New

LEARN, LEVEL UP, LEAD. Upto 88% off on courses for a limited time. View Courses

CCNP,CCIE Security SCOR (350-701) Training Part-1 and 2

Implementing and Operating Cisco Security Core Technologies (SCOR 350-701) with Step by Step Lab Workbook

Beginner
4.5 (6,844 Ratings) 29,417 Students enrolled English
Created by Ahmad Ali
Last updated Wed, 12-Oct-2022

What will i learn?

  • Compare common security vulnerabilities
  • Describe functions of the cryptography components
  • Compare site-to-site VPN and remote access VPN deployment types
  • Compare network security solutions that provide intrusion prevention
  • Configure and verify network infrastructure security methods
  • Device hardening of network infrastructure security devices
  • Implement segmentation, access control policies, AVC, URL filtering
  • Implement management options for network security solutions
  • Configure and verify site-to-site VPN and remote access VPN
Requirements
  • Basic IP and security knowledge is nice to have.
  • Students need to understand basic networking.
  • CCNA routing and Switching Knowledge
  • Students needs to understand Networking Fundamentals.
Curriculum for this course
185 Lessons 23:55:05 Hours
  • Introduction to CCNP Security SCOR
    Preview 00:07:15
  • Confidentiality,Integrity & Availability.
    00:16:12
  • Common Network Security Terms Asset etc.
    .
  • On-Premises, Cloud and Malware Theory.
    00:15:04
  • SQL Database Injection Attack Theory and Lab.
    00:12:54
  • Cross Site Scripting Attack Theory and Lab.
    00:07:46
  • Phishing Social Engineer Engineering Attack Lab.
    00:11:06
  • Man in the Middle Attack Theory and Lab
    00:23:53
  • Denial Of Service (DoS) Attack Theory and Lab.
    00:23:53
  • Path Traversal Attack Theory and Lab.
    .
  • Buffer Overflow Attack Theory and Lab.
    00:04:16
  • Common Vulnerability Terms Theory.
    .
  • VLAN (Virtual Local Area Network) Theory.
    .
  • Layer 2 Attacks (DHCP Snooping) Theory & Lab.
    00:35:20
  • ARP (Address Resolution Protocol) Theory.
    00:06:08
  • ARP Poisoning or ARP Spoofing Attack Lab.
    00:27:24
  • MAC (Media Access Control Address) Theory.
    .
  • MAC (Media Access Control Address) Flooding Attack.
    .
  • Configure and Verify Port Security Theory & Lab.
    00:46:45
  • STP (Spanning Tree Protocols) Theory.
    00:12:23
  • STP Spanning Tree Protocols Attacks Labs.
    .
  • VLAN (Virtual Local Area Network) Hopping Attack Lab.
    00:20:33
  • Configure and Verify Storm Control Theory & Lab.
    .
  • Configure and Verify Private VLAN Theory & Lab.
    00:30:12
  • Configure and Verify VRF Lite Theory & Lab.
    .
  • Configure and Verify Management Plane Theory & Lab Part-1
    00:54:42
  • Configure and Verify Management Plane Theory & Lab Part-2
    00:45:51
  • Configure and Verify Control Plane Theory & Lab
    .
  • Introduction to Layer 2 and Layer 3 Data Plane.
    00:03:22
  • Introduction and Compare In-Band and Out-of-Band.
    00:07:50
  • Securing Routing Protocols (Authentication on RIP).
    .
  • Securing Routing Protocols (Authentication on EIGRP & OSPF).
    00:31:14
  • CDP ,Risk , Reconnaissance and Flooding Attack
    00:13:45
  • Introduction DNS,DNS Spoofing,DNS Caching & DNSSEC.
    .
  • Configure and Verify TFTP, FTP, SFTP and SCP.
    .
  • Configure and Verify SNMP Version 2 and SNMP Version 3.
    00:31:54
  • Configure and Verify Syslog (Logging) in Cisco Router.
    00:31:17
  • Introduction & Concept of Network Time Protocol (NTP).
    00:12:14
  • Configure and Verify Network Time Protocol and Security.
    00:55:11
  • Introduction and Concept of Cryptography & Terminologies.
    .
  • Introduction & Concept of Symmetric & Asymmetric Encryption.
    00:18:13
  • Introduction and Concept of Cryptography Hash (SHA, MD5).
    00:15:43
  • Introduction and Concept of Virtual Private Network VPN.
    .
  • Introduction and Concept of IPSec Protocols Features.
    00:18:02
  • Introduction and Concept of Diffie-Hellman (DH).
    00:19:22
  • Introduction and Concept of SSL/TLS and Handshake.
    00:21:24
  • Introduction and Concept of IKE, Versions & Modes.
    00:20:56
  • Internet Key Exchange IKE Phase 1 two Modes Lab.
    00:12:23
  • Configure and Verify Site to Site IPSec VPN Routers.
    .
  • Troubleshoot Site to Site IPSec VPN on Cisco Routers.
    00:48:05
  • VPN ISAKMP Policy,Encryption Domain,Crypto Maps.
