Implementing and Operating Cisco Security Core Technologies (SCOR)

This course will help:
  • Gain hands-on experience implementing core security technologies and learn best practices using Cisco security solutions
  • Qualify for professional and expert-level security job roles
  • Prepare for the 350-701 SCOR exam

Course syllabus:

  • Network Security Technologies
  • Cisco Secure Firewall ASA Deployment
  • Cisco Secure Firewall Threat Defense Basics
  • Cisco Secure Firewall Threat Defense IPS, Malware, and File Policies
  • Cisco Secure Email Gateway Basics
  • Cisco Secure Email Policy Configuration
  • Cisco Secure Web Appliance Deployment
  • VPN Technologies and Cryptography Concepts
  • Cisco Secure Site-to-Site VPN Solutions
  • Cisco IOS VTI-Based Point-to-Point IPsec VPNs
  • Point-to-Point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
  • Cisco Secure Remote-Access VPN Solutions
  • Remote-Access SSL VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
  • Describing Information Security Concepts
  • Describe Common TCP/IP Attacks
  • Describe Common Network Application Attacks
  • Common Endpoint Attacks
  • Cisco Umbrella Deployment
  • Endpoint Security Technologies
  • Cisco Secure Endpoint
  • Cisco Secure Network Access Solutions
  • 802.1X Authentication
  • 802.1X Authentication Configuration
  • Network Infrastructure Protection
  • Control Plane Security Solutions
  • Layer 2 Data Plane Security Controls
  • Layer 3 Data Plane Security Controls
  • Management Plane Security Controls
  • Traffic Telemetry Methods
  • Cisco Secure Network Analytics Deployment
  • Cloud Computing and Cloud Security
  • Cloud Security
  • Cisco Secure Cloud Analytics Deployment
  • Software-Defined Networking

Lab outline

  • Configure Network Settings and NAT on Cisco Secure Firewall ASA
  • Configure Cisco Secure Firewall ASA Access Control Policies
  • Configure Cisco Secure Firewall Threat Defense NAT
  • Configure Cisco Secure Firewall Threat Defense Access Control Policy
  • Configure Cisco Secure Firewall Threat Defense Discovery and IPS Policy
  • Configure Cisco Secure Firewall Threat Defense Malware and File Policy
  • Configure Listener, HAT, and RAT on Cisco Email Secure Email Gateway
  • Configure Cisco Secure Email Policies
  • Configure Proxy Services, Authentication, and HTTPS Decryption
  • Enforce Acceptable Use Control and Malware Protection
  • Configure Static VTI Point-to-Point IPsec IKEv2 Tunnel
  • Configure Point-to-Point VPN between Cisco Secure Firewall Threat Defense Devices
  • Configure Remote Access VPN on the Cisco Secure Firewall Threat Defense
  • Examine Cisco Umbrella Dashboard and DNS Security
  • Examine Cisco Umbrella Secure Web Gateway and Cloud-Delivered Firewall
  • Explore Cisco Umbrella CASB Funtionalities
  • Explore Cisco Secure Endpoint
  • Perform Endpoint Analysis Using Cisco Secure Endpoint Console
  • Explore File Ransomware Protection by Cisco Secure Endpoint Console
  • Explore Secure Network Analytics v7.4.2
  • Explore Global Threat Alerts Integration and ETA Cryptographic Audit
  • Explore Cloud Analytics Dashboard and Operations
  • Explore Secure Cloud Private and Public Cloud Monitoring

You will learn:

  • Describe information security concepts and strategies within the network
  • Describe security flaws in the transmission protocol/internet protocol (TCP/IP) and how they can be used to attack networks and hosts
  • Describe network application-based attacks
  • Describe how various network security technologies work together to guard against attacks
  • Implement access control on Cisco Secure Firewall Adaptive Security Appliance (ASA)
  • Deploy Cisco Secure Firewall Threat Defense basic configurations
  • Deploy Cisco Secure Firewall Threat Defense IPS, malware, and fire policies
  • Deploy Cisco Secure Email Gateway basic configurations
  • Deploy Cisco Secure Email Gateway policy configurations
  • Describe and implement basic web content security features and functions provided by Cisco Secure Web Appliance
  • Describe various attack techniques against the endpoints
  • Describe Cisco Umbrella® security capabilities, deployment models, policy management, and Investigate console
  • Provide basic understanding of endpoint security and be familiar with common endpoint security technologies
  • Describe Cisco Secure Endpoint architecture and basic features
  • Describe Cisco Secure Network Access solutions
  • Describe 802.1X and extensible authentication protocol (EAP) authentication
  • Configure devices for 802.1X operations
  • Introduce VPNs and describe cryptography solutions and algorithms
  • Describe Cisco secure site-to-site connectivity solutions
  •  Deploy Cisco Internetwork Operating System (Cisco IOS®) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs
  • Configure point-to-point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
  • Describe Cisco secure remote access connectivity solutions
  • Deploy Cisco secure remote access connectivity solutions
  • Provide an overview of network infrastructure protection controls
  • Examine various defenses on Cisco devices that protect the control plane
  • Configure and verify Cisco IOS software layer 2 data plane controls
  • Configure and verify Cisco IOS software and Cisco ASA layer 3 data plane controls
  • Examine various defenses on Cisco devices that protect the management plane
  • Describe the baseline forms of telemetry recommended for network infrastructure and security devices
  • Describe deploying Cisco Secure Network Analytics
  • Describe basics of cloud computing and common cloud attacks
  • Describe how to secure cloud environment
  • Describe the deployment of Cisco Secure Cloud Analytics
  • Describe basics of software-defined networks and network programmability

Pre-requisites:

The knowledge and skills you are recommended to have before attending this training are:

  • Familiarity with Ethernet and TCP/IP networking
  • Working knowledge of the Windows operating system
  • Working knowledge of Cisco IOS networking and concepts
  • Familiarity with basics of networking security concepts

These skills can be found in the following Cisco Learning Offering:

  • Implementing and Administering Cisco Solutions (CCNA)
Sign up for a course Implementing and Operating Cisco Security Core Technologies (SCOR)