Cisco SCOR (350-701) for CCNP Security

Paths

Cisco SCOR (350-701) for CCNP Security

Author: Craig Stansbury

These courses lay the foundation for a viewer looking to dive into the world of Cisco network security. The courses cover everything you need to know about network security, cloud... Read more

What you will learn

  • Cisco Security concepts
  • Configuring VPNs
  • Cisco network security fundamentals
  • Network security with Cisco IOS
  • Securing network access
  • Using Cisco ASA for network security
  • Using Cisco Firepower for network security
  • Endpoint protection and detection
  • Securing the cloud
  • Securing content with Cisco solutions

Pre-requisites

Viewers should be familiar with basic network security as well as networking fundamentals knowledge equivalent to Cisco CCNA certification.

[More Courses To Be Added as Completed] Cisco SCOR (350-701) for CCNP Security

These courses lay the foundation for a viewer looking to dive into the world of Cisco network security. The courses cover everything you need to know about network security, cloud security, content security, endpoint protection and detection, secure network access, and visibility and enforcement. You’ll have the foundation laid for a career in network security and the ability to specialize in any number of specific areas and technologies.

In addition, the courses in this path align with the objectives for the Cisco SCOR (350-701) exam and can help you prepare for the exam. The SCOR exam is the core exam required for those wishing to attain CCNP Security certification.

Cisco Core Security: Security Concepts

by Craig Stansbury

Oct 14, 2019 / 1h 20m

1h 20m

Start Course
Description

There are numerous threats that can negatively impact an organization’s IT infrastructure, regardless if it is hosted in the cloud, or on-premises. In this course, Cisco Core Security: Security Concepts, you’ll gain an understanding of these threats, as well as how to mitigate against them using Cisco Talos or automating security appliances. First, you will learn the different types of threats that exist. Next, you will discover what security intelligence is and Cisco’s solution. Finally, you will explore how to automate various Cisco security devices, such as Firepower Threat Defense. When you’re finished with this course, you will have the skills and knowledge of automating Cisco’s security products needed to protect your network from the latest threats.

Table of contents
  1. Course Overview
  2. Comparing Common Security Vulnerabilities
  3. Explaining Common Threats & Protecting Humans from Attacks
  4. Describing Security Intelligence
  5. Explaining and Interpreting APIs

Cisco Core Security: Describing and Configuring VPNs

by Craig Stansbury

Nov 26, 2019 / 3h 39m

3h 39m

Start Course
Description

The internet is an insecure way of transmitting confidential information, but dedicated circuits can be very expensive. In this course, Cisco Core Security: Describing and Configuring VPNs, you will gain the ability to understand and deploy various types of VPNs. First, you will learn about cryptography components, and how to configure cryptography on Cisco devices. Next, you will discover how to deploy various site-to-site VPNs using Cisco routers. Finally, you will explore how to configure a headend device to accept remote access VPNs using either Cisco’s Adaptive Security Appliance or Firepower Threat Defense. When you’re finished with this course, you will have the skills and knowledge of cryptography needed to deploy various types of VPNs.

Table of contents
  1. Course Overview
  2. Comparing Cryptography Components
  3. Comparing Cisco VPN Types
  4. Configuring DMVPN
  5. Configuring FlexVPN
  6. Configuring Cisco AnyConnect on the ASA
  7. Configuring Cisco AnyConnect on the FTD

Cisco Core Security: Network Security Fundamentals

by Craig Stansbury

Dec 27, 2019 / 3h 20m

3h 20m

Start Course
Description

Not knowing how to properly deploy and secure different Cisco Firewalls, Intrusion Prevention Systems, or networking devices can leave your network inefficient and vulnerable to attack. In this course, Cisco Core Security: Network Security Fundamentals, you will learn the foundational knowledge of deploying Cisco’s security products effectively, and how to properly securing each plane. First, you will learn how to leverage Cisco’s Validated Designs to properly architect your network. Next, you will learn how to leverage NetFlow to validate the data traversing your network. Finally, you will explore how to secure the management plane and implement control and data plane hardening techniques on Cisco Routers, Switches, and Wireless LAN Controllers. When you are finished with this course, you will have the skills and knowledge of designing and hardening Cisco security devices needed to produce efficient networks that are secure.