    .
  • Configure and Verify NAT-T (Traversal) on Routers.
    .
  • Concept of Dynamic Multi-point Virtual Private Network.
    00:29:01
  • Configure and Verify Dynamic Multipoint VPN Phase-1 Lab.
    00:27:33
  • Configure and Verify Client-Based Remote-Access VPN Lab.
    00:27:57
  • Introduction & Concept of FlexVPN (Virtual Private Network).
    00:15:43
  • FlexVPN Flexible Virutal Private Network SVTI Lab.
    00:18:02
  • Site-to-Site & Remote VNP High Availability Considerations.
    .
  • PKI (Public Key Infrastructure) Theory and Lab.
    00:20:43
  • Introduction to Firewall Technologies and Types.
    00:20:39
  • Introduction to Cisco ASA Firewall,Features & Services.
    00:07:51
  • Install Cisco ASA Clustering Enable Firewall in GNS3.
    00:10:24
  • Install Cisco ASA Clustering Enable Firewall in EVE NG.
    .
  • Cisco ASA Firewall Basic Commands and Configuration.
    .
  • Device Management In Cisco ASA Firewall Console.
    00:10:03
  • Device Management In Cisco ASA Firewall SSH.
    .
  • Device Management In Cisco ASA Firewall ASDM.
    .
  • Device Management In Cisco ASA Firewall TFTP.
    00:20:47
  • Device Management In Cisco ASA Firewall FTP.
    .
  • Security Levels and Zoning in Cisco ASA Firewall.
    .
  • Implement Access Control Lists in Cisco ASA Firewall.
    .
  • Configure and Verify Extended ACLs in Cisco ASA Firewall.
    .
  • Configure and Verify Infrastructure ACLs in Cisco ASA.
    .
  • Configure and Verify Time-Based ACLs in Cisco ASA Firewall.
    .
  • Configure and Verify Standard ACLs in Cisco ASA Firewall.
    00:32:34
  • Configure and Verify Object Groups ACLs in Cisco ASA Firewall.
    .
  • Introduction and Theory of NAT and PAT in Cisco ASA Firewall.
    .
  • Creating Lab Topology for NAT and PAT for Cisco ASA Firewall.
    .
  • Configure and Verify Static NAT in Cisco ASA Firewall.
    00:34:55
  • Configure and Verify Static PAT in Cisco ASA Firewall.
    .
  • Configure and Verify Dynamic NAT in Cisco ASA Firewall.
    .
  • Configure and Verify Dynamic PAT in Cisco ASA Firewall.
    .
  • Configure and Verify Identity NAT in Cisco ASA Firewall.
    .
  • Configure and Verify Policy NAT in Cisco ASA Firewall.
    .
  • Configure and Verify Transparent Firewall Cisco ASA Firewall.
    00:34:00
  • Introduction and Concept of Cisco Firepower (FTD and FMC).
    .
  • Install and Add Cisco FTD 6.2.3-83 on EVE-NG.
    .
  • Install and Add Cisco FMC 6.2.3-83 on EVE-NG.
    00:06:00
  • Firepower Thread Defense FTD First Time Configuration.
    .
  • How to Configure and Add Manager in Cisco FTD.
    .
  • Firepower Management Center FMC First Time Configuration.
    .
  • Firepower Management Center FMC First Time Login Setup.
    00:04:16
  • Enable Evaluation Smart Licenses in Cisco FMC.
    .
  • Lecture-94:How Integrate Cisco FTD Firewall with Cisco FMC.
    00:06:28
  • Introduction and Concept of Security Intelligence in FTD.
    .
  • Configure Initial Working Lab Cisco FTD and Cisco FMC
    00:38:09
  • Configure and Verify Access Control Policies.
    .
  • Configure and Verify Pre-Filter Policy in FTD.
    00:12:55
  • Configure and Verify Intrusion Policy in FTD.
    .
  • Configure and Verify SSL Policy in Cisco FTD.
    .
  • Configure and Verify Malware & File Policy in FTD.
    00:03:45
  • Configure and Verify DNS Policy in Cisco FTD.
    00:08:11
  • Introduction and Concept of IPS and Deployment Modes.
    00:14:37
  • Install and Add Cisco NGIPS 6.2.3-83 on EVE-NG Lab.
    .
  • Cisco Firepower NGIPS First Time Configuration Lab.
    00:07:23
  • Basic Terminologies Proxy,Forward and Reverse Proxy etc.
    .
  • Introduction to Cisco Ironport WSA, Need and Features.
    .
  • Introduction to Cisco Ironport WSA Deployment Modes.
    .
  • Install Cisco Ironport WSA Version 10 on EVE NG Lab.
    .
  • Configure Basic Topology for Cisco WSA in EVE NG Lab.
    .
  • Cisco Ironport WSA First Time CLI Configuration Lab.
    00:08:24
  • Configure License Cisco Ironport WSA Version 10 Lab.
    00:08:19
  • Cisco WSA First Time Configuration Setup Wizard Lab.
    .
  • Traffic Redirection Explicit Mode Cisco Ironport WSA.
    .
  • Access Policies & Identification Profile in Cisco WSA.
    .
  • Configure and Verify Custom URL Category Cisco in WSA.
    00:24:31
  • Application Visibility, Objects & Anti-Malware Policies.
    .
