Cisco CCNP Security - SCOR - 350-701

BY
Udemy

Develop a thorough understanding of the strategies and techniques for deploying and maintaining Cisco security core technologies.

Mode

Online

Fees

₹ 639 3499

Quick Facts

particular details
Medium of instructions English
Mode of learning Self study
Mode of Delivery Video and Text Based

Course overview

Ratnesh K - DC and Security Consultant & Trainer developed the Cisco CCNP Security - SCOR - 350-701 online certification, which is offered by Udemy and is designed for students who want to master the strategies and principles associated with cisco network security to become certified network architects, system engineers, and solutions architects. The Cisco CCNP Security - SCOR - 350-701 online courses by Udemy is designed to assist students in preparing for the Cisco CCNP and CCIE security certification examinations.

Cisco CCNP Security - SCOR - 350-701 online classes incorporate more than 29.5 hours of lessons along with 19 downloadable material which discusses the functionalities of Cisco firewall, Cisco ASA, Cisco IOS, virtual tunnel interface, routers, cisco email security, cisco stealth watch enterprise, cisco stealth watch and many more. By the end of this course, students will be able to explain the fundamentals of cloud computing, commonly used attacks, and how to safeguard cloud environments as well as have acquired skills in network security, network connectivity, accessibility, and enforcements.

The highlights

  • Certificate of completion
  • Self-paced course
  • 29.5 hours of pre-recorded video content
  • 19 downloadable resources

Program offerings

  • Online course
  • Learning resources. 30-day money-back guarantee
  • Unlimited access
  • Accessible on mobile devices and tv

Course and certificate fees

Fees information
₹ 639  ₹3,499
certificate availability

Yes

certificate providing authority

Udemy

What you will learn

After completing the Cisco CCNP Security - SCOR - 350-701 certification course, students will gain practical knowledge of Cisco ASA, Cisco IOS, and Cisco Firewall’s networking fundamentals, as well as an understanding of various network security technologies to protect against cyber attacks. Students will explore virtual tunnel interface, TCP/IP, ISE, VPN, ACI, DNS, router, and SNMP functionality. Students will learn about concepts associated with cisco stealth watch cloud, stealth watch enterprise, and cisco email security. In addition, students will learn about database vulnerabilities, asymmetric techniques, and data monitoring.

The syllabus

Section 01 - Security Concepts -- 25 % - Chapter -1 till 3

  • Course Introduction
  • SCOR Domain
  • Chapter 01 Cybersecurity starts..
  • NIST & ISO intro
  • What is Vulnerability & Threat
  • What is Exploit
  • Attack the network & get root access
  • Risk & types of Hackers
  • What is Threat Intelligence
  • Worm & Virus
  • Trojan
  • Other Threats such as Ransomware backdoors APT etc..
  • Ransomware attack Lab
  • Injection Vulnerabilities
  • Shodan Lab
  • Cross-site Scripting (XSS) & Unprotected APIs
  • Buffer Overflows Path Traversal OWASP Top 10
  • Chapter 02 Cryptography Starts..
  • Cryptography Ciphers
  • Asymmetric Algorithms & Hashes
  • Digital Signatures
  • IPSEC & SSL and TLS
  • Fundamentals Of PKI
  • ISE Certificate
  • ISE Certificate More..
  • Chapter 3 SDN Starts
  • SDN Features Part01
  • SDN Features Part02
  • Cisco approach to SDN Solution
  • Cisco SDWAN Solution Top View
  • SDN Features Part01
  • Describe Feature & Capabilities of DNAC
  • DNAC-API-01
  • DNAC-API-02
  • Section 1.8 Starts DNAC APIs
  • DNAC First API Lab - Get Token
  • Command Runner APIs
  • Site APIs
  • Network Discovery
  • Device list & Backup
  • DNAC Template
  • Troubleshooting related API
  • 1.9 Starts ..
  • Let's Learn Python
  • Python Conceptual Hierarchy
  • Configuration Copy and the FMC REST API 01
  • Use Python scripts to access the FMC REST API

Section 6 - Secure Network Access, Visibility, and Enforcement 15 % - Chapter 4 & 5

  • Chapter 4 aaa Starts ..
  • ISE Introduction
  • ISE Features & Capabilities
  • 802.1X MAB WebAuth Easy Connect
  • Certificates and Identity Stores
  • ISE Authentication
  • ISE Authorization
  • Wired Deployment
  • Wireless Deployment
  • VPN Deployment
  • ISE Architecture
  • ISE Dashboard & Context Visibility
  • ISE Profiling
  • ISE Probes part 01
  • ISE Probes Part 02
  • Lab Topology & Adding Device to ISE
  • Authentication Policy & Authorization profile
  • Authorization Profile
  • ISE Switch Configuration
  • Router & ASA Configuration
  • What is Posture
  • Posture Conditions
  • TrustSec _ MACsec 01
  • TrustSec _ MACsec 02
  • 6.4 Describe the benefits of device compliance and application control
  • What is ACI ?
  • ACI Constructs
  • 6.5 Explain exfiltration techniques
  • Model Driven Telemetry
  • 6.7 Starts
  • Introduction to Stealthwatch-
  • Appliance Setup Tool
  • Stealthwatch System Setup Tool
  • Appliance Post-Install Configuration & Verification
  • UDP Director Configuration
  • SMC Interface Configuration
  • Cisco ISE Integration
  • Add UDP Director Appliance & Configure Active Directory Lookup Feature
  • Exporter Health & Verify NetFlow Traffic to Flow Collector
  • Verify NetFlow Traffic to UDP Director
  • Stealthwatch Cloud
  • 6.7 c & d starts...
  • ISE PxGrid Integration with FMC
  • DNAC & ISE Integration Theory
  • DNAC & ISE Integration Lab 01
  • DNAC & ISE Integration Lab 02
  • DNS Security Cisco Umbrella
  • 6.7 CTA & ETA
  • 6.7.g Cisco AnyConnect Network Visibility Module (NVM)

