CCNP-SCOR (350-701)

Explore new career opportunities with Cisco CCNP certification; get trained with NetworkCerts CCNP-SCOR (350-701) interactive course and lab. The CCNP training course and lab covers the 350-701 SCOR exam-based objectives and provide broad understanding of topics such as secure network access, network security, content security, cloud security, endpoint protection, visibility, enforcement, and detection, and more. The CCNP certification study guide is equipped with comprehensive learning tools and resources to assist you implement and operate Site-to-Site VPNs in Cisco Routers.

Here’s what you will get

The CCNP Security certification validates a professional’s knowledge of security concept and solutions.  This CCNP security certification is associated with two tests: core security technologies and security concentration. The CCNP exam is designed to assess your understanding of concepts, strategies implementation, and network security infrastructure.

 

Lessons

13+ Lessons | 237+ Quizzes | 162+ Flashcards | 162+ Glossary of terms

TestPrep

100+ Pre Assessment Questions| 100+ Post Assessment Questions | 2+ Full Length Tests | 200+ Practice Test Questions

Hand on lab

54+ Live Lab | 55+ Video tutorials | 01:40+ Hours

Benefits

The Cisco Certified Network Professional (CCNP) Security certification, particularly the SCOR (Implementing and Operating Cisco Security Core Technologies) exam, is a valuable credential for IT professionals specializing in network security. Earning the CCNP Security with the SCOR exam offers several benefits:

Advanced Security Knowledge: CCNP-SCOR certification demonstrates advanced knowledge and skills in network security. It covers a wide range of security topics, including network security, cloud security, content security, endpoint protection, and secure network access.

Career Advancement: Holding a CCNP Security certification can open up new career opportunities and increase your earning potential. Many organizations seek certified professionals to manage their security infrastructure and protect against cyber threats.

Global Recognition: Cisco is a globally recognized brand in networking and cybersecurity. CCNP Security is highly regarded in the industry and recognized by employers worldwide.

Expertise in Cisco Security Solutions: The CCNP-SCOR exam focuses on Cisco’s security technologies and solutions. This expertise is valuable if you are working in an environment that relies on Cisco security products.

Improved Job Security: As cybersecurity threats continue to evolve, organizations place a premium on security professionals who can protect their networks and data. Earning the CCNP Security certification can enhance your job security.

Complex Problem Solving: The CCNP-SCOR certification involves solving complex security issues and designing security solutions. This can improve your problem-solving skills and make you a more valuable asset to your organization.

Comprehensive Security Skills: CCNP Security covers a broad spectrum of security topics, making you proficient in various aspects of network security, from threat detection and response to secure network design.

Access to Cisco Resources: Cisco offers a wealth of resources for certified professionals, including access to Cisco Learning Network, training materials, and forums. This ongoing support can aid in your professional development.

Career Growth: CCNP Security is a stepping stone to more advanced certifications like the Cisco Certified Internetwork Expert (CCIE) Security certification. It can serve as a foundation for further specialization in cybersecurity.

Increased Marketability: Having CCNP-SCOR on your resume can make you more attractive to employers seeking skilled professionals to protect their networks and data.

Real-World Skills: The CCNP-SCOR certification involves hands-on experience with Cisco security technologies, giving you practical skills that can be applied in real-world scenarios.

Continuous Learning: Cisco’s security solutions and threat landscape are constantly evolving. Maintaining your CCNP-SCOR certification requires ongoing learning and staying up to date with the latest security trends and technologies.

Reviews

This course was actually better than I thought it would be!!!
Damien M.
Very interesting training :):):)
Grzegorz L.

