ITP Course Practice Test
Home > Art, Film & Photography > ITP Course Practice Test: CCNP and CCIE Security Core SCOR 350-701
ITP Course Practice Test: CCNP and CCIE Security Core SCOR 350-701

ITP Course Practice Test: CCNP and CCIE Security Core SCOR 350-701

|
     0     
5
4
3
2
1




Out of Stock


Notify me when this book is in stock
About the Book

Level up your career in expert-level security job roles with this video-based online training course designed to help you master a vast array of security topics and prepare at your own pace for the Implementing and Operating Cisco Security Core Technologies v1.0 (SCOR 350-701) exam. This exam is associated with the CCNP Security, Cisco Certified Specialist - Security Core, and CCIE Security certifications. The expert-led certification prep course provides configuration demos, troubleshooting implementations, and a detailed exploration of general security concepts, such as network security, cloud security, content security, endpoint protection and detection, and network access, visibility, and enforcement. Who should take this course Skill level | Intermediate to advanced Network security professionals, as well as network designers, administrators, and engineers Anyone planning to take the current CCNP Security certification exam Anyone planning to pursue the CCNP Security, Cisco Certified Specialist - Security Core, and CCIE Security certifications This self-paced online training product requires a working knowledge of Ethernet, TCP/IP, and Cisco IOS networking concepts, and a basic understanding of core security technologies. The knowledge required to earn a CCNA certification would serve as a good foundation for this course. For an optimal course experience, we recommend using these browsers and devices. Course includes 12 hours of targeted lessons with dynamic presentations, demos, and illustrated techniques to help you attain a better grasp of how security threats, preventative measures, and mitigation methods coalesce Hands-on labs to simulate real-world experience Self-study tools, such as quizzes, flash cards and exclusive practice exams to ensure readiness Tips on taking the CCNP and CCIE Security Core SCOR 350-701 exam 1 year of access* What you'll learn This Pearson IT Training Course covers the six main domains outlined in the SCOR 350-701 exam blueprint, including: Identify, mitigate, and prevent common cybersecurity threats Understand and implement various cryptography methods Apply Software-Defined Networking (SDN) and network programmability to streamline your networks security Manage network access, authentication, and user identity through proven tools and techniques   Maintain the integrity of network infrastructure security through network tools, firewalls, and intrusion prevention systems   Implement site-to-site and remote access virtual private networks (VPNs)   Secure your network content on-premise and in the Cloud Implement Endpoint Threat Detection and Response (ETDR) and Endpoint Detection and Response (EDR) Prepare for the CCNP and CCIE Security Core SCOR 350-701 exam *Retake guarantee Didn't pass your certification exam on your first try? We'll give you six months of additional access at no cost. About Pearson IT Training Courses Pearson IT Training Courses are complete and affordable packages of expert-led, self-paced courses designed to help you stand out with in-demand skills that take your career to the next level. From learning to hands-on practice and application, our comprehensive certification prep courses ensure you are ready for exam success.

