Implementing and Operating Cisco Security Core Technologies (SCOR)

 

Who should attend

  • Security Engineers
  • Network Engineers
  • Network Designers
  • Network Administrators
  • Systems Engineers
  • Consulting Systems Engineers
  • Technical Solutions Architects
  • Cisco Integrators and Partners
  • Network Managers
  • Program Managers
  • Project Managers

Prerequisites

There are no formal prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:

  • Familiarity with Ethernet and TCP/IP networking
  • Working knowledge of the Windows operating system
  • Working knowledge of Cisco IOS networking and concepts
  • Familiarity with basics of networking security concept

s These skills can be found in the following Cisco Learning Offering:

Course Objectives

After taking this course, you should be able to:

  • Describe information security concepts and strategies within the network
  • Describe security flaws in the transmission protocol/internet protocol (TCP/IP) and how they can be used to attack networks and hosts
  • Describe network application-based attacks
  • Describe how various network security technologies work together to guard against attacks
  • Implement access control on Cisco Secure Firewall Adaptive Security Appliance (ASA)
  • Deploy Cisco Secure Firewall Threat Defense basic configurations
  • Deploy Cisco Secure Firewall Threat Defense IPS, malware, and fire policies
  • Deploy Cisco Secure Email Gateway basic configurations
  • Deploy Cisco Secure Email Gateway policy configurations
  • Describe and implement basic web content security features and functions provided by Cisco Secure Web Appliance
  • Describe various attack techniques against the endpoints
  • Describe Cisco Umbrella® security capabilities, deployment models, policy management, and Investigate console
  • Provide basic understanding of endpoint security and be familiar with common endpoint security technologies
  • Describe Cisco Secure Endpoint architecture and basic features
  • Describe Cisco Secure Network Access solutions
  • Describe 802.1X and extensible authentication protocol (EAP) authentication
  • Configure devices for 802.1X operations
  • Introduce VPNs and describe cryptography solutions and algorithms
  • Describe Cisco secure site-to-site connectivity solutions
  • Deploy Cisco Internetwork Operating System (Cisco IOS®) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs
  • Configure point-to-point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
  • Describe Cisco secure remote access connectivity solutions
  • Deploy Cisco secure remote access connectivity solutions
  • Provide an overview of network infrastructure protection controls
  • Examine various defenses on Cisco devices that protect the control plane
  • Configure and verify Cisco IOS software layer 2 data plane controls
  • Configure and verify Cisco IOS software and Cisco ASA layer 3 data plane controls
  • Examine various defenses on Cisco devices that protect the management plane
  • Describe the baseline forms of telemetry recommended for network infrastructure and security devices
  • Describe deploying Cisco Secure Network Analytics
  • Describe basics of cloud computing and common cloud attacks
  • Describe how to secure cloud environment
  • Describe the deployment of Cisco Secure Cloud Analytics
  • Describe basics of software-defined networks and network programmability

Detailed Course Outline

  • Network Security Technologies
  • Cisco Secure Firewall ASA Deployment
  • Cisco Secure Firewall Threat Defense Basics
  • Cisco Secure Firewall Threat Defense IPS, Malware, and File Policies
  • Cisco Secure Email Gateway Basics
  • Cisco Secure Email Policy Configuration
  • Cisco Secure Web Appliance Deployment
  • VPN Technologies and Cryptography Concepts
  • Cisco Secure Site-to-Site VPN Solutions
  • Cisco IOS VTI-Based Point-to-Point IPsec VPNs
  • Point-to-Point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
  • Cisco Secure Remote-Access VPN Solutions
  • Remote-Access SSL VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
  • Describing Information Security Concepts
  • Describe Common TCP/IP Attacks
  • Describe Common Network Application Attacks
  • Common Endpoint Attacks
  • Cisco Umbrella Deployment
  • Endpoint Security Technologies
  • Cisco Secure Endpoint
  • Cisco Secure Network Access Solutions
  • 802.1X Authentication
  • 802.1X Authentication Configuration
  • Network Infrastructure Protection
  • Control Plane Security Solutions
  • Layer 2 Data Plane Security Controls
  • Layer 3 Data Plane Security Controls
  • Management Plane Security Controls
  • Traffic Telemetry Methods
  • Cisco Secure Network Analytics Deployment
  • Cloud Computing and Cloud Security
  • Cloud Security
  • Cisco Secure Cloud Analytics Deployment
  • Software-Defined Networking

Prices & Delivery methods

Online Training

Duration
5 days

Price
  • CAD 5,935
  • Cisco Learning Credits: 43
Classroom Training

Duration
5 days

Price
  • Canada: CAD 5,935
  • Cisco Learning Credits: 43

Click on town name or "Online Training" to book Schedule

Instructor-led Online Training:   This computer icon in the schedule indicates that this date/time will be conducted as Instructor-Led Online Training. If you have any questions about our online courses, feel free to contact us via phone or Email anytime.

Canada

Online Training Time zone: Pacific Daylight Time (PDT) Enroll
Online Training Time zone: Central Standard Time (CST) Enroll
Online Training Time zone: Eastern Standard Time (EST) Enroll
Online Training Time zone: Pacific Daylight Time (PDT) Enroll
Online Training Time zone: Central Daylight Time (CDT) Enroll