Video description
12+ Hours of Video InstructionMore than 12 hours of video instruction and remediation organized to prepare users to take the CCNP Security Core SCOR 350-701 exam and prepare for their CCIE Security studies.
Overview
The CCNP and CCIE Security Core SCOR 350-701 Complete Video Course is designed to provide you with more than 12 hours of instruction with the goal of fully preparing you for all aspects of the exam. Security professionals who already hold the CCNP Security certification and are currently preparing to advance to the CCIE Security certification will also find the contents of this course extremely beneficial in their studies. The course walks through the vast array of security topics through dynamic presentations, demos, and illustrated techniques to help you attain a better grasp of how all of these security threats, preventative measures, and mitigation methods coalesce. The end result of this understanding is to help you perform confidently on the exam as well as in your professional life. The course instructor, Omar Santos, is a Principal Engineer of the Cisco Product Security Incident Response Team (PSIRT). Omar is very active and a well-known subject matter expert in the security arena.
Through detailed exploration, configuration demos, and troubleshooting implementations, this course methodically guides you through the topics of general security concepts; network security; cloud security; content security; endpoint protection and detection; and network access, visibility, and enforcement. Not coincidentally, these are the six main domains outlined in the SCOR 350-701 exam blueprint.
Topics include:
Module 1: Cybersecurity Fundamentals
Module 2: Software Defined Networking Security and Network Programmability
Module 3: AAA, Identity Management, Network Visibility, and Segmentation
Module 4: Infrastructure Security, Firewalls, and Intrusion Prevention Systems
Module 5: Virtual Private Networks (VPNs)
Module 6: Securing the Cloud and Content Security
Module 7: Endpoint Security and Cisco Threat Response
About the Instructor
Omar Santos is the author of more than 20 books and video courses; numerous white papers, articles, and security configuration guidelines and best practices. Omar is a Principal Engineer of the Cisco PSIRT where he mentors and lead engineers and incident managers during the investigation and resolution of security vulnerabilities. Omar is an active member of the security community, where he leads several industry-wide initiatives and standard bodies.
Skill Level
Intermediate to Advanced
Learn How To
- Identify, mitigate, and prevent common cybersecurity threats
- Understand and implement various cryptography methods
- Apply Software-Defined Networking (SDN) and network programmability to streamline your network’s security
- Manage network access, authentication, and user identity through proven tools and techniques
- Maintain the integrity of network infrastructure security through network tools, firewalls, and intrusion prevention systems
- Implement site-to-site and remote access virtual private networks (VPNs)
- Secure your network content in on-premise and in the Cloud
- Implement Endpoint Threat Detection and Response (ETDR) and Endpoint Detection and Response (EDR)
- Pass the CCNP Security Core SCOR 350-701 exam
- Prepare for the CCIE Security certification
- CCNP Security certification candidates
- CCIE Security certification candidates
- Network designers, administrators, and engineers
- Network security professionals
- Skills and knowledge equivalent to those holding a CCNA certification
- Basic understanding of core security technologies
Module 1, “Cybersecurity Fundamentals,” provides an understanding of the wide-ranging cybersecurity threats against on-premise and cloud environments. You will also learn the fundamentals of cryptography that are covered in the exam.
Module 2, “Software Defined Networking Security and Network Programmability,” explores the tools, architecture, and security benefits and threats associated with Software-Defined Networking (SDN). Additionally, the lessons in this module explore the different methods and tools associated with network programmability. From the content in these lessons, you will learn why and how SDN and network programmability are extremely useful in today’s environments.
Module 3, “AAA, Identity Management, Network Visibility, and Segmentation,” begins with Lesson 5, which is an introduction to authentication, authorization, and accounting (AAA). Lesson 6 takes this a step further with a detailed look at identity management, Secure network access, visibility, and segmentation.
In Module 4, “Infrastructure Security, Firewalls, and Intrusion Prevention Systems,” details several of the attacks made against infrastructure devices (including routers, switches, and firewalls) and the best practices and solutions to help prevent or mitigate these attacks. The latter lessons in this module cover Cisco Next-Generation Firewalls and Cisco Next-Generation Intrusion Prevention Systems.
Module 5, “Virtual Private Networks (VPNs),” examines the process of how to deploy site-to-site and remote access VPN solutions to protect your data and your users.
Module 6, “Securing the Cloud and Content Security” starts with an introduction to the different cloud deployment and service models. You will learn about different technologies to protect and secure different cloud environments. You will also learn about the different Cisco Content Security solutions such as Cisco Web Security and Email Security Appliances.
