About the Book
Level up your career in expert-level security job roles with this video-based online training course designed to help you master a vast array of security topics and prepare at your own pace for the Implementing and Operating Cisco Security Core Technologies v1.0 (SCOR 350-701) exam. This exam is associated with the CCNP Security, Cisco Certified Specialist - Security Core, and CCIE Security certifications.
The expert-led certification prep course provides configuration demos, troubleshooting implementations, and a detailed exploration of general security concepts, such as network security, cloud security, content security, endpoint protection and detection, and network access, visibility, and enforcement.
Who should take this course Skill level | Intermediate to advanced
Network security professionals, as well as network designers, administrators, and engineers
Anyone planning to take the current CCNP Security certification exam
Anyone planning to pursue the CCNP Security, Cisco Certified Specialist - Security Core, and CCIE Security certifications
This self-paced online training product requires a working knowledge of Ethernet, TCP/IP, and Cisco IOS networking concepts, and a basic understanding of core security technologies. The knowledge required to earn a CCNA certification would serve as a good foundation for this course.
For an optimal course experience, we recommend using these browsers and devices.
Course includes
12 hours of targeted lessons with dynamic presentations, demos, and illustrated techniques to help you attain a better grasp of how security threats, preventative measures, and mitigation methods coalesce
Hands-on labs to simulate real-world experience
Self-study tools, such as quizzes, flash cards and exclusive practice exams to ensure readiness
Tips on taking the CCNP and CCIE Security Core SCOR 350-701 exam
1 year of access*
What you'll learn This Pearson IT Training Course covers the six main domains outlined in the SCOR 350-701 exam blueprint, including:
Identify, mitigate, and prevent common cybersecurity threats
Understand and implement various cryptography methods
Apply Software-Defined Networking (SDN) and network programmability to streamline your networks security
Manage network access, authentication, and user identity through proven tools and techniques
Maintain the integrity of network infrastructure security through network tools, firewalls, and intrusion prevention systems
Implement site-to-site and remote access virtual private networks (VPNs)
Secure your network content on-premise and in the Cloud
Implement Endpoint Threat Detection and Response (ETDR) and Endpoint Detection and Response (EDR)
Prepare for the CCNP and CCIE Security Core SCOR 350-701 exam
*Retake guarantee Didn't pass your certification exam on your first try? We'll give you six months of additional access at no cost.
About Pearson IT Training Courses Pearson IT Training Courses are complete and affordable packages of expert-led, self-paced courses designed to help you stand out with in-demand skills that take your career to the next level.
From learning to hands-on practice and application, our comprehensive certification prep courses ensure you are ready for exam success.
Table of Contents:
Introduction
Overview
Module 1: Cybersecurity Fundamentals
Module 1: Introduction
Lesson 1: Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments
Lesson 1 Learning objectives
1.1 Understanding Malware, Viruses, Trojans, and Rootkits
1.2 Keyloggers and Spyware
1.3 Malware Analysis Techniques
1.4 Surveying Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks
1.5 Surveying Common Application-based Vulnerabilities
1.6 Exploiting Cross-site Scripting (XSS) and Cross-site Request Forgery (CSRF) Vulnerabilities
1.7 Exploiting Authentication and Authorization-based Vulnerabilities
1.8 Understanding SQL Injection and Path Traversal Vulnerabilities
1.9 Understanding Buffer Overflows
1.1 Surveying Unsecure Code Practices and Insecure APIs
1.11 Understanding Security Threats in Cloud Environments
1.12 Understanding IoT Security Threats
Lesson 1: Review
Lesson 1 Flashcards
Lesson 1 Quiz
Lesson 1: Interactive Labs
Lesson 2: Cryptography
Lesson 2 Learning objectives
2.1 Introducing Cryptography and Cryptanalysis
2.2 Understanding Encryption Protocols
2.3 Describing Hashing Algorithms
2.4 Introducing Public Key Infrastructure (PKI)