Section 2.0 Network Security -- 20 %

  • Section 2.0 Starts
  • ASA & Firepower Comparison
  • Understanding the ASA & Firepower Hardware
  • About our lab task
  • Installing the Firepower Management Center
  • Installing the FTD at the HQ Site part 02 Installation
  • Installing the FTD at the HQ site Part 02 Interface configuration
  • Installing the FTD at the HQ Site part 02 Routing Deploy & Verification
  • Installing the FTD at the HQ Site Part 02 Shell & Summary
  • Scenario 3. Common Configurations for Example Corp Networks part 01 NAT Con
  • Scenario 3. Common Configurations for Example Corp Networks part 01 NAT Connect
  • Scenario 3. Common Configurations for Example Corp Networks part 01 More on
  • Scenario 3. Common Configurations for Example Corp Networks part 01 Verification
  • Scenario 4. Installing the FTD at the Remote1 Site Using Static IP for Mgmt
  • Configure remote1-ftd’s Data Plane Interface configuration & NAT 02
  • Configure remote1-ftd’s Data Plane verification 03
  • Scenario 5. Installing the FTD at the Remote2 Site Using DHCP IP for Mgmt 0
  • Configure remote2-ftd’s Data Plane & Testing .. 02
  • Firepower All in One Lab Section 1 to 3
  • URL Filtering Part 01
  • URL Filtering Part 02
  • SSL Policy Configuration
  • SSL Policy Verification
  • Malware & File Detection rules
  • Malware & File Detection Verification
  • Intrusion Policy
  • Platform Settings
  • VPN Setup
  • FMC and FTD Maintenance
  • Health Monitor
  • Data Monitoring
  • 2.3 Netflow starts
  • Understand Netflow
  • Netflow Configuration
  • Flexible Netflow
  • 2.4 a Starts
  • VRF
  • Vlan & trunk
  • DIA Port-security DHCP Snooping
  • PVLAN SPAN Macsec intro ..
  • Capture the Packet over Data Plan SPAN RSPAN ERSPAN
  • SPAN Lab
  • Private VLANs
  • vlan hopping stp manupulation & strom Control
  • 2.4 b Starts ...
  • Device Identity & Security
  • Secure Control & Data Plan
  • Combining Best of Breed in Security
  • Need of Qos
  • Qos Design & Implementation
  • Cisco Devices copp - Control Plane Policy
  • Control Plane Policy Lab
  • 2.8 Starts
  • SNMP Simple Network Mgmt Protocol
  • Cisco MIB & Versions of SNMP
  • SNMP Configuration
  • SNMP LAB
  • SNMP Lab result
  • SNMP V1 3 Quick Revision

Rest of Section 1 & 2 - ASA Firewall & VPN - Chapter 8

  • Chapter 8 Firewall & VPN - Rest of Section 1 & 2
  • Firewall goals Idea & Principle
  • Security Levels
  • Stateless Firewall
  • Statefull Firewall
  • Build Lab over VIRL
  • Basic Lab 1.1 Basic ASA Configuration
  • Lab 1.2 Telnet SSH & Object-Group
  • GRE & IPSEC Starts
  • GRE Generic Routing Encapsulation
  • IPSEC
  • VRF GRE IPSEC Lab Part 01
  • VRF GRE IPSEC Lab Part 02
  • VRF GRE IPSEC Verification
  • DMVPN Starts
  • DMVPN Overview
  • How DMVPN working 01
  • How DMVPN working 02
  • DMVPN Configuration Example
  • DMVPN Configuration Verification
  • IPSEC VPN Troubleshooting Introduction 01
  • IPSEC VPN Troubleshooting 02 Ticket 01 Part 01
  • IPSEC VPN Troubleshooting 03 Ticket 01 Part 02
  • IPSEC VPN Troubleshooting 04 Ticket 01 Part 03
  • IPSEC VPN Troubleshooting 05 Ticket 02 Part 01
  • IPSEC VPN Troubleshooting 06 Ticket 02 Part 02
  • IPSEC VPN Troubleshooting 07 Ticket 03
  • Remote Access - anyconnect part 01
  • Remote access - anyconnect part 02

Chapter 09 - Section 3.0 - Secure the Cloud - 15 %

  • 3.0 Secure the Cloud start
  • What is Cloud Computing & Cloud Providers
  • Common Cloud Characteristics
  • Measured Services
  • Infrastructure as a Service
  • Platform as a Service
  • SaaS & XaaS
  • Public Cloud
  • Private Cloud
  • Community & Hybrid Clouds
  • Cisco Intercloud
  • Patch management in the cloud
  • Security assessment in the cloud -- AWS
  • DNS Security Cisco Umbrella
  • SDWAN vManage & Umbrella Integration
  • Umbrella Configuration & verification
  • Describe the concept of DevSecOps
  • what is container - docker
  • Docker Kubam Basic Lab
  • SD-WAN Segmentation & Security
  • Section 3.5 Cisco Umbrella SIG
  • CISCO Email Security In The Cloud
  • CISCO CloudLock
  • Appdynamics Cloud Monitoring & Workload Optimization Manager
  • Cisco Titration

Instructors

Mr Ratnesh K

Mr Ratnesh K
Consultant & Trainer
Freelancer

Trending Courses

Popular Courses

Popular Platforms

Learn more about the Courses

Download the Careers360 App on your Android phone

Regular exam updates, QnA, Predictors, College Applications & E-books now on your Mobile

Careers360 App
150M+ Students
30,000+ Colleges
500+ Exams
1500+ E-books