Module 7, “Endpoint Security and Cisco Threat Response” covers Endpoint Protection & Detection, as well as the Cisco Threat Response solution.
About Pearson Video Training
Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
Table of contents
- Introduction
- Module 1: Cybersecurity Fundamentals
-
Lesson 1: Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments
- Learning objectives
- 1.1 Understanding Malware, Viruses, Trojans, and Rootkits
- 1.2 Keyloggers and Spyware
- 1.3 Malware Analysis Techniques
- 1.4 Surveying Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks
- 1.5 Surveying Common Application-based Vulnerabilities
- 1.6 Exploiting Cross-site Scripting (XSS) and Cross-site Request Forgery (CSRF) Vulnerabilities
- 1.7 Exploiting Authentication and Authorization-based Vulnerabilities
- 1.8 Understanding SQL Injection and Path Traversal Vulnerabilities
- 1.9 Understanding Buffer Overflows
- 1.10 Surveying Unsecure Code Practices and Insecure APIs
- 1.11 Understanding Security Threats in Cloud Environments
- 1.12 Understanding IoT Security Threats
-
Lesson 2: Cryptography
- Learning objectives
- 2.1 Introducing Cryptography and Cryptanalysis
- 2.2 Understanding Encryption Protocols
- 2.3 Describing Hashing Algorithms
- 2.4 Introducing Public Key Infrastructure (PKI)
- 2.5 Introducing Certificate Authorities (CAs) and Certificate Enrollment
- 2.6 Surveying SSL and TLS Implementations
- 2.7 Surveying IPsec Implementations
- Module 2: Software-Defined Networking Security and Network Programmability
-
Lesson 3: Software-Defined Networking Security
- Learning objectives
- 3.1 Introducing SDN
- 3.2 Explaining North Bound and South Bound APIs in the SDN Architecture
- 3.3 Introducing Cisco ACI
- 3.4 Introducing Cisco DNA and Cisco DNA Center
- 3.5 Understanding VXLAN and Network Overlays
- 3.6 Understanding Microsegmentation
- 3.7 Surveying Open Source SDN Solutions
- 3.8 Understanding the Threats Against SDN Solutions
- 3.9 Understanding the Security Benefits in SDN Solutions
- Lesson 4: Network Programmability
- Module 3: AAA, Identity Management, Network Visibility, and Segmentation
-
Lesson 5: Introducing AAA and Identity Management
- Learning objectives
- 5.1 Understanding Authentication
- 5.2 Exploring the RADIUS Protocol
- 5.3 Surveying the TACACS+ Protocol
- 5.4 Understanding Authorization
- 5.5 Surveying Authorization Models
- 5.6 Defining Accounting
- 5.7 Exploring Multifactor Authentication and Single Sign-On
- 5.8 Exploring Examples of Multifactor and Single Sign-On
- 5.9 Understanding Cisco DUO
- 5.10 Introducing Cisco ISE
- 5.11 Understanding Cisco ISE Profiling Services
- 5.12 Understanding ISE Identity Services
- 5.13 Describing ISE Authorization Rules
-
Lesson 6: Secure Network Access, Visibility, and Segmentation
- Learning objectives
- 6.1 Defining Network Visibility and Segmentation
- 6.2 Introducing NetFlow and IPFIX
- 6.3 Describing Flexible NetFlow Records
- 6.4 Understanding NetFlow Deployment
- 6.5 Exploring Cisco Stealthwatch
- 6.6 Deploying Cisco Stealthwatch Cloud
- 6.7 On-Premise Monitoring with Stealthwatch Cloud
- 6.8 Exploring the Cisco TrustSec Solution
- 6.9 Describing the Benefits of Device Compliance and Application Control
- 6.10 Introducing Network Segmentation
- 6.11 Exploring Application-based Segmentation
- 6.12 Understanding Cisco ACI
- 6.13 Describing Network Access with CoA
- 6.14 Integrating Different Security Systems Using pxGrid
- 6.15 Exploring Cisco Encrypted Traffic Analytics (ETA), Cisco Cognitive Threat Analytics (CTA), and Cisco Threat Grid
- Module 4: Infrastructure Security, Firewalls, and Intrusion Prevention Systems
-
Lesson 7: Infrastructure Security
- Learning objectives
- 7.1 Configuring and Verifying Network Segmentation Using VLANs and VRF-lite
- 7.2 Configuring and Verifying Port Security
- 7.3 Configuring and Verifying DHCP Snooping
- 7.4 Configuring and Verifying Dynamic ARP Inspection