  • Traffic Redirection Transparent Mode Cisco Ironport WSA.
    .
  • Introduction to Cisco Ironport ESA Features and Functions.
    00:13:20
  • Basic Terminologies of Cisco Ironport ESA and EMail.
    00:12:32
  • Install Cisco Ironport ESA Version 10 on EVE NG.
    00:05:06
  • Configure Basic Topology for Cisco ESA in EVE NG.
    00:09:44
  • Cisco Ironport ESA First Time CLI Configuration Lab.
    00:05:42
  • Configure License Cisco Ironport ESA Version 10 Lab.
    .
  • Cisco ESA First Time Configuration Setup Wizard Lab.
    00:05:19
  • Windows DNS Server Installation and Configuration Lab.
    .
  • Install, Setup and Configure hMailServer Email Server.
    .
  • Install, Setup and Configure Thunderbird Email Client.
    00:18:44
  • Cisco ESA Incoming Content Filters & Email Policies Lab.
    .
  • Cisco ESA Outgoing Content Filters & Email Policies Lab.
    00:10:57
  • Introduction and Concept of OpenDNS and Cisco Umbrella.
    .
  • Introduction and Concept of Endpoint EPP and EDR.
    .
  • Introduction and Concept of Multifactor Authentication.
    00:05:20
  • Introduction and Concept of Mobile Device Management MDM.
    .
  • Role of The Endpoint Protection from Phishing Attacks.
    .
  • Introduction & Concept of Advanced Malware Protection.
    .
  • Introduction and Concept of Endpoint Patching Strategy.
    .
  • Interpret Basic Python Scripts Network Automation Lab.
    .
  • Introduction to Application Programming Interface API.
    .
  • NETCONF Application Programming Interface Theory & Lab.
    .
  • RESTCONF Application Programming Interface Theory & Lab.
    .
  • Introduction and Concept of Software Defined Networking.
    00:15:08
  • Introduction to North Bound API and South Bound API.
    00:04:46
  • Introduction & Concept of Cisco DNA Center (Cisco DNAC).
    .
  • Introduction to Cloud and Different Types of Cloud.
    .
  • Introduction and Concept of Cloud Service Models.
    .
  • Introduction and Concept of Cloud Patch Management.
    .
  • Introduction to Security Assessment in the Cloud.
    00:04:54
  • Introduction to Cloud Access Security Brokder (CASB).
    .
  • Introduction and Concept of DevOps and DevSecOps.
    .
  • Introduction and Concept of CI/CD Pipeline in DevOps.
    .
  • Concept of Docker, Container & Container Orchestration.
    .
  • Cloud Logging and Monitoring Secure Cloud Analytics.
    .
  • Introduction to Cisco Identity Services Engine (ISE).
    .
  • Install and Configure Cisco ISE on VMware Workstation.
    .
  • Add, Install and Configure Cisco ISE on EVE-NG.
    .
  • Cisco Identity Services Engine (ISE) CLI Commands.
    .
  • Cisco Identity Services Engine Dashboard Walkthrough.
    00:15:09
  • Cisco Identity Services Engine Basic Terminologies.
    00:09:46
  • Cisco Identity Services Engine Three Persona Theory.
    .
  • Cisco Identity Services Engine Deployment Options.
    .
  • Introduction to Device Administration & Network Access.
    .
  • Introduction, Theory and Concept of AAA Server.
    .
  • Introduction to AAA Options TACACS+ and RADIUS Protocols.
    .
  • Introduction and Concept of 802.1X (Dot1x) & Components.
    .
  • Introduction to 802.1X (Dot1x) Port States and Host Modes.
    00:11:27
  • Configure and Verify AAA 802.1X (Dot1x) Lab.
    00:36:14
  • Introduction to Media Access Control Authentication Bypass.
    .
  • Configure Media Access Control Authentication Bypass Lab.
    .
  • Introduction and Concept of Downloadable ACL (DACL).
    .
  • Configure and Verify Downloadable ACL (DACL) Lab.
    00:27:01
  • Introduction and Concept of Dynamic VLAN (DVLAN).
    .
  • Configure and Verify Dynamic VLAN (DVLAN) Lab.
    .
  • Introduction to Central Web Authentication (CWA).
    .
  • Configure and Verify Central Web Authentication Lab.
    .
  • Configure and Verify Device Administration Lab.
    .
  • Introduction and Concept of Guest Services in ISE.
    .
  • Introduction and Concept of BYOD in Cisco ISE.
    .
  • Introduction and Concept of Change of Authorization CoA.
    .
  • Introduction to Profiling, Profiler Services & Probes.
    .
  • Configure and Verify Profiling using ISE Probes Lab.
    .
  • Introduction and Concept of Posture in Cisco ISE.
    .
  • Introduction to Endpoint Compliance in Cisco ISE.
    .
  • Introduction and Concept of Network Telemetry.
    00:08:14
  • Introduction and Concept of Data Ex-filtration.
    .
icon

