Cisco CCNP Security (SCOR 350-701)           Virtuelles Klassenzimmer

Nächster Termin:
24.06.2024 - Montag - Freitag  (9.00 - 17.00 Uhr)
Kurs endet am:
28.06.2024
Gesamtdauer:
40 Stunden in 5 Tagen
Praktikum:
Nein
Unterrichtssprachen:
  • Deutsch
Veranstaltungsart:
  • Weiterbildung 
Angebotsform:
  • Virtuelles Klassenzimmer 
Durchführungszeit:
  • Tagesveranstaltung
Teilnehmer min.:
keine Angaben
Teilnehmer max.:
15
Preis:
keine Angaben
Abschlussart:
Herstellerzertifikat 
Abschlussprüfung:
Ja
Abschlussbezeichnung:
Cisco Certified Specialist - Security Core
Zertifizierungen des Angebots:
  • Cisco
Angebot nur für Frauen:
Nein
Kinderbetreuung:
Nein
Infoqualität:
Suchportal Standard

Zielgruppen:
 Angehende IT Supporter, Netzwerktechniker, IT- Kundenbetreuer, Systembetreuer der Netzwerke (LAN WAN), Servicetechniker, Es richtet sich an Mitarbeiter der Bereiche Administration und Support
Fachliche Voraussetzungen:
Netzwerkgrundlagen auf CCNA-Ebene
Technische Voraussetzungen:
Keine besonderen Anforderungen.
Systematik der Agenturen für Arbeit:
  • C 1430-10-25 Andere Betriebssysteme, Netzwerke - Administration und Zertifizierungen
  • C 1430-25-10 IT-Sicherheit, Datenschutz - allgemein

Inhalte

Implementing and Operating Cisco Security Core Technologies v1.0 (SCOR 350-701)

Dieser Kurs vermittelt Kenntnisse an die Teilnehmer über die Implementierung und den Betrieb von zentralen Sicherheitstechnologien, einschließlich Netzwerksicherheit, Cloud-Sicherheit, Inhaltssicherheit, Endpunktschutz und -erkennung, sicherem Netzwerkzugriff, Sichtbarkeit und Durchsetzung. Der Kurs Implementierung und Betrieb von Cisco Security Core Technologies hilft den Kandidaten, sich auf diese Prüfung vorzubereiten.
Abschluss: Cisco Certified Specialist - Security Core


Course Content

Security Concepts
Explaining common threats against on-premises and cloud environments
Comparing common security vulnerabilities such as software bugs, weak and/or hardcoded passwords, SQL injection, missing encryption, buffer overflow, path traversal, cross-site scripting/forgery
Describing functions of the cryptography components such as hashing, encryption, PKI, SSL, IPsec, NAT-T IPv4 for IPsec, pre-shared key and certificate based authorization
Comparing site-to-site VPN and remote access VPN deployment types such as sVTI, IPsec, Cryptomap, DMVPN, FLEXVPN including high availability considerations, and AnyConnect
Explaining North Bound and South Bound APIs in the SDN architecture
Explaining DNAC APIs for network provisioning, optimization, monitoring, and troubleshooting
Interpreting basic Python scripts used to call Cisco Security appliances APIs

Network Security
Comparing network security solutions that provide intrusion prevention and firewall capabilities
Describing deployment models of network security solutions and architectures that provide intrusion prevention and firewall capabilities
Describing the components, capabilities, and benefits of NetFlow and Flexible NetFlow records
Configuring and verifying network infrastructure security methods (router, switch, wireless)
Implementing segmentation, access control policies, AVC, URL filtering, and malware protection
Configuring AAA for device and network access (authentication and authorization, TACACS+, RADIUS and RADIUS flows, accounting, and dACL)
Configuring secure network management of perimeter security and infrastructure devices (secure device management, SNMPv3, views, groups, users, authentication, and encryption, secure logging, and NTP with authentication)
Configuring and verify site-to-site VPN and remote access VPN

Securing the Cloud
Identifying security solutions for cloud environments
Comparing the customer vs. provider security responsibility for the different cloud service models
Describing the concept of DevSecOps (CI/CD pipeline, container orchestration, and security
Implementing application and data security in cloud environments

Content Security
Implementing traffic redirection and capture methods
Describing web proxy identity and authentication including transparent user identification
Comparing the components, capabilities, and benefits of local and cloud-based email and web solutions (ESA, CES, WSA)
Configuring and verifying web and email security deployment methods to protect on-premises and remote users (inbound and outbound controls and policy management)
Configuring and verifying email security features such as SPAM filtering, antimalware filtering, DLP, blacklisting, and email encryption
Configuring and verifying secure internet gateway and web security features such as blacklisting, URL filtering, malware scanning, URL categorization, web application filtering, and TLS decryption

Endpoint Protection and Detection
Comparing Endpoint Protection Platforms (EPP) and Endpoint Detection & Response (EDR) solutions
Explaining antimalware, retrospective security, Indication of Compromise (IOC), antivirus, dynamic file analysis, and endpoint-sourced telemetry
Configuring and verifying outbreak control and quarantines to limit infection
Describing justifications for endpoint-based security
Describing the value of endpoint device management and asset inventory such as MDM
Describing the uses and importance of a multifactor authentication (MFA) strategy

Secure Network Access, Visibility, and Enforcement
Describing identity management and secure network access concepts such as guest services, profiling, posture assessment and BYOD
Configuring and verifying network access device functionality such as 802.1X, MAB, WebAuth
Describing network access with CoA
Describing the benefits of device compliance and application control
Explaining exfiltration techniques (DNS tunneling, HTTPS, email, FTP/SSH/SCP/SFTP, ICMP, Messenger, IRC, NTP)

Alle Angaben ohne Gewähr. Für die Richtigkeit der Angaben sind ausschließlich die Anbieter verantwortlich.

Erstmals erschienen am 09.02.2021, zuletzt aktualisiert am 29.05.2024