Implementing and Operating Cisco Security Core Technologies

Niveau
Tijdsduur
Locatie
Op locatie
Startdatum en plaats

Implementing and Operating Cisco Security Core Technologies

Train IT Now B.V.
Logo van Train IT Now B.V.

Tip: meer info over het programma, prijs, en inschrijven? Download de brochure!

Startdata en plaatsen
placeNieuwegein
16 feb. 2026 tot 21 feb. 2026
placeVirtueel
16 feb. 2026 tot 21 feb. 2026
Beschrijving

This SCOR course helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and for senior-level security roles.

In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility and enforcements. You will get extensive hands-on experience deploying Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense; configuring access control policies, mail policies, and 802.1X Authentication; and more.  You will get introductory practice on Cisc…

Lees de volledige beschrijving

Veelgestelde vragen

Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.

Nog niet gevonden wat je zocht? Bekijk deze onderwerpen: Cisco Security, Cisco, CISM, Cyber Security en Computer Hacking Forensic Investigator (CHFI).

This SCOR course helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and for senior-level security roles.

In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility and enforcements. You will get extensive hands-on experience deploying Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense; configuring access control policies, mail policies, and 802.1X Authentication; and more.  You will get introductory practice on Cisco Network Analytics and and Cisco Secure Cloud Analytics features.

Please note: This course is a combination of Instructor-Led and Self-Paced Study - 5 days in the classroom and approx 3 days of self study. The self-study content will be provided as part of the digital courseware that you will recieve at the beginning of the course and should be part of your preparation for the exam.

This course is worth 64 Continuing Education (CE) Credits

Inhoud

Network Security Technologies


* Defense-in-Depth Strategy
* Defending Across the Attack Continuum
* Network Segmentation and Virtualization Overview
* Stateful Firewall Overview
* Cisco IOS Zone-Based Policy Firewall Overview
* Security Intelligence Overview
* Threat Information Standardization
* Network-Based Malware Protection Overview
* IPS Overview
* Next Generation Firewall Overview
* Email Content Security Overview
* Web Content Security Overview
* Threat Analytic Systems Overview
* DNS Security Overview
* Authentication, Authorization, and Accounting Overview
* Identity and Access Management Overview
* Virtual Private Network (VPN) Technology Overview
* Network Security Device Form Factors Overview Cisco Secure Firewall ASA Deployment


* Cisco Secure Firewall ASA Deployment Types
* Cisco Secure Firewall ASA Interface Security Levels
* Cisco Secure Firewall ASA Objects and Object Groups
* Network Address Translation
* Cisco Secure Firewall ASA Interface ACLs
* Cisco Secure Firewall ASA Global ACLs
* Cisco Secure Firewall ASA Advanced Access Policies
* Cisco Secure Firewall ASA High Availability Overview Cisco Secure Firewall Threat Defense Basics


* Cisco Secure Firewall Threat Defense Deployments
* Cisco Secure Firewall Threat Defense Packet Processing and Policies
* Cisco Secure Firewall Threat Defense Objects
* Cisco Secure Firewall Threat Defense NAT
* Cisco Secure Firewall Threat Defense Prefilter Policies
* Cisco Secure Firewall Threat Defense Access Control Policies
* Cisco Secure Firewall Threat Defense Security Intelligence
* Cisco Secure Firewall Threat Defense Discovery Polices Cisco Cisco Secure Firewall Threat Defense IPS, Malware and File Policies


* Cisco Secure Firewall Threat Defense IPS Policies
* Cisco Secure Firewall Threat Defense Malware and File Policies Cisco Secure Email Gateway Basics


* Cisco Secure Email Overview
* SMTP Overview
* Email Pipeline Overview
* Public and Private Listeners
* Host Access Table Overview
* Recipient Access Table Overview Cisco Secure Email Policy Configuration


* Mail Policies Overview
* Protection Against Spam and Graymail
* Anti-virus and Anti-malware Protection
* Outbreak Filters
* Content Filters
* Data Loss Prevention
* Email Encryption Cisco Secure Web Appliance Deployment


* Cisco Secure Web Appliance Overview
* Deployment Options
* Network Users Authentication
* HTTPS Traffic Decryption
* Access Policies and Identification Profiles
* Acceptable Use Controls Settings
* Anti-Malware Protection VPN Technologies and Cryptography Concepts


* VPN Definition
* VPN Types
* Secure Communication and Cryptographic Services
* Keys in Cryptography
* Public Key Infrastructure Cisco Secure Site-to-Site VPN Solutions


* Site-to-Site VPN Topologies
* IPsec VPN Overview
* IPsec Static Crypto Maps
* IPsec Static Virtual Tunnel Interface
* Dynamic Multipoint VPN
* Cisco IOS FlexVPN Cisco IOS VTI-Based Point-to-Point IPsec VPNs