Get Certifications

+ View more
Course overview

Security Concepts, Explain common threats against on-premises and cloud environments, Configure and verify network infrastructure security methods, Configure AAA for device and network access, Configure secure network management of perimeter security, Configure and verify site-to-site VPN and remote access VPN , Describe identity management and secure network access, Network security solutions that provide intrusion prevention and firewall, Network Security, Securing the Cloud, Content Security, Endpoint Protection and Detection , Secure Network Access, Visibility, and Enforcement, Secure network access, SDN and Network Automation Concepts, Describe the components, capabilities, and benefits of Cisco Umbrella, Endpoint Protection and Detection, Secure Network Access, Visibility, and Enforcement, Describe the benefits of network telemetry, Implement traffic redirection and capture methods, Describe the concept of DevSecOps, Identify security solutions for cloud environments, Compare the customer vs. provider security responsibility, Configure AAA for device and network access, Implement segmentation, access control policies, AVC, Explain North Bound and South Bound APIs in the SDN architecture, Describe security intelligence authoring, sharing, and consumption, Describe security intelligence authoring, sharing, and consumption, Interpret basic Python scripts used to call Cisco Security appliances APIs, Cloud service models: SaaS, PaaS, IaaS, Security assessment in the cloud, Patch management in the cloud, Describe the benefits of device compliance and application control

Who this course is for:

  • Course has been designed for anyone who wants to start learning Security
  • This course is for students trying to obtain the CCNP and CCIE SCOR
  • This course is for students trying to learn the CCNP Security
  • Any Network or Security Engineer want to learn or polish their Skills.
+ View more
Other related courses
08:04:59
2,218 0 $30 $5
01:05:19
2,216 0 $30 $5
01:31:18
Wed, 14-Sep-2022
972 0 $30 $5
28:45:22
5,116 0 $30 $5
17:21:55
1,764 0 $30 $7
About instructor

Ahmad Ali

Cyber Security Consultant & Cisco Certified Trainer

0 Reviews | 0 Students | 0 Courses
CCNA CCNP CCNA Security CCNP Security Firewalls Load balancer & Proxy
I am Cyber Security Consultant and Cisco Certified Trainer with several years of experience. Teaching part time for more than 10 years’ providing classroom, on-site and online trai...

Reviews

  • GH
    George H.
    16/07/2022
    Very good course. Like how show much is taught at the command line instead of the GUI interface. This helps me understand better, then behind the GUI where magic happens. Great detail, like when explaining IKE modes.
  • ST
    Sergen T.
    21/03/2022
    Best teacher i have ever seen.
  • M
    Mihreteab G.
    21/11/2021
    oh very much pleased taking your course : your notes clear, clean understandable and offcourse your labs adds up the whole discussions also thanks for the images they are not easy to find so i glad i take your course and will be looking for ward to take other courses of you.
  • DN
    Dielievi N.
    24/07/2021
    Could grapes all the detail taught. Would be great if the documentation could be shared(downloadable) through some means for future quick reference and as study meterial.
  • FH
    Francisco Henrique Paulo D.
    30/12/2020
    The way that he bring the topic is very clear and very easy to understand, he show that he know the topic and how to delivery
$5 $30 83.33% off
Includes:
callback request mobile callback request mobile Chat Now