0% found this document useful (0 votes)
4 views

implementing-and-operating-cisco-security-core-technologies-scor

The Implementing and Operating Cisco Security Core Technologies (SCOR) course is a 5-day program designed to prepare participants for Cisco CCNP Security and CCIE Security certifications, focusing on core Cisco security solutions and advanced threat protection. The course covers various security concepts, TCP/IP attacks, network security technologies, and hands-on experience with Cisco Firepower and ASA firewalls. Additionally, it includes self-study materials and prepares students for the SCOR exam, leading to multiple Cisco security certifications.

Uploaded by

adelmuntasser
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

implementing-and-operating-cisco-security-core-technologies-scor

The Implementing and Operating Cisco Security Core Technologies (SCOR) course is a 5-day program designed to prepare participants for Cisco CCNP Security and CCIE Security certifications, focusing on core Cisco security solutions and advanced threat protection. The course covers various security concepts, TCP/IP attacks, network security technologies, and hands-on experience with Cisco Firepower and ASA firewalls. Additionally, it includes self-study materials and prepares students for the SCOR exam, leading to multiple Cisco security certifications.

Uploaded by

adelmuntasser
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

IT INFRASTRUCTURE AND NETWORKS

Implementing and Operating Cisco


Security Core Technologies (SCOR)

LENGTH VERSION

5 days 1.0

WHY STUDY THIS COURSE


T he Implementing and Operating Cisco Security Core Technologies (SCOR)
v1.0 course helps you prepare f or the Cisco CCNP Security and CCIE Security
certif ications and f or senior-level security roles.

CISCO AT LUMIFY In this course, you will master the skills and technologies you need to
WORK implement core Cisco security solutions to provide advanced threat
protection against cybersecurity attacks. You will learn security f or
Lumify Work is the largest
provider of authorised Cisco
networks, cloud and content, endpoint protection, secure network access,
training in Australia, offering a visibility, and enf orcements. You will get extensive hands-on experience
wider range of Cisco courses, deploying Cisco Firepower Next-Generation Firewall and Cisco Adaptive
run more often than any of our Security Appliance (ASA) Firewall; conf iguring access control policies, mail
competitors. Lumify Work has policies, and 802.1X Authentication; and more. You will get introductory
won awards such as ANZ practice on Cisco Stealthwatch Enterprise and Cisco Stealthwatch Cloud
Learning Partner of the Year threat detection f eatures.
(twice!) and APJC Top Quality
Learning Partner of the Year. T he course includes additional self -study material that can be done at your
own pace af ter the instructor-led portion of the course.

T his course, including the self -paced material, helps prepare you to take the
exam 350-7 01 (SCOR), which leads to the CCNP Security, CCIE Security, and
the Cisco Certif ied Specialist - Security Core certif ications.

Digital courseware: Cisco provides students with electronic courseware for this
course. Students who have a confirmed booking will be sent an email prior to the
course start date, with a link to create an account
via learningspace.cisco.com before they attend their first day of class. Please note
that any electronic courseware or labs will not be available (visible) until the first day
of the class.

Exam Vouchers: Cisco exam vouchers are not included in the course fees but can
be purchased separately where applicable.

WHAT YOU'LL LEARN


Af ter taking this course, you should be able to:

https://www.lumifywork.com/en-ph/courses/implementing-and-operating-cisco-security-core-technologies-scor/

[email protected] facebook.com/LumifyWorkPh twitter.com/LumifyWorkPH

lumifywork.com linkedin.com/company/lumify-work-ph youtube.com/@lumifywork


IT INFRASTRUCTURE AND NETWORKS

Implementing and Operating Cisco


Security Core Technologies (SCOR)