Table of Contents:
Introduction Overview Module 1: Cybersecurity Fundamentals Module 1: Introduction Lesson 1: Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments Lesson 1 Learning objectives 1.1 Understanding Malware, Viruses, Trojans, and Rootkits 1.2 Keyloggers and Spyware 1.3 Malware Analysis Techniques 1.4 Surveying Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks 1.5 Surveying Common Application-based Vulnerabilities 1.6 Exploiting Cross-site Scripting (XSS) and Cross-site Request Forgery (CSRF) Vulnerabilities 1.7 Exploiting Authentication and Authorization-based Vulnerabilities 1.8 Understanding SQL Injection and Path Traversal Vulnerabilities 1.9 Understanding Buffer Overflows 1.1 Surveying Unsecure Code Practices and Insecure APIs 1.11 Understanding Security Threats in Cloud Environments 1.12 Understanding IoT Security Threats Lesson 1: Review Lesson 1 Flashcards Lesson 1 Quiz Lesson 1: Interactive Labs Lesson 2: Cryptography Lesson 2 Learning objectives 2.1 Introducing Cryptography and Cryptanalysis 2.2 Understanding Encryption Protocols 2.3 Describing Hashing Algorithms 2.4 Introducing Public Key Infrastructure (PKI) 2.5 Introducing Certificate Authorities (CAs) and Certificate Enrollment 2.6 Surveying SSL and TLS Implementations 2.7 Surveying IPsec Implementations Lesson 2: Review Lesson 2 Flashcards Lesson 2 Quiz Lesson 2: Interactive Labs Module 1: Quiz Module 2: Software-Defined Networking Security and Network Programmability Module 2: Introduction Lesson 3: Software-Defined Networking Security Lesson 3 Learning objectives 3.1 Introducing SDN 3.2 Explaining North Bound and South Bound APIs in the SDN Architecture 3.3 Introducing Cisco ACI 3.4 Introducing Cisco DNA and Cisco DNA Center 3.5 Understanding VXLAN and Network Overlays 3.6 Understanding Microsegmentation 3.7 Surveying Open Source SDN Solutions 3.8 Understanding the Threats Against SDN Solutions 3.9 Understanding the Security Benefits in SDN Solutions Lesson 3: Review Lesson 3 Flashcards Lesson 3 Quiz Lesson 3: Interactive Labs Lesson 4: Network Programmability Lesson 4 Learning objectives 4.1 Introducing Network Programmability 4.2 Exploring DevNet and DevNet Resources for Security Automation 4.3 Introducing APIs, NETCONF, RESTCONF, and YANG 4.4 A Brief Introduction to Git 4.5 Exploring pxGrid 4.6 Integrating and Automating Security Operations with Cisco Products Lesson 4: Review Lesson 4 Flashcards Lesson 4 Quiz Lesson 4: Interactive Labs Module 2: Quiz Module 3: AAA, Identity Management, Network Visibility, and Segmentation Module 3: Introduction Lesson 5: Introducing AAA and Identity Management Lesson 5 Learning objectives 5.1 Understanding Authentication 5.2 Exploring the RADIUS Protocol 5.3 Surveying the TACACS+ Protocol 5.4 Understanding Authorization 5.5 Surveying Authorization Models 5.6 Defining Accounting 5.7 Exploring Multifactor Authentication and Single Sign-On 5.8 Exploring Examples of Multifactor and Single Sign-On 5.9 Understanding Cisco Duo 5.1 Introducing Cisco ISE 5.11 Understanding Cisco ISE Profiling Services 5.12 Understanding ISE Identity Services 5.13 Describing ISE Authorization Rules Lesson 5: Review Lesson 5 Flashcards Lesson 5 Quiz Lesson 5: Interactive Labs Lesson 6: Secure Network Access, Visibility, and Segmentation Lesson 6 Learning objectives 6.1 Defining Network Visibility and Segmentation 6.2 Introducing NetFlow and IPFIX 6.3 Describing Flexible NetFlow Records 6.4 Understanding NetFlow Deployment 6.5 Exploring Cisco Stealthwatch 6.6 Deploying Cisco Stealthwatch Cloud 6.7 On-Premise Monitoring with Stealthwatch Cloud 6.8 Exploring the Cisco TrustSec Solution 6.9 Describing the Benefits of Device Compliance and Application Control 6.1 Introducing Network Segmentation 6.11 Exploring Application-based Segmentation 6.12 Understanding Cisco ACI 6.13 Describing Network Access with CoA 6.14 Integrating Different Security Systems Using pxGrid 6.15 Exploring Cisco Encrypted Traffic Analytics (ETA), Cisco Cognitive Threat Analytics (CTA), and Cisco Threat Grid Lesson 6: Review Lesson 6 Flashcards Lesson 6 Quiz Lesson 6: Interactive Labs Module 3: Quiz Module 4: Infrastructure Security, Firewalls, and Intrusion Prevention Systems Module 4: Introduction Lesson 7: Infrastructure Security Lesson 7 Learning objectives 7.1 Configuring and Verifying Network Segmentation Using VLANs and VRF-lite 7.2 Configuring and Verifying Port Security 7.3 Configuring and Verifying DHCP Snooping 7.4 Configuring and Verifying Dynamic ARP Inspection 7.5 Exploring and Mitigating Common Layer 2 Threats 7.6 Understanding and Configuring BPDU Guard and Root Guard 7.7 Understanding and Configuring CDP/LLDP 7.8 Understanding the Control Plane, Data Plane, and Management