Here's what you will learn

1
Course Outline

Lessons 1: Introduction

  • The CCNP Security Certification
  • The CCIE Security Certification
  • The Exam Objectives (Domains)
  • Steps to Pass the SCOR Exam
  • Facts About the Exam

Lessons 2: Cybersecurity Fundamentals

  • Introduction to Cybersecurity
  • Defining What Are Threats, Vulnerabilities, and Exploits
  • Common Software and Hardware Vulnerabilities
  • Confidentiality, Integrity, and Availability
  • Cloud Security Threats
  • IoT Security Threats
  • An Introduction to Digital Forensics and Incident Response
  • Summary
  • Review All Key Topics

Lessons 3: Cryptography

  • Introduction to Cryptography
  • Fundamentals of PKI
  • Review All Key Topics

Lessons 4: Software-Defined Networking Security and Network Programmability

  • Introduction to Software-Defined Networking
  • Introduction to Network Programmability
  • Review All Key Topics

Lessons 5: Authentication, Authorization, Accounting (AAA) and Identity Management

  • Introduction to Authentication, Authorization, and Accounting
  • Authentication
  • Authorization
  • Accounting
  • Infrastructure Access Controls
  • AAA Protocols
  • Cisco Identity Services Engine (ISE)
  • Configuring TACACS+ Access
  • Configuring RADIUS Authentication
  • Additional Cisco ISE Design Tips
  • Review All Key Topics

Lessons 6: Network Visibility and Segmentation

  • Introduction to Network Visibility
  • NetFlow
  • IP Flow Information Export (IPFIX)
  • NetFlow Deployment Scenarios
  • Cisco Stealthwatch
  • Cisco Cognitive Threat Analytics (CTA) and Encrypted Traffic Analytics (ETA)
  • NetFlow Collection Considerations and Best Practices
  • Configuring NetFlow in Cisco IOS and Cisco IOS-XE
  • Configuring NetFlow in NX-OS
  • Introduction to Network Segmentation
  • Micro-Segmentation with Cisco ACI
  • Segmentation with Cisco ISE
  • Review All Key Topics

Lessons 7: Infrastructure Security

  • Securing Layer 2 Technologies
  • Common Layer 2 Threats and How to Mitigate Them
  • Network Foundation Protection
  • Understanding and Securing the Management Plane
  • Understanding the Control Plane
  • Understanding and Securing the Data Plane
  • Securing Management Traffic
  • Implementing Logging Features
  • Configuring NTP
  • Securing the Network Infrastructure Device Image and Configuration Files
  • Securing the Data Plane in IPv6
  • Securing Routing Protocols and the Control Plane
  • Review All Key Topics

Lessons 8: Cisco Next-Generation Firewalls and Cisco Next-Generation Intrusion Prevention Systems

  • Introduction to Cisco Next-Generation Firewalls ...-Generation Intrusion Prevention Systems (NGIPS)
  • Comparing Network Security Solutions That Provide Firewall Capabilities
  • Deployment Modes of Network Security Solutions and Architectures That Provide Firewall Capabilities
  • High Availability and Clustering
  • Implementing Access Control
  • Cisco Firepower Intrusion Policies
  • Cisco Advanced Malware Protection (AMP)
  • Security Intelligence, Security Updates, and Keeping Firepower Software Up to Date
  • Review All Key Topics

Lessons 9: Virtual Private Networks (VPNs)

  • Virtual Private Network (VPN) Fundamentals
  • Deploying and Configuring Site-to-Site VPNs in Cisco Routers
  • Configuring Site-to-Site VPNs in Cisco ASA Firewalls
  • Configuring Remote Access VPNs in the Cisco ASA
  • Configuring Clientless Remote Access SSL VPNs in the Cisco ASA
  • Configuring Client-Based Remote-Access SSL VPNs in the Cisco ASA
  • Configuring Remote Access VPNs in FTD
  • Configuring Site-to-Site VPNs in FTD
  • Review All Key Topics

Lessons 10: Securing the Cloud

  • What Is Cloud and What Are the Cloud Service Models?
  • DevOps, Continuous Integration (CI), Continuous Delivery (CD), and DevSecOps
  • Describing the Customer vs. Provider Security Responsibility for the Different Cloud Service Models
  • Cisco Umbrella
  • Cisco Email Security in the Cloud
  • Cisco Cloudlock
  • Stealthwatch Cloud
  • AppDynamics Cloud Monitoring
  • Cisco Tetration
  • Review All Key Topics