Describe inf ormation security concepts and strategies within the network

Describe common TCP/IP, network application, and endpoint attacks

Describe how various network security technologies work together to


guard against attacks

Implement access control on Cisco ASA appliance and Cisco Firepower


Next-Generation Firewall

My instructor was great being able Describe and implement basic email content security f eatures and
to put scenarios into real world
f unctions provided by Cisco Email Security Appliance
instances that related to my
specific situation.
Describe and implement web content security f eatures and f unctions
I was made to feel welcome from provided by Cisco Web Security Appliance
the moment I arrived and the
ability to sit as a group outside the Describe Cisco Umbrella security capabilities, deployment models, policy
classroom to discuss our
management, and Investigate console
situations and our goals was
extremely valuable.
Introduce VPNs and describe cryptography solutions and algorithms
I learnt a lot and felt it was
important that my goals by Describe Cisco secure site-to-site connectivity solutions and explain how
attending this course were met. to deploy Cisco Internetwork Operating System (Cisco IOS) Virtual Tunnel
Great job Lumify Work team. Interf ace (VT I)-based point-to-point IPsec VPNs, and point-to-point IPsec
VPN on the Cisco ASA and Cisco Firepower Next-Generation Firewall
(NGFW)

AMANDA NICOL Describe and deploy Cisco secure remote access connectivity solutions
IT SUPPORT SERVICES and describe how to conf igure 802.1X and Extensible Authentication
MANAGER - HEALT H WORLD
Protocol (EAP) authentication
LIMIT ED

Provide basic understanding of endpoint security and describe Advanced


Malware Protection (AMP) f or Endpoints architecture and basic f eatures

Examine various def ences on Cisco devices that protect the control and
management plane

Conf igure and verif y Cisco IOS sof tware Layer 2 and Layer 3 data plane
controls

Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions

https://www.lumifywork.com/en-ph/courses/implementing-and-operating-cisco-security-core-technologies-scor/

[email protected] facebook.com/LumifyWorkPh twitter.com/LumifyWorkPH

lumifywork.com linkedin.com/company/lumify-work-ph youtube.com/@lumifywork


IT INFRASTRUCTURE AND NETWORKS

Implementing and Operating Cisco


Security Core Technologies (SCOR)

Describe basics of cloud computing and common cloud attacks and how
to secure cloud environment

Lumif y Work
Cust omised Tra ining

We can also deliver and customise


this training course for larger
groups saving your organisation
time, money and resources.

For more information, please


contact us on 02 8286 9429.

https://www.lumifywork.com/en-ph/courses/implementing-and-operating-cisco-security-core-technologies-scor/

[email protected] facebook.com/LumifyWorkPh twitter.com/LumifyWorkPH

lumifywork.com linkedin.com/company/lumify-work-ph youtube.com/@lumifywork


IT INFRASTRUCTURE AND NETWORKS

Implementing and Operating Cisco


Security Core Technologies (SCOR)

COURSE SUBJECTS
Describing Inf o rm at io n Securit y Co ncept s *
Inf ormation Security Overview

Assets, Vulnerabilities, and Countermeasures

Managing Risk

Vulnerability Assessment

Understanding Common Vulnerability Scoring System (CVSS)

Describing Co m m o n TCP/IP At t acks *


Legacy TCP/IP Vulnerabilities

IP Vulnerabilities

Internet Control Message Protocol (ICMP) Vulnerabilities

TCP Vulnerabilities

User Datagram Protocol (UDP) Vulnerabilities

Attack Surf ace and Attack Vectors

Reconnaissance Attacks

Access Attacks

Man-in-the-Middle Attacks

Denial of Service and Distributed Denial of Service Attacks

Ref lection and Amplif ication Attacks

Spoof ing Attacks

Dynamic Host Conf iguration Protocol (DHCP) Attacks

Describing Co m m o n Net wo rk Applicat io n At t acks *


Password Attacks

https://www.lumifywork.com/en-ph/courses/implementing-and-operating-cisco-security-core-technologies-scor/

[email protected] facebook.com/LumifyWorkPh twitter.com/LumifyWorkPH

lumifywork.com linkedin.com/company/lumify-work-ph youtube.com/@lumifywork


IT INFRASTRUCTURE AND NETWORKS

Implementing and Operating Cisco


Security Core Technologies (SCOR)