2.5 Introducing Certificate Authorities (CAs) and Certificate Enrollment
2.6 Surveying SSL and TLS Implementations
2.7 Surveying IPsec Implementations
Lesson 2: Review
Lesson 2 Flashcards
Lesson 2 Quiz
Lesson 2: Interactive Labs
Module 1: Quiz
Module 2: Software-Defined Networking Security and Network Programmability
Module 2: Introduction
Lesson 3: Software-Defined Networking Security
Lesson 3 Learning objectives
3.1 Introducing SDN
3.2 Explaining North Bound and South Bound APIs in the SDN Architecture
3.3 Introducing Cisco ACI
3.4 Introducing Cisco DNA and Cisco DNA Center
3.5 Understanding VXLAN and Network Overlays
3.6 Understanding Microsegmentation
3.7 Surveying Open Source SDN Solutions
3.8 Understanding the Threats Against SDN Solutions
3.9 Understanding the Security Benefits in SDN Solutions
Lesson 3: Review
Lesson 3 Flashcards
Lesson 3 Quiz
Lesson 3: Interactive Labs
Lesson 4: Network Programmability
Lesson 4 Learning objectives
4.1 Introducing Network Programmability
4.2 Exploring DevNet and DevNet Resources for Security Automation
4.3 Introducing APIs, NETCONF, RESTCONF, and YANG
4.4 A Brief Introduction to Git
4.5 Exploring pxGrid
4.6 Integrating and Automating Security Operations with Cisco Products
Lesson 4: Review
Lesson 4 Flashcards
Lesson 4 Quiz
Lesson 4: Interactive Labs
Module 2: Quiz
Module 3: AAA, Identity Management, Network Visibility, and Segmentation
Module 3: Introduction
Lesson 5: Introducing AAA and Identity Management
Lesson 5 Learning objectives
5.1 Understanding Authentication
5.2 Exploring the RADIUS Protocol
5.3 Surveying the TACACS+ Protocol
5.4 Understanding Authorization
5.5 Surveying Authorization Models
5.6 Defining Accounting
5.7 Exploring Multifactor Authentication and Single Sign-On
5.8 Exploring Examples of Multifactor and Single Sign-On
5.9 Understanding Cisco Duo
5.1 Introducing Cisco ISE
5.11 Understanding Cisco ISE Profiling Services
5.12 Understanding ISE Identity Services
5.13 Describing ISE Authorization Rules
Lesson 5: Review
Lesson 5 Flashcards
Lesson 5 Quiz
Lesson 5: Interactive Labs
Lesson 6: Secure Network Access, Visibility, and Segmentation
Lesson 6 Learning objectives
6.1 Defining Network Visibility and Segmentation
6.2 Introducing NetFlow and IPFIX
6.3 Describing Flexible NetFlow Records
6.4 Understanding NetFlow Deployment
6.5 Exploring Cisco Stealthwatch
6.6 Deploying Cisco Stealthwatch Cloud
6.7 On-Premise Monitoring with Stealthwatch Cloud
6.8 Exploring the Cisco TrustSec Solution
6.9 Describing the Benefits of Device Compliance and Application Control
6.1 Introducing Network Segmentation
6.11 Exploring Application-based Segmentation
6.12 Understanding Cisco ACI
6.13 Describing Network Access with CoA
6.14 Integrating Different Security Systems Using pxGrid
6.15 Exploring Cisco Encrypted Traffic Analytics (ETA), Cisco Cognitive Threat Analytics (CTA), and Cisco Threat Grid
Lesson 6: Review
Lesson 6 Flashcards
Lesson 6 Quiz
Lesson 6: Interactive Labs
Module 3: Quiz
Module 4: Infrastructure Security, Firewalls, and Intrusion Prevention Systems
Module 4: Introduction
Lesson 7: Infrastructure Security
Lesson 7 Learning objectives
7.1 Configuring and Verifying Network Segmentation Using VLANs and VRF-lite
7.2 Configuring and Verifying Port Security
7.3 Configuring and Verifying DHCP Snooping
7.4 Configuring and Verifying Dynamic ARP Inspection
7.5 Exploring and Mitigating Common Layer 2 Threats
7.6 Understanding and Configuring BPDU Guard and Root Guard
7.7 Understanding and Configuring CDP/LLDP
7.8 Understanding the Control Plane, Data Plane, and Management Plane
7.9 Exploring How to Secure the Management Plane
7.1 Exploring How to Secure the Control Plane
7.11 Exploring How to Secure the Data Plane
Lesson 7: Review
Lesson 7 Flashcards
Lesson 7 Quiz
Lesson 7: Interactive Labs
Lesson 8: Cisco Next-Generation Firewalls
Lesson 8 Learning objectives
8.1 Introducing Cisco Next-Generation Firewalls
8.2 Surveying the Cisco Firepower Management Center (FMC)
8.3 Exploring the Cisco Firepower Device Manager (FDM)
8.4 Implementing Access Control Policies
Lesson 8: Review
Lesson 8 Flashcards
Lesson 8 Quiz
Lesson 8: Interactive Labs
Lesson 9: Cisco Next-Generation Intrusion Prevention Systems
Lesson 9 Learning Objectives
9.1 Introducing Cisco Next-Generation Intrusion Prevention Systems
9.2 Describing Deployment Models of Network Security Solutions and Architectures That Provide Intrusion Prevention Capabilities
