Cisco CCNP Security (SCOR 350-701)

Nächster Termin:
10.03.2025 - Montag - Freitag (9.00 - 17.00 Uhr)
Kurs endet am:
14.03.2025
Gesamtdauer:
40 Stunden in 5 Tagen
Praktikum:
Nein
Unterrichtssprachen:
  • Deutsch
Veranstaltungsart:
  • Weiterbildung 
Angebotsform:
  • Präsenzveranstaltung 
Durchführungszeit:
  • Tagesveranstaltung
Teilnehmer min.:
keine Angaben
Teilnehmer max.:
15
Preis:
keine Angaben
Abschlussart:
Herstellerzertifikat 
Abschlussprüfung:
Ja
Abschlussbezeichnung:
Cisco Certified Specialist - Security Core
Zertifizierungen des Angebots:
  • Cisco
Angebot nur für Frauen:
Nein
Kinderbetreuung:
Nein
Infoqualität:
Suchportal Standard

Zielgruppen:
 Angehende IT Supporter, Netzwerktechniker, IT- Kundenbetreuer, Systembetreuer der Netzwerke (LAN WAN), Servicetechniker, Es richtet sich an Mitarbeiter der Bereiche Administration und Support
Fachliche Voraussetzungen:
Netzwerkgrundlagen auf CCNA-Ebene
Technische Voraussetzungen:
Keine besonderen Anforderungen.
Systematik der Agenturen für Arbeit:
  • C 1430-10-25 Andere Betriebssysteme, Netzwerke - Administration und Zertifizierungen
  • C 1430-25-10 IT-Sicherheit, Datenschutz - allgemein

Inhalte

Implementing and Operating Cisco Security Core Technologies v1.0 (SCOR 350-701)

Dieser Kurs vermittelt Kenntnisse an die Teilnehmer über die Implementierung und den Betrieb von zentralen Sicherheitstechnologien, einschließlich Netzwerksicherheit, Cloud-Sicherheit, Inhaltssicherheit, Endpunktschutz und -erkennung, sicherem Netzwerkzugriff, Sichtbarkeit und Durchsetzung. Der Kurs Implementierung und Betrieb von Cisco Security Core Technologies hilft den Kandidaten, sich auf diese Prüfung vorzubereiten.
Abschluss: Cisco Certified Specialist - Security Core


Course Content

Security Concepts
-Explaining common threats against on-premises and cloud environments
-Comparing common security vulnerabilities such as software bugs, weak and/or hardcoded passwords, SQL injection, missing encryption, buffer overflow, path traversal, cross-site scripting/forgery
-Describing functions of the cryptography components such as hashing, encryption, PKI, SSL, IPsec, NAT-T IPv4 for IPsec, pre-shared key and certificate based authorization
-Comparing site-to-site VPN and remote access VPN deployment types such as sVTI, IPsec, Cryptomap, DMVPN, FLEXVPN including high availability considerations, and AnyConnect
-Explaining North Bound and South Bound APIs in the SDN architecture
-Explaining DNAC APIs for network provisioning, optimization, monitoring, and troubleshooting
-Interpreting basic Python scripts used to call Cisco Security appliances APIs

Network Security
-Comparing network security solutions that provide intrusion prevention and firewall capabilities
-Describing deployment models of network security solutions and architectures that provide intrusion prevention and firewall capabilities
-Describing the components, capabilities, and benefits of NetFlow and Flexible NetFlow records
-Configuring and verifying network infrastructure security methods (router, switch, wireless)
-Implementing segmentation, access control policies, AVC, URL filtering, and malware protection
-Configuring AAA for device and network access (authentication and authorization, TACACS+, RADIUS and RADIUS flows, accounting, and dACL)
-Configuring secure network management of perimeter security and infrastructure devices (secure device management, SNMPv3, views, groups, users, authentication, and encryption, secure logging, and NTP with authentication)
-Configuring and verify site-to-site VPN and remote access VPN

Securing the Cloud
-Identifying security solutions for cloud environments
-Comparing the customer vs. provider security responsibility for the different cloud service models
-Describing the concept of DevSecOps (CI/CD pipeline, container orchestration, and security
-Implementing application and data security in cloud environments

Content Security
-Implementing traffic redirection and capture methods
-Describing web proxy identity and authentication including transparent user identification
-Comparing the components, capabilities, and benefits of local and cloud-based email and web solutions (ESA, CES, WSA)
-Configuring and verifying web and email security deployment methods to protect on-premises and remote users (inbound and outbound controls and policy management)
-Configuring and verifying email security features such as SPAM filtering, antimalware filtering, DLP, blacklisting, and email encryption
-Configuring and verifying secure internet gateway and web security features such as blacklisting, URL filtering, malware scanning, URL categorization, web application filtering, and TLS decryption

Endpoint Protection and Detection
-Comparing Endpoint Protection Platforms (EPP) and Endpoint Detection & Response (EDR) solutions
-Explaining antimalware, retrospective security, Indication of Compromise (IOC), antivirus, dynamic file analysis, and endpoint-sourced telemetry
-Configuring and verifying outbreak control and quarantines to limit infection
-Describing justifications for endpoint-based security
-Describing the value of endpoint device management and asset inventory such as MDM
-Describing the uses and importance of a multifactor authentication (MFA) strategy

Secure Network Access, Visibility, and Enforcement
-Describing identity management and secure network access concepts such as guest services, profiling, posture assessment and BYOD
-Configuring and verifying network access device functionality such as 802.1X, MAB, WebAuth
-Describing network access with CoA
-Describing the benefits of device compliance and application control
-Explaining exfiltration techniques (DNS tunneling, HTTPS, email, FTP/SSH/SCP/SFTP, ICMP, Messenger, IRC, NTP)

Alle Angaben ohne Gewähr. Für die Richtigkeit der Angaben sind ausschließlich die Anbieter verantwortlich.

Erstmals erschienen am 01.10.2022, zuletzt aktualisiert am 01.12.2024