Table of contents
  1. Course Overview
  2. Comparing Network Security Solutions & Deployment Models
  3. Describing Components, Capabilities, & Benefits of NetFlow
  4. Securing the Management Plane
  5. Securing the Control Plane and Data Plane on Cisco Routers
  6. Securing the Control Plane and Data Plane on Cisco Switches
  7. Configuring Wireless LAN Controller Device Hardening Methods

Cisco Core Security: Network Security with Cisco IOS

by Craig Stansbury

Jan 22, 2020 / 1h 42m

1h 42m

Start Course
Description

If the management plane of IOS devices is not properly secured, the device is exposed to attacks. In this course, Cisco Core Security: Network Security with Cisco IOS, you will learn the foundational knowledge to properly secure all of your organization’s IOS devices. First, you will learn how to secure management access to the device. Next, you will discover how to leverage Cisco ISE to provide centralized device management. Finally, you will explore how to use Cisco Prime Infrastructure to automate management functions. When you are finished with this course, you will have the skills and knowledge of management plane hardening needed to secure your IOS devices.

Table of contents
  1. Course Overview
  2. Securely Managing Cisco IOS Devices
  3. Configuring AAA on a Cisco IOS Device for Use with Cisco ISE
  4. Configuring Management Protocols on a Cisco IOS Device
  5. Managing Cisco IOS Devices with Cisco Prime Infrastructure

Cisco Core Security: Secure Network Access Using Cisco ISE

by Craig Stansbury

Feb 19, 2020 / 1h 37m

1h 37m

Start Course
Description

Only allowing authorized devices access to a network is challenging enough, but ensuring appropriate device access while still having operational efficiency is even harder. In this course, Cisco Core Security: Secure Network Access Using Cisco ISE, you'll gain the ability to leverage Cisco ISE to implement 802.1X. First, you will learn the foundational information needed to understand 802.1X. Next, you will discover how to configure Cisco ISE to support your devices and apply the correct policy to them. Finally, you will explore how to configure Cisco switches to support 802.1X and MAB. When you are finished with this course, you will have the skills and knowledge of implementing 802.1X with Cisco ISE needed to ensure only authorized devices connect to your network.

Table of contents
  1. Course Overview
  2. Describing Identity Management, CoA, and Device Compliance
  3. Configuring Cisco ISE for 802.1X
  4. Configuring Cisco IOS for 802.1X and MAB

Cisco Core Security: Secure Network Access, Visibility, and Enforcement

by Craig Stansbury

Mar 6, 2020 / 1h 34m

1h 34m

Start Course
Description

Having your organization’s security products work together to properly mitigate the latest threats can be challenging. In this course, Cisco Core Security: Secure Network Access, Visibility, and Enforcement, you will learn the foundational knowledge needed to identify exfiltration techniques and how to have Cisco security products work together to block threats. First, you will learn about various data exfiltration techniques that attackers can use. Then, you will discover how Cisco products can use network telemetry and pxGrid to communicate with each other. Finally, you will explore how to implement application visibility and control. When you are finished with this course, you will have the skills and knowledge to get your Cisco security products working together to stop the latest security threats.

Table of contents
  1. Course Overview
  2. Explaining Exfiltration Techniques
  3. Describing the Benefits of Network Telemetry
  4. Benefitting from Additional Cisco® Security Products
  5. Implementing Cisco® Application Visibility and Control (AVC)

Cisco Core Security: Network Security with Cisco ASA

by Craig Stansbury

Apr 7, 2020 / 1h 24m

1h 24m

Start Course
Description

If the management plane of a Cisco ASA is not properly secured, it exposes the device to attacks. In this course, Cisco Core Security, Network Security with Cisco ASA, you will learn the foundational knowledge to properly secure all of your organization’s ASAs. First, you will learn how to secure management access to the device. Next, you will discover how to leverage Cisco ISE to provide centralized device management. Finally, you will explore how to use Cisco Security Manager to automate management functions across multiple ASAs. When you are finished with this course, you will have the skills and knowledge of management plane hardening needed to secure your ASAs.

