implementing-and-operating-cisco-security-core-technologies-scor
implementing-and-operating-cisco-security-core-technologies-scor
LENGTH VERSION
5 days 1.0
CISCO AT LUMIFY In this course, you will master the skills and technologies you need to
WORK implement core Cisco security solutions to provide advanced threat
protection against cybersecurity attacks. You will learn security f or
Lumify Work is the largest
provider of authorised Cisco
networks, cloud and content, endpoint protection, secure network access,
training in Australia, offering a visibility, and enf orcements. You will get extensive hands-on experience
wider range of Cisco courses, deploying Cisco Firepower Next-Generation Firewall and Cisco Adaptive
run more often than any of our Security Appliance (ASA) Firewall; conf iguring access control policies, mail
competitors. Lumify Work has policies, and 802.1X Authentication; and more. You will get introductory
won awards such as ANZ practice on Cisco Stealthwatch Enterprise and Cisco Stealthwatch Cloud
Learning Partner of the Year threat detection f eatures.
(twice!) and APJC Top Quality
Learning Partner of the Year. T he course includes additional self -study material that can be done at your
own pace af ter the instructor-led portion of the course.
T his course, including the self -paced material, helps prepare you to take the
exam 350-7 01 (SCOR), which leads to the CCNP Security, CCIE Security, and
the Cisco Certif ied Specialist - Security Core certif ications.
Digital courseware: Cisco provides students with electronic courseware for this
course. Students who have a confirmed booking will be sent an email prior to the
course start date, with a link to create an account
via learningspace.cisco.com before they attend their first day of class. Please note
that any electronic courseware or labs will not be available (visible) until the first day
of the class.
Exam Vouchers: Cisco exam vouchers are not included in the course fees but can
be purchased separately where applicable.
https://www.lumifywork.com/en-ph/courses/implementing-and-operating-cisco-security-core-technologies-scor/
Describe inf ormation security concepts and strategies within the network
My instructor was great being able Describe and implement basic email content security f eatures and
to put scenarios into real world
f unctions provided by Cisco Email Security Appliance
instances that related to my
specific situation.
Describe and implement web content security f eatures and f unctions
I was made to feel welcome from provided by Cisco Web Security Appliance
the moment I arrived and the
ability to sit as a group outside the Describe Cisco Umbrella security capabilities, deployment models, policy
classroom to discuss our
management, and Investigate console
situations and our goals was
extremely valuable.
Introduce VPNs and describe cryptography solutions and algorithms
I learnt a lot and felt it was
important that my goals by Describe Cisco secure site-to-site connectivity solutions and explain how
attending this course were met. to deploy Cisco Internetwork Operating System (Cisco IOS) Virtual Tunnel
Great job Lumify Work team. Interf ace (VT I)-based point-to-point IPsec VPNs, and point-to-point IPsec
VPN on the Cisco ASA and Cisco Firepower Next-Generation Firewall
(NGFW)
AMANDA NICOL Describe and deploy Cisco secure remote access connectivity solutions
IT SUPPORT SERVICES and describe how to conf igure 802.1X and Extensible Authentication
MANAGER - HEALT H WORLD
Protocol (EAP) authentication
LIMIT ED
Examine various def ences on Cisco devices that protect the control and
management plane
Conf igure and verif y Cisco IOS sof tware Layer 2 and Layer 3 data plane
controls
https://www.lumifywork.com/en-ph/courses/implementing-and-operating-cisco-security-core-technologies-scor/
Describe basics of cloud computing and common cloud attacks and how
to secure cloud environment
Lumif y Work
Cust omised Tra ining
https://www.lumifywork.com/en-ph/courses/implementing-and-operating-cisco-security-core-technologies-scor/
COURSE SUBJECTS
Describing Inf o rm at io n Securit y Co ncept s *
Inf ormation Security Overview
Managing Risk
Vulnerability Assessment
IP Vulnerabilities
TCP Vulnerabilities
Reconnaissance Attacks
Access Attacks
Man-in-the-Middle Attacks
https://www.lumifywork.com/en-ph/courses/implementing-and-operating-cisco-security-core-technologies-scor/
DNS Tunneling
Web-Based Attacks
HT T P 302 Cushioning
Command Injections
SQL Injections
Email-Based Attacks
Malware
Reconnaissance Attack
Privilege Escalation
Post-Exploitation Phase
https://www.lumifywork.com/en-ph/courses/implementing-and-operating-cisco-security-core-technologies-scor/
https://www.lumifywork.com/en-ph/courses/implementing-and-operating-cisco-security-core-technologies-scor/
Outbreak Filters
Content Filters
https://www.lumifywork.com/en-ph/courses/implementing-and-operating-cisco-security-core-technologies-scor/
Email Encryption
Deployment Options
Anti-Malware Protection
VPN Types
Keys in Cryptography
https://www.lumifywork.com/en-ph/courses/implementing-and-operating-cisco-security-core-technologies-scor/
Deplo ying Po int -t o -Po int IPsec VPNs o n t he Cisco ASA and Cisco
Firepo wer NGFW
Deplo ying Rem o t e Access SSL VPNs o n t he Cisco ASA and Cisco
Firepo wer NGFW
Remote Access Conf iguration Concepts
Group Policies
https://www.lumifywork.com/en-ph/courses/implementing-and-operating-cisco-security-core-technologies-scor/
Cisco TrustSec
EAP Methods
Host-Based Anti-Virus
https://www.lumifywork.com/en-ph/courses/implementing-and-operating-cisco-security-core-technologies-scor/
Sandboxing Overview
Deplo ying Cisco Advanced Malware Pro t ect io n (AMP) f o r Endpo int s *
Cisco AMP f or Endpoints Architecture
Network Telemetry
https://www.lumifywork.com/en-ph/courses/implementing-and-operating-cisco-security-core-technologies-scor/
Port Security
Private VLANs
Storm Control
MACsec Encryption
IP Source Guard
https://www.lumifywork.com/en-ph/courses/implementing-and-operating-cisco-security-core-technologies-scor/
Host Groups
Securing t he Clo ud *
https://www.lumifywork.com/en-ph/courses/implementing-and-operating-cisco-security-core-technologies-scor/
Cisco CloudLock
* This section is self-study material that can be done at your own pace after the
instructor-led portion of the course.
Labs:
https://www.lumifywork.com/en-ph/courses/implementing-and-operating-cisco-security-core-technologies-scor/
Conf igure Listener, Host Access Table (HAT ), and Recipient Access
Table (RAT ) on Cisco Email Security Appliance (ESA)
Conf igure Point-to-Point VPN between the Cisco ASA and Cisco
Firepower NGFW
https://www.lumifywork.com/en-ph/courses/implementing-and-operating-cisco-security-core-technologies-scor/
Network engineer
Network designer
Network administrator
Systems engineer
Network manager
PREREQ UISITES
Knowledge and skills you should have bef ore attending this course:
The s upply of this cours e by Lumify Work is governed by the booking terms and conditions . Pleas e read the terms and
conditions carefully before enrolling in this cours e, as enrolment in the cours e is conditional on acceptance of thes e terms and
conditions .
https://www.lumifywork.com/en-ph/courses/implementing-and-operating-cisco-security-core-technologies-scor/