Domain Name System (DNS)-Based Attacks

DNS Tunneling

Web-Based Attacks

HT T P 302 Cushioning

Command Injections

SQL Injections

Cross-Site Scripting and Request Forgery

Email-Based Attacks

Describing Co m m o n Endpo int At t acks *


Buf f er Overf low

Malware

Reconnaissance Attack

Gaining Access and Control

Gaining Access via Social Engineering

Gaining Access via Web-Based Attacks

Exploit Kits and Rootkits

Privilege Escalation

Post-Exploitation Phase

Angler Exploit Kit

Describing Net wo rk Securit y Techno lo gies

Def ence-in-Depth Strategy

Def ending Across the Attack Continuum

Network Segmentation and Virtualisation Overview

https://www.lumifywork.com/en-ph/courses/implementing-and-operating-cisco-security-core-technologies-scor/

[email protected] facebook.com/LumifyWorkPh twitter.com/LumifyWorkPH

lumifywork.com linkedin.com/company/lumify-work-ph youtube.com/@lumifywork


IT INFRASTRUCTURE AND NETWORKS

Implementing and Operating Cisco


Security Core Technologies (SCOR)

Statef ul Firewall Overview

Security Intelligence Overview

T hreat Inf ormation Standardisation

Network-Based Malware Protection Overview

Intrusion Prevention System (IPS) Overview

Next Generation Firewall Overview

Email Content Security Overview

Web Content Security Overview

T hreat Analytic Systems Overview

DNS Security Overview

Authentication, Authorisation, and Accounting Overview

Identity and Access Management Overview

Virtual Private Network Technology Overview

Network Security Device Form Factors Overview

Deplo ying Cisco ASA Firewall


Cisco ASA Deployment Types

Cisco ASA Interf ace Security Levels

Cisco ASA Objects and Object Groups

Network Address Translation

Cisco ASA Interf ace Access Control Lists (ACLs)

Cisco ASA Global ACLs

Cisco ASA Advanced Access Policies

Cisco ASA High Availability Overview

https://www.lumifywork.com/en-ph/courses/implementing-and-operating-cisco-security-core-technologies-scor/

[email protected] facebook.com/LumifyWorkPh twitter.com/LumifyWorkPH

lumifywork.com linkedin.com/company/lumify-work-ph youtube.com/@lumifywork


IT INFRASTRUCTURE AND NETWORKS

Implementing and Operating Cisco


Security Core Technologies (SCOR)

Deplo ying Cisco Firepo wer Next -Generat io n Firewall

Cisco Firepower NGFW Deployments

Cisco Firepower NGFW Packet Processing and Policies

Cisco Firepower NGFW Objects

Cisco Firepower NGFW Network Address Translation (NAT )

Cisco Firepower NGFW Pref ilter Policies

Cisco Firepower NGFW Access Control Policies

Cisco Firepower NGFW Security Intelligence

Cisco Firepower NGFW Discovery Policies

Cisco Firepower NGFW IPS Policies

Cisco Firepower NGFW Malware and File Policies

Deplo ying Em ail Co nt ent Securit y


Cisco Email Content Security Overview

Simple Mail Transf er Protocol (SMT P) Overview

Email Pipeline Overview

Public and Private Listeners

Host Access Table Overview

Recipient Access Table Overview

Mail Policies Overview

Protection Against Spam and Graymail

Anti-virus and Anti-malware Protection

Outbreak Filters

Content Filters

https://www.lumifywork.com/en-ph/courses/implementing-and-operating-cisco-security-core-technologies-scor/

[email protected] facebook.com/LumifyWorkPh twitter.com/LumifyWorkPH

lumifywork.com linkedin.com/company/lumify-work-ph youtube.com/@lumifywork


IT INFRASTRUCTURE AND NETWORKS

Implementing and Operating Cisco


Security Core Technologies (SCOR)

Data Loss Prevention

Email Encryption

Deplo ying Web Co nt ent Securit y


Cisco Web Security Appliance (WSA) Overview

Deployment Options

Network Users Authentication

Secure HT T P (HT T PS) Traf f ic Decryption

Access Policies and Identif ication Prof iles

Acceptable Use Controls Settings

Anti-Malware Protection

Deplo ying Cisco Um brella *


Cisco Umbrella Architecture

Deploying Cisco Umbrella

Cisco Umbrella Roaming Client

Managing Cisco Umbrella

Cisco Umbrella Investigate Overview and Concepts

Explaining VPN Techno lo gies and Crypt o graphy


VPN Def inition

VPN Types

Secure Communication and Cryptographic Services

Keys in Cryptography

Public Key Inf rastructure

Int ro ducing Cisco Secure Sit e-t o -Sit e VPN So lut io ns

https://www.lumifywork.com/en-ph/courses/implementing-and-operating-cisco-security-core-technologies-scor/