* Cisco IOS VTIs
* Static VTI Point-to-Point IPsec IKEv2 VPN Configuration Point-to-Point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense


* Point-to-Point VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
* Cisco Secure Firewall ASA Point-to-Point VPN Configuration
* Cisco Secure Firewall Threat Defense Point-to-Point VPN Configuration Cisco Secure Remote Access VPN Solutions


* Remote Access VPN Components
* Remote Access VPN Technologies
* SSL Overview Remote Access SSL VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense


* Remote Access Configuration Concepts
* Connection Profiles
* Group Policies
* Cisco Secure Firewall ASA Remote Access VPN Configuration
* Cisco Secure Firewall Threat Defense Remote Access VPN Configuration Describing Information Security Concepts (Self-Study)


* Information Security Overview
* Assets, Vulnerabilities and Countermeasures
* Managing Risk
* Vulnerability Assessment
* Understanding CVSS Describe Common TCP/IP Attacks (Self-Study)


* Legacy TCP/IP Vulnerabilities
* IP Vulnerabilities
* ICMP Vulnerabilities
* UDP Vulnerabilities
* Attack Surface and Attack Vectors
* Reconnaissance Attacks
* Access Attacks
* Man-In-The-Middle Attacks
* Denial of Service and Distributed Denial of Service Attacks
* Reflection and Amplification Attacks
* Spoofing Attacks
* DHCP Attacks Describe Common Network Application Attacks (Self-Study)


* Password Attacks
* DNS Tunneling
* Web-Based Attacks
* HTTP 302 Cushioning
* Command Injections
* SQL Injections
* Cross-Site Scripting and Request Forgery
* Email-Based Attacks Common Endpoint Attacks (Self-Study)


* Buffer Overflow
* Malware
* Reconnaissance Attack
* Gaining Access and Control
* Gaining Access via Social Engineering
* Gaining Access via Web-Based Attacks
* Exploit Kits and Rootkits
* Privilege Escalation
* Post-Exploitation Phase
* Angler Exploit Kit Cisco Umbrella Deployment (Self-Study)


* Cisco Umbrella Capabilities
* Cisco Umbrella Identities and Policies Overview
* Cisco Umbrella DNS Security
* Cisco Umbrella Investigate Overview
* Cisco Umbrella Secure Web Gateway
* Cisco Umbrella CASB Functionalities Endpoint Security Technologies (Self-Study)


* Host-Based Personal Firewall
* Host-Based Anti-Virus
* Host-Based Intrusion Prevention System
* Application Allowed Lists and Blocked Lists
* Host-Based Malware Protection
* Sandboxing Overview
* File Integrity Checking Cisco Secure Endpoint (Self-study)


* Cisco Secure Endpoint Architecture
* Cisco Secure Endpoint Engines
* Retrospective Security with Cisco Secure Endpoint
* Cisco Secure Endpoint Device and File Trajectory
* Managing Cisco Secure Endpoint for Endpoints Cisco Secure Network Access Solutions (Self-study)


* Cisco Secure Network Access
* Cisco Secure Network Access Components
* AAA Role in Cisco Secure Network Access Solution
* Cisco ISE
* Cisco TrustSec Describing 802.1X Authentication (Self-study)


* 802.1X and EAP
* EAP Methods
* Role of RADIUS in 802.1X Communications
* RADIUS Change of Authorization Configuring 802.1X Authentication (Self-study)


* Cisco Catalyst Switch 802.1X Configuration
* Cisco IBNS 2.0 Configuration on Cisco Catalyst Switch
* Cisco WLC 802.1X Configuration
* Cisco ISE 802.1X Configuration
* Supplicant 802.1x Configuration
* Cisco Central Web Authentication Network Infrastructure Protection (Self-Study)


* Network Device Planes
* Control Plane Security Controls
* Management Plane Security Controls
* Network Telemetry
* Layer 2 Data Plane Security Controls
* Layer 3 Data Plane Security Controls Control Plane Security Controls (Self-Study)


* Infrastructure ACLs
* Control Plane Policing
* Control Plane Protection
* Routing Protocol Security Layer 2 Data Plane Security Controls (Self-Study)


* Overview of Layer 2 Data Plane Security Controls
* VLAN-Based Attacks Mitigation
* STP Attacks Mitigation
* Port Security
* Private VLANs
* DHCP Snooping
* ARP Inspection
* Storm Control
* MACsec Encryption Layer 3 Data Plane Security Controls (Self-Study)


* Infrastructure Antispoofing ACLs
* Unicast Reverse Path Forwarding
* IP Source Guard Management Plane Security Controls (Self-Study)


* Cisco Secure Management Access
* Simple Network Management Protocol Version 3
* Secure Access to Cisco Devices
* AAA or Management Access Traffic Telemetry Methods (Self-Study)