- 7.5 Exploring and Mitigating Common Layer 2 Threats
- 7.6 Understanding and Configuring BPDU Guard and Root Guard
- 7.7 Understanding and Configuring CDP/LLDP
- 7.8 Understanding the Control Plane, Data Plane, and Management Plane
- 7.9 Exploring How to Secure the Management Plane
- 7.10 Exploring How to Secure the Control Plane
- 7.11 Exploring How to Secure the Data Plane
- Lesson 8: Cisco Next-Generation Firewalls
- Lesson 9: Cisco Next-Generation Intrusion Prevention Systems
- Module 5: Virtual Private Networks (VPNs)
-
Lesson 10: Site-to-site VPN Implementations
- Learning objectives
- 10.1 Introduction to IPsec Site-to-site and Remote Access VPNs
- 10.2 Configuring IPsec Site-to-site VPNs
- 10.3 Configuring Traditional Site-to-site VPN Utilizing Cisco Routers
- 10.4 Exploring DMVPN
- 10.5 Understanding GET VPN
- 10.6 Deploying FlexVPN
- 10.7 Troubleshooting Site-to-site VPN Implementations
-
Lesson 11: Remote Access VPN
- Learning objectives
- 11.1 Introducing Remote Access VPNs
- 11.2 Exploring Clientless Remote Access VPNs
- 11.3 Surveying Remote Access VPN Implementations Using Cisco AnyConnect Secure Mobility Client
- 11.4 Configuring Remote Access VPN in Cisco ASA and in Cisco FTD
- 11.5 Troubleshooting Remote Access VPN Implementations
- Module 6: Securing the Cloud and Content Security
-
Lesson 12: Securing the Cloud
- Learning objectives
- 12.1 Introducing the Different Cloud Deployment and Service Models
- 12.2 Surveying Patch Management in the Cloud
- 12.3 Performing Security Assessments in Cloud Environments
- 12.4 Introducing Agile, DevOps, and CI/CD Pipelines
- 12.5 Introducing Serverless Computing
- 12.6 Understanding Container Orchestration and an Introduction to Kubernetes
- 12.7 Exploring the Concepts of DevSecOps
- 12.8 Surveying Cisco Umbrella
- 12.9 Exploring Cisco Cloud Email Security
- 12.10 Exploring Cisco Cloudlock
-
Lesson 13: Content Security
- Learning objectives
- 13.1 Introducing Cisco Content Security Solutions
- 13.2 Describing Web Proxy Identity and Authentication Including Transparent User Identification
- 13.3 Introduction to Cisco Email Security
- 13.4 Exploring the Cisco ESA Deployment Model
- 13.5 Understanding Email Security Features
- 13.6 Discussing Email Security in the Cloud
- 13.7 Introduction to Secure Internet Gateway (SIG)
- 13.8 Describing the Components, Capabilities, and Benefits of Cisco Umbrella
- 13.9 Exploring Cisco Umbrella Investigate
- Module 7: Endpoint Security and Cisco Threat Response
-
Lesson 14: Endpoint Protection and Detection
- Learning objectives
- 14.1 Introducing AMP for Endpoints
- 14.2 Describing AMP for Endpoints Outbreak Control
- 14.3 Comparing Endpoint Threat Detection and Response (ETDR) and Endpoint Detection and Response (EDR) Solutions
- 14.4 Understanding AMP IP Blacklists and Whitelists
- 14.5 Exploring Application Control in AMP for Endpoints
- 14.6 Describing AMP for Endpoints Exclusion Sets
- 14.7 Introduction to AMP for Endpoints Policies
- 14.8 Describing the Anyconnect AMP Enabler
- 14.9 Exploring AMP for Endpoints Engines
- 14.10 How to Utilize AMP for Endpoints Reporting Features
- 14.11 Introducing the Cisco Threat Response Solution
- Summary
Product information
- Title: CCNP and CCIE Security Core SCOR 350-701
- Author(s):
- Release date: June 2020
- Publisher(s): Pearson
- ISBN: 0136583415
You might also like
book
CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide
Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and …
book
CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide, 2nd Edition
Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and …
book
CCNP and CCIE Enterprise Core ENCOR 350-401 Official Cert Guide
Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and …
book
CCNP and CCIE Enterprise Core ENCOR 350-401 Exam Cram
CCNP and CCIE Enterprise Core ENCOR 350-401 Exam Cram is the perfect study guide to help …