[email protected] facebook.com/LumifyWorkPh twitter.com/LumifyWorkPH

lumifywork.com linkedin.com/company/lumify-work-ph youtube.com/@lumifywork


IT INFRASTRUCTURE AND NETWORKS

Implementing and Operating Cisco


Security Core Technologies (SCOR)

Site-to-Site VPN Topologies

IPsec VPN Overview

IPsec Static Crypto Maps

IPsec Static Virtual Tunnel Interf ace

Dynamic Multipoint VPN

Cisco IOS FlexVPN

Deplo ying Cisco IO S VT I-Based Po int -t o -Po int IPsec VPNs


Cisco IOS VT Is

Static VT I Point-to-Point IPsec Internet Key Exchange (IKE) v2 VPN


Conf iguration

Deplo ying Po int -t o -Po int IPsec VPNs o n t he Cisco ASA and Cisco
Firepo wer NGFW

Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW

Cisco ASA Point-to-Point VPN Conf iguration

Cisco Firepower NGFW Point-to-Point VPN Conf iguration

Int ro ducing Cisco Secure Rem o t e Access VPN So lut io ns

Remote Access VPN Components

Remote Access VPN Technologies

Secure Sockets Layer (SSL) Overview

Deplo ying Rem o t e Access SSL VPNs o n t he Cisco ASA and Cisco
Firepo wer NGFW
Remote Access Conf iguration Concepts

Connection Prof iles

Group Policies

https://www.lumifywork.com/en-ph/courses/implementing-and-operating-cisco-security-core-technologies-scor/

[email protected] facebook.com/LumifyWorkPh twitter.com/LumifyWorkPH

lumifywork.com linkedin.com/company/lumify-work-ph youtube.com/@lumifywork


IT INFRASTRUCTURE AND NETWORKS

Implementing and Operating Cisco


Security Core Technologies (SCOR)

Cisco ASA Remote Access VPN Conf iguration

Cisco Firepower NGFW Remote Access VPN Conf iguration

Explaining Cisco Secure Net wo rk Access So lut io ns

Cisco Secure Network Access

Cisco Secure Network Access Components

AAA Role in Cisco Secure Network Access Solution

Cisco Identity Services Engine

Cisco TrustSec

Describing 802.1X Aut hent icat io n


802.1X and Extensible Authentication Protocol (EAP)

EAP Methods

Role of Remote Authentication Dial-in User Service (RADIUS) in 802.1X


Communications

RADIUS Change of Authorisation

Co nf iguring 802.1X Aut hent icat io n


Cisco Catalyst Switch 802.1X Conf iguration

Cisco Wireless LAN Controller (WLC) 802.1X Conf iguration

Cisco Identity Services Engine (ISE) 802.1X Conf iguration

Supplicant 802.1x Conf iguration

Cisco Central Web Authentication

Describing Endpo int Securit y Techno lo gies *

Host-Based Personal Firewall

Host-Based Anti-Virus

https://www.lumifywork.com/en-ph/courses/implementing-and-operating-cisco-security-core-technologies-scor/

[email protected] facebook.com/LumifyWorkPh twitter.com/LumifyWorkPH

lumifywork.com linkedin.com/company/lumify-work-ph youtube.com/@lumifywork


IT INFRASTRUCTURE AND NETWORKS

Implementing and Operating Cisco


Security Core Technologies (SCOR)

Host-Based Intrusion Prevention System

Application Whitelists and Blacklists

Host-Based Malware Protection

Sandboxing Overview

File Integrity Checking

Deplo ying Cisco Advanced Malware Pro t ect io n (AMP) f o r Endpo int s *
Cisco AMP f or Endpoints Architecture