Table of contents
  1. Course Overview
  2. Securely Managing Cisco ASA Devices
  3. Configuring AAA on a Cisco ASA For Use with Cisco ISE
  4. Configuring Management Protocols on a Cisco ASA
  5. Managing Cisco ASAs with Cisco Security Manager

Cisco Core Security: Network Security with Cisco Firepower

by Craig Stansbury

May 4, 2020 / 1h 15m

1h 15m

Start Course
Description

If the management plane of a Cisco FTD appliance is not properly secured, it exposes the device to attacks. In this course, Cisco Core Security: Network Security with Cisco Firepower, you will gain the ability to properly secure all of your organization’s FTD appliances. First, you will learn how to secure management access to the device. Next, you will discover how to leverage Cisco ISE to provide centralized device management. Finally, you will explore how to use Cisco’s Firepower Management Center to automate management functions across multiple FTDs. When you are finished with this course, you will have the skills and knowledge of management plane hardening needed to secure your FTD appliances.

Table of contents
  1. Course Overview
  2. Securely Managing Cisco Firepower Devices
  3. Configuring AAA on an FTD Appliance for Use with Cisco ISE
  4. Configuring Management Protocols on a Cisco Firepower
  5. Managing Multiple Firepowers with Cisco Firepower Management Center

Cisco Core Security: Endpoint Protection and Detection with Cisco AMP

by Craig Stansbury

Jul 15, 2020 / 1h 6m

1h 6m

Start Course
Description

Endpoints are not always behind an organization's secure network, leaving them more susceptible to various threats. It is more important than ever to ensure that they are protected. In this course, Cisco Core Security: Endpoint Protection and Detection with Cisco AMP, you will gain the ability to learn how to implement Cisco AMP for Endpoints to protect your devices. First, you will learn what makes Cisco AMP for Endpoints a next-generation antimalware solution. Next, you will discover how to assess the posture of your devices, and whether or not it meets your organization's policies. Finally, you will explore how to implement Cisco AMP for Endpoints. When you are finished with this course, you will have the skills and knowledge of Cisco AMP for endpoints, needed to keep your devices secure.

Table of contents
  1. Course Overview
  2. Explaining Security Concepts to Protect Endpoints
  3. Assessing Endpoint Posture and Managing Device Inventory
  4. Using Multi-Factor Authentication
  5. Configuring Malware Protection and Outbreak Controls

Coming Soon

Cisco Core Security: Securing the Cloud

Coming Soon

by Craig Stansbury

Cisco Core Security: Content Security with Cisco WSA & Cisco Umbrella

by Craig Stansbury

Aug 27, 2020 / 2h 3m

2h 3m

Start Course
Description

Threats that are hosted on the internet continue to cost organizations in money and productivity, but internet use is needed to complete daily responsibilities. In this course, Cisco Core Security: Content Security with Cisco WSA & Cisco Umbrella, you’ll gain the ability to leverage both of these products to mitigate against these threats. First, you’ll explore the key features of both products, their differences, and how they can be used together. Next, you’ll discover how to deploy and configure Cisco's Web Security Appliance. Finally, you’ll learn how to Configure Cisco Umbrella. When you’re finished with this course, you’ll have the skills and knowledge of deploying and configuring both of these products needed to protect the web traffic of your organization.

Table of contents
  1. Course Overview
  2. Comparing WSA and Cisco Umbrella
  3. Deploying the Web Security Appliance
  4. Configuring the WSA as a Secure Internet Gateway
  5. Configuring Traffic Redirection on the WSA
  6. Deploying Cisco Umbrella

Cisco Core Security: Email Security with Cisco ESA

by Craig Stansbury

Oct 21, 2020 / 2h 21m

2h 21m

Start Course
Description

Cisco estimates that between 65 and 80% of threats are deployed through email. In this course, Cisco Core Security: Email Security with Cisco ESA, you will gain the ability to use Cisco's ESA to secure your network. First, you will learn how to route email through the ESA. Next, you will discover how to block malicious senders in the first place. Finally, you will explore how to configure policies to ensure your emails are secure. When you are finished with this course, you will have the skills and knowledge of email security needed to secure your organization's emails.

Table of contents
  1. Course Overview
  2. Deploying the ESA and Placing It in the Email Path
  3. Configuring the ESA to Accept Email
  4. Configuring the Default Incoming Mail Policy
  5. Configuring the Default Outgoing Mail Policy and Verifying