Lessons 11: Content Security

  • Content Security Fundamentals
  • Cisco WSA
  • Cisco ESA
  • Cisco Content Security Management Appliance (SMA)
  • Review All Key Topics

Lessons 12: Endpoint Protection and Detection

  • Introduction to Endpoint Protection and Detection
  • Cisco AMP for Endpoints
  • Cisco Threat Response
  • Review All Key Topics

Lessons 13: Final Preparation

  • Hands-on Activities
  • Suggested Plan for Final Review and Study
  • Summary
2
Hands-on LAB Activities

Cybersecurity Fundamentals

  • Conducting Vulnerability Scanning Using Nessus
  • Completing the Chain of Custody

Cryptography

  • Configuring IPSec
  • Generating an RSA Key Pair
  • Generating an Asymmetric Key
  • Using OpenSSL to Create a Public/Private Key Pair

Authentication, Authorization, Accounting (AAA) and Identity Management

  • Understanding MAC Bypass
  • Configuring the AAA Router for TACACS+ Authentication

Network Visibility and Segmentation

  • Configuring a Flow Record
  • Configuring a Flow Monitor for IPv4 or IPv6
  • Defining a Flow Record in Cisco NX-OS
  • Defining a Flow Exporter in Cisco NX-OS
  • Defining a Flow Monitor with a Custom Record in Cisco NX-OS Software

Infrastructure Security

  • Configuring Interfaces as Trunk Ports
  • Configuring Router-on-a-Stick and Switch Support for a Router
  • Configuring PortFast and Rapid Spanning Tree
  • Implementing BPDU Guard on a Switch Port
  • Implementing Port Security
  • Configuring DHCP Snooping
  • Locking Down Switch Ports Administratively
  • Enabling AAA Services and Working with Method Lists
  • Creating and Working with Parser Views
  • Preparing SSH in a Router
  • Configuring a Router to Use NTP Services
  • Creating a Secure Bootset
  • Configuring the IPv6 ACL
  • Configuring IPv6
  • Configuring and Displaying Control Plane Policing
  • Configuring the BGP MD5 Authentication Process between BGP Peers
  • Configuring the OSPF MD5 Authentication Process
  • Configuring the EIGRP MD5 Authentication Process
  • Configuring the RIPv2 MD5 Authentication Process

Cisco Next-Generation Firewalls and Cisco Next-Generation Intrusion Prevention Systems

  • Configuring Cisco ASA Application Inspection
  • Configuring the Cisco ASA To-The-Box Traffic Filtering
  • Configuring Static NAT
  • Configuring a Standard ACL
  • Configuring Dynamic PAT
  • Configuring Dynamic NAT

Virtual Private Networks (VPNs)

  • Implementing IPsec VPNs through CLI
  • Configuring the GRE Tunnel Interface
  • Configuring and Viewing DMVPN Phase 1
  • Configuring Site-to-Site IPsec VPN Topology
  • Configuring the Cisco ASA Remote Access IPsec VPN IKEv2 Policy, IPsec Policy, and Dynamic Crypto Map
  • Configuring the Group Policy in the Cisco ASA
  • Creating the IP Pool for VPN Clients
  • Creating the Tunnel Group for Remote Access VPN Clients
  • Configuring Clientless SSL VPNs on ASA
  • Enrolling in the Manual Certificate
  • Configuring a Tunnel Group for Clientless SSL VPN
  • Configuring the Cisco ASA to Authenticate Users Using a RADIUS Server
  • Defining a WebType ACL
  • Defining the RADIUS Server for Client-Based SSL VPN
  • Configuring Split Tunneling

Content Security

Configuring PBR in a Cisco Router

Be the first to add a review.

Please, login to leave a review
Get course
Enrolled: 0 students
Lectures: 2
Level: Intermediate

Office Hours

Monday 9:00 am - 6.00 pm
Tuesday 9:00 am - 6.00 pm
Wednesday 9:00 am - 6.00 pm
Thursday 9:00 am - 6.00 pm
Friday 9:00 am - 6.00 pm
Saturday 10:00 am - 6.00 pm
Sunday 10:00 am - 6.00 pm