Cisco AMP f or Endpoints Engines

Retrospective Security with Cisco AMP

Cisco AMP Device and File Trajectory

Managing Cisco AMP f or Endpoints

Int ro ducing Net wo rk Inf rast ruct ure Pro t ect io n *


Identif ying Network Device Planes

Control Plane Security Controls

Management Plane Security Controls

Network Telemetry

Layer 2 Data Plane Security Controls

Layer 3 Data Plane Security Controls

Deplo ying Co nt ro l Plane Securit y Co nt ro ls *


Inf rastructure ACLs

Control Plane Policing

Control Plane Protection

Routing Protocol Security

https://www.lumifywork.com/en-ph/courses/implementing-and-operating-cisco-security-core-technologies-scor/

[email protected] facebook.com/LumifyWorkPh twitter.com/LumifyWorkPH

lumifywork.com linkedin.com/company/lumify-work-ph youtube.com/@lumifywork


IT INFRASTRUCTURE AND NETWORKS

Implementing and Operating Cisco


Security Core Technologies (SCOR)

Deplo ying Layer 2 Dat a Plane Securit y Co nt ro ls *


Overview of Layer 2 Data Plane Security Controls

Virtual LAN (VLAN)-Based Attacks Mitigation

Spanning Tree Protocol (ST P) Attacks Mitigation

Port Security

Private VLANs

Dynamic Host Conf iguration Protocol (DHCP) Snooping

Address Resolution Protocol (ARP) Inspection

Storm Control

MACsec Encryption

Deplo ying Layer 3 Dat a Plane Securit y Co nt ro ls *


Inf rastructure Antispoof ing ACLs

Unicast Reverse Path Forwarding

IP Source Guard

Deplo ying Managem ent Plane Securit y Co nt ro ls *


Cisco Secure Management Access

Simple Network Management Protocol Version 3

Secure Access to Cisco Devices

AAA f or Management Access

Deplo ying Traf f ic Telem et ry Met ho ds *

Network T ime Protocol

Device and Network Events Logging and Export

Network Traf f ic Monitoring Using NetFlow

https://www.lumifywork.com/en-ph/courses/implementing-and-operating-cisco-security-core-technologies-scor/

[email protected] facebook.com/LumifyWorkPh twitter.com/LumifyWorkPH

lumifywork.com linkedin.com/company/lumify-work-ph youtube.com/@lumifywork


IT INFRASTRUCTURE AND NETWORKS

Implementing and Operating Cisco


Security Core Technologies (SCOR)

Deplo ying Cisco St ealt hwat ch Ent erprise *


Cisco Stealthwatch Of f erings Overview

Cisco Stealthwatch Enterprise Required Components

Flow Stitching and Deduplication

Stealthwatch Enterprise Optional Components

Stealthwatch Enterprise and ISE Integration

Cisco Stealthwatch with Cognitive Analytics

Cisco Encrypted Traf f ic Analytics

Host Groups

Security Events and Alarms

Host, Role, and Def ault Policies

Describing Clo ud and Co m m o n Clo ud At t acks *


Evolution of Cloud Computing

Cloud Service Models

Security Responsibilities in Cloud

Cloud Deployment Models

Common Security T hreats in Cloud

Patch Management in the Cloud

Security Assessment in the Cloud

Securing t he Clo ud *

Cisco T hreat-Centric Approach to Network Security

Cloud Physical Environment Security

Application and Workload Security

https://www.lumifywork.com/en-ph/courses/implementing-and-operating-cisco-security-core-technologies-scor/

[email protected] facebook.com/LumifyWorkPh twitter.com/LumifyWorkPH

lumifywork.com linkedin.com/company/lumify-work-ph youtube.com/@lumifywork


IT INFRASTRUCTURE AND NETWORKS

Implementing and Operating Cisco


Security Core Technologies (SCOR)

Cloud Management and API Security

Network Function Virtualisation (NFV) and Virtual Network Functions


(VNF)

Cisco NFV Examples

Reporting and T hreat Visibility in Cloud

Cloud Access Security Broker

Cisco CloudLock

OAuth and OAuth Attacks

Deplo ying Cisco St ealt hwat ch Clo ud *

Cisco Stealthwatch Cloud f or Public Cloud Monitoring

Cisco Stealthwatch Cloud f or Private Network Monitoring

Cisco Stealthwatch Cloud Operations

Describing So f t ware-Def ined Net wo rking (SDN) *

Sof tware-Def ined Networking Concepts

Network Programmability and Automation

Cisco Platf orms and APIs

Basic Python Scripts f or Automation

* This section is self-study material that can be done at your own pace after the
instructor-led portion of the course.