9.3 Configuring Cisco Next-Generation Intrusion Prevention Systems
Lesson 9: Review
Lesson 9 Flashcards
Lesson 9 Quiz
Lesson 9: Interactive Labs
Module 4: Quiz
Module 5: Virtual Private Networks (VPNs)
Module 5: Introduction
Lesson 10: Site-to-site VPN Implementations
Lesson 10 Learning objectives
10.1 Introduction to IPsec Site-to-site and Remote Access VPNs
10.2 Configuring IPsec Site-to-site VPNs
10.3 Configuring Traditional Site-to-site VPN Utilizing Cisco Routers
10.4 Exploring DMVPN
10.5 Understanding GET VPN
10.6 Deploying FlexVPN
10.7 Troubleshooting Site-to-site VPN Implementations
Lesson 10: Review
Lesson 10 Flashcards
Lesson 10 Quiz
Lesson 10: Interactive Labs
Lesson 11: Remote Access VPN
Lesson 11 Learning Objectives
11.1 Introducing Remote Access VPNs
11.2 Exploring Clientless Remote Access VPNs
11.3 Surveying Remote Access VPN Implementations Using Cisco AnyConnect Secure Mobility Client
11.4 Configuring Remote Access VPN in Cisco ASA and in Cisco FTD
11.5 Troubleshooting Remote Access VPN Implementations
Lesson 11: Review
Lesson 11 Flashcards
Lesson 11 Quiz
Lesson 11: Interactive Labs
Module 5: Quiz
Module 6: Securing the Cloud and Content Security
Module 6: Introduction
Lesson 12: Securing the Cloud
Lesson 12 Learning objectives
12.1 Introducing the Different Cloud Deployment and Service Models
12.2 Surveying Patch Management in the Cloud
12.3 Performing Security Assessments in Cloud Environments
12.4 Introducing Agile, DevOps, and CI/CD Pipelines
12.5 Introducing Serverless Computing
12.6 Understanding Container Orchestration and an Introduction to Kubernetes
12.7 Exploring the Concepts of DevSecOps
12.8 Surveying Cisco Umbrella
12.9 Exploring Cisco Cloud Email Security
12.1 Exploring Cisco Cloudlock
Lesson 12: Review
Lesson 12 Flashcards
Lesson 12 Quiz
Lesson 12: Interactive Labs
Lesson 13: Content Security
Lesson 13 Learning Objectives
13.1 Introducing Cisco Content Security Solutions
13.2 Describing Web Proxy Identity and Authentication Including Transparent User Identification
13.3 Introduction to Cisco Email Security
13.4 Exploring the Cisco ESA Deployment Model
13.5 Understanding Email Security Features
13.6 Discussing Email Security in the Cloud
13.7 Introduction to Secure Internet Gateway (SIG)
13.8 Describing the Components, Capabilities, and Benefits of Cisco Umbrella
13.9 Exploring Cisco Umbrella Investigate
Lesson 13: Review
Lesson 13 Flashcards
Lesson 13 Quiz
Lesson 13: Interactive Labs
Module 6: Quiz
Module 7: Endpoint Security and Cisco Threat Response
Module 7: Introduction
Lesson 14: Endpoint Protection and Detection
Lesson 14 Learning objectives
14.1 Introducing AMP for Endpoints
14.2 Describing AMP for Endpoints Outbreak Control
14.3 Comparing Endpoint Threat Detection and Response (ETDR) and Endpoint Detection and Response (EDR) Solutions
14.4 Understanding AMP IP Blacklists and Whitelists
14.5 Exploring Application Control in AMP for Endpoints
14.6 Describing AMP for Endpoints Exclusion Sets
14.7 Introduction to AMP for Endpoints Policies
14.8 Describing the Anyconnect AMP Enabler
14.9 Exploring AMP for Endpoints Engines
14.1 How to Utilize AMP for Endpoints Reporting Features
14.11 Introducing the Cisco Threat Response Solution
Lesson 14: Review
Lesson 14 Flashcards
Lesson 14 Quiz
Lesson 14: Interactive Labs
Module 7: Quiz
About the Author :
Course experts
Omar Santos - Principal engineer, security expert, and author Omar Santos is a Principal Engineer of the Cisco Product Security Incident Response Team (PSIRT). Omar is the author of more than 20 books and video courses and has been quoted by numerous media outlets, such as TheRegister, Wired, ZDNet, ThreatPost, CyberScoop, TechCrunch, Fortune Magazine, Ars Technica, and more. You can follow Omar on Twitter @santosomar.
Ron Taylor Author, speaker, and Cisco Security Architect Ron Taylor has been in the information security field for almost 20 years, and works in the Cisco Product Security Incident Response Team (PSIRT). He has held a number of industry certifications, including GPEN, GWEB, GCIA, GCIH, GWAPT, RHCE, CCSP, CCNA, CISSP, and MCSE. Ron is also a Cisco Security Blackbelt, SANS mentor, cofounder and president of the Raleigh BSides Security Conference, and an active member of the Packet Hacking Village team at Defcon. You can follow Ron on Twitter @Gu5G0rman.