Diğer Eğitimler

The Implementing and Operating Cisco Security Core Technologies (SCOR) course helps you prepare for the Cisco CCNP Security and CCIE Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility, and enforcement. You will get extensive hands-on experience deploying Cisco Firepower Next-Generation Firewall and Cisco ASA Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch Enterprise and Cisco Stealthwatch Cloud threat detection features. This course, including the self-paced material, helps prepare you to take the exam, Implementing and Operating Cisco Security Core Technologies (350-701 SCOR), which leads to the new CCNP Security, CCIE Security, and the Cisco Certified Specialist - Security Core certifications


  • Describing Information Security Concepts*

  • Describing Common TCP/IP Attacks*

  • Describing Common Network Application Attacks*

  • Describing Common Endpoint Attacks*

  • Describing Network Security Technologies

  • Deploying Cisco ASA Firewall

  • Deploying Cisco Firepower Next-Generation Firewall

  • Deploying Email Content Security

  • Deploying Web Content Security

  • Deploying Cisco Umbrella*

  • Explaining VPN Technologies and Cryptography

  • Introducing Cisco Secure Site-to-Site VPN Solutions

  • Deploying Cisco IOS VTI-Based Point-to-Point

  • Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW

  • Introducing Cisco Secure Remote Access VPN Solutions

  • Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW

  • Explaining Cisco Secure Network Access Solutions

  • Describing 802.1X Authentication

  • Configuring 802.1X Authentication

  • Describing Endpoint Security Technologies*

  • Deploying Cisco AMP for Endpoints*

  • Introducing Network Infrastructure Protection*

  • Deploying Control Plane Security Controls*

  • Deploying Layer 2 Data Plane Security Controls*

  • Deploying Layer 3 Data Plane Security Controls*