Labs:

Conf igure Network Settings and NAT on Cisco ASA

Conf igure Cisco ASA Access Control Policies

Conf igure Cisco Firepower NGFW NAT

Conf igure Cisco Firepower NGFW Access Control Policy

https://www.lumifywork.com/en-ph/courses/implementing-and-operating-cisco-security-core-technologies-scor/

[email protected] facebook.com/LumifyWorkPh twitter.com/LumifyWorkPH

lumifywork.com linkedin.com/company/lumify-work-ph youtube.com/@lumifywork


IT INFRASTRUCTURE AND NETWORKS

Implementing and Operating Cisco


Security Core Technologies (SCOR)

Conf igure Cisco Firepower NGFW Discovery and IPS Policy

Conf igure Cisco NGFW Malware and File Policy

Conf igure Listener, Host Access Table (HAT ), and Recipient Access
Table (RAT ) on Cisco Email Security Appliance (ESA)

Conf igure Mail Policies

Conf igure Proxy Services, Authentication, and HT T PS Decryption

Enf orce Acceptable Use Control and Malware Protection

Examine the Umbrella Dashboard

Examine Cisco Umbrella Investigate

Explore DNS Ransomware Protection by Cisco Umbrella

Conf igure Static VT I Point-to-Point IPsec IKEv2 Tunnel

Conf igure Point-to-Point VPN between the Cisco ASA and Cisco
Firepower NGFW

Conf igure Remote Access VPN on the Cisco Firepower NGFW

Explore Cisco AMP f or Endpoints

Perf orm Endpoint Analysis Using AMP f or Endpoints Console

Explore File Ransomware Protection by Cisco AMP f or Endpoints


Console

Explore Cisco Stealthwatch Enterprise v6.9.3

Explore Cognitive T hreat Analytics (CTA) in Stealthwatch Enterprise v7.0

Explore the Cisco Cloudlock Dashboard and User Security

Explore Cisco Cloudlock Application and Data Security

Explore Cisco Stealthwatch Cloud

Explore Stealthwatch Cloud Alert Settings, Watchlists, and Sensors

https://www.lumifywork.com/en-ph/courses/implementing-and-operating-cisco-security-core-technologies-scor/

[email protected] facebook.com/LumifyWorkPh twitter.com/LumifyWorkPH

lumifywork.com linkedin.com/company/lumify-work-ph youtube.com/@lumifywork


IT INFRASTRUCTURE AND NETWORKS

Implementing and Operating Cisco


Security Core Technologies (SCOR)

WHO IS THE COURSE FOR?


Security engineer

Network engineer

Network designer

Network administrator

Systems engineer

Consulting systems engineer

Technical solutions architect

Network manager

Cisco integrators and partners

PREREQ UISITES
Knowledge and skills you should have bef ore attending this course:

Skills and knowledge equivalent to those learned in Implementing and


Administering Cisco Solutions (CCNA) course

Familiarity with Ethernet and TCP/IP networking

Working knowledge of the Windows operating system

Working knowledge of Cisco IOS networking and concepts

Familiarity with basics of networking security concepts

The s upply of this cours e by Lumify Work is governed by the booking terms and conditions . Pleas e read the terms and
conditions carefully before enrolling in this cours e, as enrolment in the cours e is conditional on acceptance of thes e terms and
conditions .

https://www.lumifywork.com/en-ph/courses/implementing-and-operating-cisco-security-core-technologies-scor/

[email protected] facebook.com/LumifyWorkPh twitter.com/LumifyWorkPH

lumifywork.com linkedin.com/company/lumify-work-ph youtube.com/@lumifywork

You might also like