* Network Time Protocol
* Device and Network Events Logging and Export
* Network Traffic Monitoring Using NetFlow Cisco Secure Network Analytics Deployment (Self-Study)


* Cisco Secure Network Analytics Overview
* Cisco Secure Network Analytics Required Components
* Flow Stitching and Deduplication
* Cisco Secure Network Analytics Optional Components
* Cisco Secure Network Analytics and ISE Integration
* Cisco Secure Network Analytics with Global Threat Alerts
* Cisco Encrypted Traffic Analytics (ETA)
* Host Groups
* Security Events and Alarms
* Host, Role and Default Policies Cloud Computing and Cloud Security (Self-Study)


* Evolution of Cloud Computing
* Cloud Service Models
* Security Responsibilities in the Cloud
* Cloud Deployment Models
* Patch Management in the Cloud
* Security Assessment in the Cloud Cloud Security (Self-Study)


* Cisco Threat-Centric Approach to Network Security
* Cloud Physical Environment Security
* Application and Workload Security
* Cloud Management and API Security
* Network Functions Virtualization (NFV) and Virtual Network Function (VNF)
* Cisco NFV Examples
* Reporting and Threat Visibility in Cloud
* Cloud Access Security Broker
* Cisco Cloudlock
* OAuth and OAuth Attacks Cisco Secure Cloud Analytics Deployment (Self-Study)


* Cisco Secure Cloud Analytics for Public Cloud Monitoring
* Cisco Secure Cloud Analytics for Private Network Monitoring
* Cisco Secure Cloud Analytics Operations Software-Defined Networking (Self-Study)


* Software-Defined Networking Concepts
* Network Programmability and Automation
* Cisco Platforms and APIs
* Basic Python Scripts for Automation Labs


* Discovery Lab 1: Configure Network Settings And NAT On Cisco Secure Firewall ASA
* Discovery Lab 2: Configure Cisco Secure Firewall ASA Access Control Policies
* Discovery Lab 3: Configure Cisco Secure Firewall Threat Defense NAT
* Discovery Lab 4: Configure Cisco Secure Firewall Threat Defense Access Control Policy
* Discovery Lab 5: Configure Cisco Secure Firewall Threat Defense Discovery and IPS Policy
* Discovery Lab 6: Configure Cisco Secure Firewall Threat Defense Malware and File Policy
* Discovery Lab 7: Configure Listener, HAT, and RAT on Cisco Secure Email Gateway
* Discovery Lab 8: Configure Cisco Secure Email Policies
* Discovery Lab 9: Configure Proxy Services, Authentication, and HTTPS Decryption
* Discovery Lab 10: Enforce Acceptable Use Control and Malware Protection
* Discovery Lab 11: Configure Static VTI Point-to-Point IPsec IKEv2 Tunnel
* Discovery Lab 12: Configure Point-to-Point VPN between the Cisco Secure Firewall Threat Defense Devices
* Discovery Lab 13: Configure Remote Access VPN on the Cisco Secure Firewall Threat Defense
* Discovery Lab 14: Examine Cisco Umbrella Dashboard and DNS Security
* Discovery Lab 15: Explore Cisco Umbrella Secure Web Gateway and Cloud-Delivered Firewall
* Discovery Lab 16: Explore Cisco Umbrella CASB Functionalities
* Discovery Lab 17: Explore Cisco Secure Endpoint
* Discovery Lab 18: Perform Endpoint Analysis Using Cisco Secure Endpoint Console
* Discovery Lab 19: Explore File Ransomware Protection by Cisco Secure Endpoint Console
* Discovery Lab 20: Explore Secure Network Analytics v7.4.2
* Discovery Lab 21: Explore Global Threat Alerts Integration and ETA Cryptographic Audit
* Discovery Lab 22: Explore Cloud Analytics Dashboard and Operations
* Discovery Lab 23: Explore Secure Cloud Private and Public Cloud Monitoring

Certificering
Recommended as preparation for the following exams:


* 350-701 -  one of the concentration exams.
* Het examen is optioneel en niet inbegrepen in de cursusprijs Implementing and Operating Cisco Security Core Technologies (SCOR 350-701)


* This is the core exam for the Cisco CCNP Security certification, in order to gain the CCNP Security certification you will also need to pass

Blijf op de hoogte van nieuwe ervaringen
Er zijn nog geen ervaringen.
Deel je ervaring
Heb je ervaring met deze cursus? Deel je ervaring en help anderen kiezen. Als dank voor de moeite doneert Springest € 1,- aan Stichting Edukans.

Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.

Download gratis en vrijblijvend de informatiebrochure

(optioneel)
(optioneel)
(optioneel)
(optioneel)
(optioneel)
(optioneel)
(optioneel)

Heb je nog vragen?

(optioneel)
We slaan je gegevens op om je via e-mail en evt. telefoon verder te helpen.
Meer info vind je in ons privacybeleid.