Non-DHCP Devices
6 mins
6. Additional DAI Options and Features
6 mins
7. Applying DAI to the Production Network
6 mins
8. Review of Configure and Verify Cisco Dynamic ARP Inspection
2 mins

Private VLANS
1. Introduction to Private VLANs
1 min
2. PVLANs Overview
5 mins
3. Promiscuous Ports
6 mins
4. PVLAN Design
2 mins
5. Implement PVLANs
6 mins
6. Verify PVLANs
8 mins
7. Trunking and PVLANs
7 mins
8. PVLAN Summary
1 min

VRF-lite
1. Introduction to VRF-lite
1 min
2. VRF-lite Overview
6 mins
3. VRF-lite Configuration Basics
3 mins
4. VRFs on a Multi-Layer Switch
2 mins
5. VRF-lite Design
2 mins
6. VRF-lite Implementation
6 mins
7. VRF-lite Adding Routing
7 mins
8. VRF-lite Routing Verification
5 mins
9. DHCP VRF Services
7 mins
10. VRF-lite Summary
1 min

Network Infrastructure Device Hardening
1. Introduction to Device Hardening
1 min
2. Device Hardening Overview
5 mins
3. Cisco Guide to Harden IOS Devices
2 mins
4. Management Plane Hardening
15 mins
5. Control Plane Hardening
7 mins
6. Data Plane Hardening
6 mins
7. Device Hardening Checklist
4 mins
8. Hardening Review
1 min

Configure Cisco TrustSec
1. Introduction to TrustSec
1 min
2. TrustSec Overview
4 mins
3. TrustSec Security Groups
3 mins
4. Security Group ACLs
3 mins
5. TrustSec Policies
6 mins
6. Configure Network Devices for TrustSec
6 mins
7. ISE and NAD TrustSec Integration
3 mins
8. Verify TrustSec
13 mins
9. SGT eXchange Protocol (SXP)
6 mins

Additional Layer 2 Security
1. Introduction to Additional Layer 2 Security Options
1 min
2. Layer 2 Security Overview
3 mins
3. Storm Control
8 mins
4. Root Guard
4 mins
5. BPDU Guard
5 mins
6. Summary of Layer 2 Security
1 min

EIGRP Neighbor Relationships and Authentication
1. Introduction to EIGRP Relationships and Authentication
1 min
2. Neighborship Overview
3 mins
3. Authentication Overview
10 mins
4. EIGRP Hands on Lab with Authentication
7 mins

Troubleshoot OSPF Authentication for IPv4
1. Intro to IPv4 OSPF Authentication and Troubleshooting
1 min
2. Overview of OSPF Authentication
13 mins
3. Implement OSPF Authentication
10 mins
4. Virtual Links and Authentication
3 mins
5. Troubleshooting OSPF Authentication Lab 01
11 mins
6. Troubleshooting OSPF Authentication Lab 02
13 mins

Troubleshoot OSPF Authentication for IPv6
1. Intro to IPv6 OSPF Authentication and Troubleshooting
1 min
2. IPv6 OSPF Authentication Overview
14 mins
3. Implement and Verify Authentication
7 mins
4. Troubleshooting OSPF Authentication Lab 01
9 mins
5. Troubleshooting OSPF Authentication Lab 02
8 mins

Firepower Access Control Policies
1. Access Control Policy Overview
7 mins
2. Access Control Policy Rule Actions Concepts
6 mins
3. Access Control Policy Rule Actions Demonstration
6 mins
4. URL Filtering
6 mins
5. Malware and File Inspections
8 mins
6. SSL/TLS Decryption
8 mins
7. IPS Inspection
4 mins

Management Options to Improve Security
1. Introduction to Secure Network Management
1 min
2. Overview of Secure Management
8 mins
3. Syslog Overview
5 mins
4. NTP with Authentication
6 mins
5. Change Control
3 mins

Troubleshoot SNMP
1. Introduction to Troubleshooting SNMP
1 min
2. SNMP Overview
8 mins
3. SNMPv2 Configuration
9 mins
4. SNMPv3 Client Configuration
10 mins
5. SNMPv3 Server Configuration
5 mins
6. Troubleshooting SNMP
4 mins