Plane 7.9 Exploring How to Secure the Management Plane 7.1 Exploring How to Secure the Control Plane 7.11 Exploring How to Secure the Data Plane Lesson 7: Review Lesson 7 Flashcards Lesson 7 Quiz Lesson 7: Interactive Labs Lesson 8: Cisco Next-Generation Firewalls Lesson 8 Learning objectives 8.1 Introducing Cisco Next-Generation Firewalls 8.2 Surveying the Cisco Firepower Management Center (FMC) 8.3 Exploring the Cisco Firepower Device Manager (FDM) 8.4 Implementing Access Control Policies Lesson 8: Review Lesson 8 Flashcards Lesson 8 Quiz Lesson 8: Interactive Labs Lesson 9: Cisco Next-Generation Intrusion Prevention Systems Lesson 9 Learning Objectives 9.1 Introducing Cisco Next-Generation Intrusion Prevention Systems 9.2 Describing Deployment Models of Network Security Solutions and Architectures That Provide Intrusion Prevention Capabilities 9.3 Configuring Cisco Next-Generation Intrusion Prevention Systems Lesson 9: Review Lesson 9 Flashcards Lesson 9 Quiz Lesson 9: Interactive Labs Module 4: Quiz Module 5: Virtual Private Networks (VPNs) Module 5: Introduction Lesson 10: Site-to-site VPN Implementations Lesson 10 Learning objectives 10.1 Introduction to IPsec Site-to-site and Remote Access VPNs 10.2 Configuring IPsec Site-to-site VPNs 10.3 Configuring Traditional Site-to-site VPN Utilizing Cisco Routers 10.4 Exploring DMVPN 10.5 Understanding GET VPN 10.6 Deploying FlexVPN 10.7 Troubleshooting Site-to-site VPN Implementations Lesson 10: Review Lesson 10 Flashcards Lesson 10 Quiz Lesson 10: Interactive Labs Lesson 11: Remote Access VPN Lesson 11 Learning Objectives 11.1 Introducing Remote Access VPNs 11.2 Exploring Clientless Remote Access VPNs 11.3 Surveying Remote Access VPN Implementations Using Cisco AnyConnect Secure Mobility Client 11.4 Configuring Remote Access VPN in Cisco ASA and in Cisco FTD 11.5 Troubleshooting Remote Access VPN Implementations Lesson 11: Review Lesson 11 Flashcards Lesson 11 Quiz Lesson 11: Interactive Labs Module 5: Quiz Module 6: Securing the Cloud and Content Security Module 6: Introduction Lesson 12: Securing the Cloud Lesson 12 Learning objectives 12.1 Introducing the Different Cloud Deployment and Service Models 12.2 Surveying Patch Management in the Cloud 12.3 Performing Security Assessments in Cloud Environments 12.4 Introducing Agile, DevOps, and CI/CD Pipelines 12.5 Introducing Serverless Computing 12.6 Understanding Container Orchestration and an Introduction to Kubernetes 12.7 Exploring the Concepts of DevSecOps 12.8 Surveying Cisco Umbrella 12.9 Exploring Cisco Cloud Email Security 12.1 Exploring Cisco Cloudlock Lesson 12: Review Lesson 12 Flashcards Lesson 12 Quiz Lesson 12: Interactive Labs Lesson 13: Content Security Lesson 13 Learning Objectives 13.1 Introducing Cisco Content Security Solutions 13.2 Describing Web Proxy Identity and Authentication Including Transparent User Identification 13.3 Introduction to Cisco Email Security 13.4 Exploring the Cisco ESA Deployment Model 13.5 Understanding Email Security Features 13.6 Discussing Email Security in the Cloud 13.7 Introduction to Secure Internet Gateway (SIG) 13.8 Describing the Components, Capabilities, and Benefits of Cisco Umbrella 13.9 Exploring Cisco Umbrella Investigate Lesson 13: Review Lesson 13 Flashcards Lesson 13 Quiz Lesson 13: Interactive Labs Module 6: Quiz Module 7: Endpoint Security and Cisco Threat Response Module 7: Introduction Lesson 14: Endpoint Protection and Detection Lesson 14 Learning objectives 14.1 Introducing AMP for Endpoints 14.2 Describing AMP for Endpoints Outbreak Control 14.3 Comparing Endpoint Threat Detection and Response (ETDR) and Endpoint Detection and Response (EDR) Solutions 14.4 Understanding AMP IP Blacklists and Whitelists 14.5 Exploring Application Control in AMP for Endpoints 14.6 Describing AMP for Endpoints Exclusion Sets 14.7 Introduction to AMP for Endpoints Policies 14.8 Describing the Anyconnect AMP Enabler 14.9 Exploring AMP for Endpoints Engines 14.1 How to Utilize AMP for Endpoints Reporting Features 14.11 Introducing the Cisco Threat Response Solution Lesson 14: Review Lesson 14 Flashcards Lesson 14 Quiz Lesson 14: Interactive Labs Module 7: Quiz


Best Sellers


Product Details
  • ISBN-13: 9780137311132
  • Binding: Digital online
  • Sub Title: CCNP and CCIE Security Core SCOR 350-701
  • ISBN-10: 0137311133
  • Language: English


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
ITP Course Practice Test: CCNP and CCIE Security Core SCOR 350-701
-
ITP Course Practice Test: CCNP and CCIE Security Core SCOR 350-701
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

ITP Course Practice Test: CCNP and CCIE Security Core SCOR 350-701

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!