Troubleshoot Network Problems using Logging
1. Introduction to Troubleshooting using Logging
1 min
2. Logging Overview
4 mins
3. Configuring Logging
11 mins
4. Conditional Debugging
9 mins

Cloud Service and Deployment Models
1. Planning for Cloud Services
7 mins
2. Plan for Infrastructure As A Service
8 mins
3. Plan for Platform As A Service
6 mins
4. Plan for Software As A Service
6 mins
5. Plan for Cloud Deployment Models
11 mins

Planning for Software Development Methodologies
1. Software and App Development Methodologies
3 mins
2. Plan for Waterfall Method
15 mins
3. Plan for Lean and Agile Methods
10 mins
4. Plan for Kanban and Scrum Teams
8 mins
5. Continuous Integration, Deployment, and Delivery
11 mins
6. Understand CICD Pipelines in Action
14 mins
7. Plan for DevOps
10 mins
8. Plan for DevSecOps
12 mins

Planning for and Securing Cloud Software-as-a-Service
1. Planning for Software-as-a-Service Security
3 mins
2. Federating Identities with SAML, OAuth, and OpenID
12 mins
3. Cisco Zero-Trust for the Workforce
10 mins
4. Cisco Cloudlock Access Security Broker
11 mins
5. Securing DNS with Cisco Umbrella and OpenDNS
12 mins
6. Securing Communications with Cisco Email Security
15 mins

Planning for and Securing Cloud Infrastructure-as-a-Service
1. Planning for Cloud Infrastructure Security
2 mins
2. Assessing Cloud Service Providers
7 mins
3. Isolating and Segmenting Cloud Networks
10 mins
4. Leveraging Virtual Appliances
11 mins
5. Hardening, Protecting, and Maintaining Cloud VMs
13 mins
6. Planning for Infrastructure-as-Code
12 mins
7. Monitor and Analyze with Stealthwatch
10 mins
8. Understand the Tenets of Zero Trust Security
13 mins
9. Zero Trust Token Auth Demo
6 mins

Planning for and Securing Cloud Platform-as-a-Service
1. Securing Cloud Platform-as-a-Service
3 mins
2. Plan for Containers
8 mins
3. Secure Container Images and Registries
13 mins
4. Orchestrating Containers
10 mins
5. Open Web Application Security Project Controls
14 mins
6. OWASP Protective Controls Continued
13 mins
7. Cisco Zero-Trust Architecture Overview
11 mins
8. Securing Workloads with Cisco Tetration
14 mins
9. Visibility with Cisco AppDynamics
15 mins

Capture and Redirection Methods
1. Introduction to Capture and Redirection Methods
1 min
2. Capture and Redirection Overview
2 mins
3. Policy Based Routing (PBR) Overview
2 mins
4. PBR Configuration and Testing
6 mins
5. WCCP Overview and Planning
2 mins
6. WSA Configuration for WCCP
4 mins
7. IOS Configuration for WCCP
7 mins
8. Testing WCCP
3 mins
9. Traffic Redirection Summary
1 min

Cisco Web Security
1. Introduction to Cisco Web Security
1 min
2. Web Security Appliance Overview
6 mins
3. WSA and AD Integration
4 mins
4. WSA Identification Profiles
6 mins
5. WSA Access Policies
6 mins
6. WSA Application Filtering
5 mins
7. WSA TLS Decryption Overview
3 mins
8. WSA Certificate Management
6 mins
9. WSA Decryption Policy
6 mins
10. WSA Additional Security Features
3 mins

Cisco Email Security
1. Introduction to Cisco Email Security
1 min
2. Cisco Email Security Overview
5 mins
3. ESA Inbound Mail Overview
6 mins
4. Blocking Incoming Email
4 mins
5. ESA Outbound Mail Overview
5 mins
6. SPAM Filtering
3 mins
7. Email Anti-Virus
1 min
8. DLP
2 mins
9. Encryption
3 mins

Cisco Umbrella
1. Introduction to Cisco Umbrella
1 min
2. Cisco Umbrella Overview
8 mins
3. Umbrella Components
8 mins
4. Policy Overview
5 mins
5. Policy Components
8 mins
6. Policy Creation
7 mins
7. Core Identities
6 mins
8. Umbrella CA Certificates
5 mins
9. Reporting and Investigation
5 mins
10. Umbrella VA
11 mins
11. Umbrella Summary
1 min

Understand and Configure AMP for Endpoints
1. Introducing Endpoint Security
1 min
2. The Types of Endpoint Protection
5 mins
3. Introducing Advanced Malware Protection (AMP) for Endpoints
8 mins
4. Configuring Simple Outbreak Controls in AMP
6 mins
5. Explore Other Outbreak Controls
5 mins
6. Understand Groups and Policies
4 mins
7. Summarizing Endpoint Security
1 min

Explain Various Types of Endpoint Defenses
1. Introducing Endpoint Defense Mechanisms
1 min
2. Anti-Virus and Anti-Malware
4 mins
3. Indicators of Compromise (IoC)
5 mins
4. Retrospective Analysis
3 mins
5. Dynamic File Analysis
3 mins
6. Summarizing Endpoint Protection Mechanisms
1 min

Endpoint Security
1. Introduction to Endpoint Security
1 min
2. Why Endpoint Protection is Critical
4 mins
3. The Value of Mobile Device Management
4 mins
4. Using Multi-Factor Authentication
9 mins
5. Posture Assessment for Endpoint Security
6 mins
6. Patching Endpoints
2 mins

Describe Controls for End Users’ Network Access
1. Introducing Network Access Control for Endpoints
1 min
2. Endpoint Profiling
9 mins
3. Identity-Based Authentication
8 mins
4. Authenticating with AnyConnect
8 mins
5. Posture Assessment
6 mins
6. Cisco TrustSec and Security Group Tags (SGTs)
6 mins
7. Change of Authorization (CoA)
6 mins
8. Summarizing Network Access Controls for Endpoints
1 min

802.1X Fundamentals
1. Introduction to 802.1x Fundamentals
1 min
2. Network Authentication and Authorization
7 mins
3. Options for Authentication
7 mins
4. Options after Authentication
7 mins

Configure ISE for 802.1X
1. Introduction to Configuring ISE
1 min
2. Identity Stores
2 mins
3. Configure ISE to use AD
3 mins
4. Adding Network Devices to ISE
4 mins
5. Policy Set Overview
11 mins
6. Creating a Policy Set
12 mins
7. Authorization Policies
10 mins
8. Summary
1 min

Configure a Switch for 802.1X
1. Introduction to Switch Configuration for 802.1X
1 min
2. Configure Global AAA Parameters
8 mins
3. Port Configuration
7 mins
4. Testing and Verifying
5 mins
5. Switch Configuration Summary
1 min

Explain Exfiltration Techniques
1. Introducing Attacker Exfiltration Techniques
1 min
2. DNS Tunneling Exfiltration
5 mins
3. HTTP(S) Exfiltration
7 mins
4. Outbound File Transfers
4 mins
5. Text-Based Protocols
4 mins
6. Recapping Exfiltration Techniques
1 min

Explaining the Benefits of Streaming Telemetry
1. Introducing Streaming Telemetry
1 min
2. What is Telemetry?
5 mins
3. Network Telemetry
7 mins
4. Endpoint Telemetry
4 mins
5. Summarizing Telemetry
1 min

Describing the Features of Various Cisco Security Offerings
1. Introducing Cisco Security Platforms
1 min
2. Stealthwatch
7 mins
3. pXGrid
5 mins
4. Umbrella Investigate
6 mins
5. Cognitive Threat Analytics
3 mins
6. AnyConnect Network Visibility Module
3 mins
7. Summarizing Cisco Security Platforms
1 min


Discover more from Expert Training

Subscribe to get the latest posts sent to your email.

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.