Cisco Certified Network Security -SCOR (Dozentengeleitetes Vollzeit Präsenz und Virtuelles Training)

Nächster Termin:
Durchführung nur auf Anfrage
Gesamtdauer:
280 Stunden in 35 Tagen
Praktikum:
Nein
Unterrichtssprachen:
  • Deutsch
Veranstaltungsart:
  • Weiterbildung 
Angebotsform:
  • Präsenzveranstaltung 
Durchführungszeit:
  • Tagesveranstaltung
Teilnehmer min.:
6
Teilnehmer max.:
15
Preis:
keine Angaben
Förderung:
  • EU/Bund/Land 
  • Bildungsgutschein 
Abschlussart:
Herstellerzertifikat 
Abschlussprüfung:
Ja
Abschlussbezeichnung:
Implementing and Operating Cisco Security Core Technologies v1.0 (SCOR 350-701)
Zertifizierungen des Angebots:
  • SGB III-Maßnahmezulassung 
Angebot nur für Frauen:
Nein
Kinderbetreuung:
Nein
Infoqualität:
Suchportal Standard Plus

Zielgruppen:
 Arbeitssuchende IT Interessierte die lernbereit sind und für neue Perspektiven Ihre Zukunft vorbereiten möchten
Fachliche Voraussetzungen:
Netzwerkgrundlagen auf CCNA-Ebene
Technische Voraussetzungen:
Keine besonderen Anforderungen.
Systematik der Agenturen für Arbeit:
  • C 1430-10-25 Andere Betriebssysteme, Netzwerke - Administration und Zertifizierungen
  • C 1430-25-20 IT-Sicherheit - Zertifizierungen

Inhalte

Implementing and Operating Cisco Security Core Technologies v1.0 (SCOR 350-701)

Dieser Kurs vermittelt Kenntnisse an die Teilnehmer über die Implementierung und den Betrieb von zentralen Sicherheitstechnologien, einschließlich Netzwerksicherheit, Cloud-Sicherheit, Inhaltssicherheit, Endpunktschutz und -erkennung, sicherem Netzwerkzugriff, Sichtbarkeit und Durchsetzung. Der Kurs Implementierung und Betrieb von Cisco Security Core Technologies hilft den Kandidaten, sich auf diese Prüfung vorzubereiten.

Security Concepts
-Explaining common threats against on-premises and cloud environments
-Comparing common security vulnerabilities such as software bugs, weak and/or hardcoded passwords, SQL injection, missing encryption, buffer overflow, path traversal, cross-site scripting/forgery
-Describing functions of the cryptography components such as hashing, encryption, PKI, SSL, IPsec, NAT-T IPv4 for IPsec, pre-shared key and certificate based authorization
-Comparing site-to-site VPN and remote access VPN deployment types such as sVTI, IPsec, Cryptomap, DMVPN, FLEXVPN including high availability considerations, and AnyConnect
-Describing security intelligence authoring, sharing, and consumption
-Explaining the role of the endpoint in protecting humans from phishing and social engineering attacks
-Explaining North Bound and South Bound APIs in the SDN architecture
-Explaining DNAC APIs for network provisioning, optimization, monitoring, and troubleshooting

Network Security
-Comparing network security solutions that provide intrusion prevention and firewall capabilities
-Describing deployment models of network security solutions and architectures that provide intrusion prevention and firewall capabilities
-Describing the components, capabilities, and benefits of NetFlow and Flexible NetFlow records
-Configuring and verifying network infrastructure security methods (router, switch, wireless)
-Implementing segmentation, access control policies, AVC, URL filtering, and malware protection
-Implementing management options for network security solutions such as intrusion prevention and perimeter security (Single vs. multidevice manager, in-band vs. out-of-band, CDP, DNS, SCP, SFTP, and DHCP security and risks)
-Configuring AAA for device and network access (authentication and authorization, TACACS+, RADIUS and RADIUS flows, accounting, and dACL)
-Configuring secure network management of perimeter security and infrastructure devices (secure device management, SNMPv3, views, groups, users, authentication, and encryption, secure logging, and NTP with authentication)

Securing the Cloud
-Identifying security solutions for cloud environments
-Comparing the customer vs. provider security responsibility for the different cloud service models
-Describing the concept of DevSecOps (CI/CD pipeline, container orchestration, and security
-Implementing application and data security in cloud environments
-Identifying security capabilities, deployment models, and policy management to secure the cloud
-Configuring cloud logging and monitoring methodologies

Content Security
-Implementing traffic redirection and capture methods
-Describing web proxy identity and authentication including transparent user identification
-Comparing the components, capabilities, and benefits of local and cloud-based email and web solutions (ESA, CES, WSA)
-Configuring and verifying web and email security deployment methods to protect on-premises and remote users (inbound and outbound controls and policy management)
-Configuring and verifying email security features such as SPAM filtering, antimalware filtering, DLP, blacklisting, and email encryption
-Configuring and verifying secure internet gateway and web security features such as blacklisting, URL filtering, malware scanning, URL categorization, web application filtering, and TLS decryption
-Describing the components, capabilities, and benefits of Cisco Umbrella

Endpoint Protection and Detection
-Comparing Endpoint Protection Platforms (EPP) and Endpoint Detection & Response (EDR) solutions
-Explaining antimalware, retrospective security, Indication of Compromise (IOC), antivirus, dynamic file analysis, and endpoint-sourced telemetry
-Configuring and verifying outbreak control and quarantines to limit infection
-Describing justifications for endpoint-based security
-Describing the value of endpoint device management and asset inventory such as MDM

Secure Network Access, Visibility, and Enforcement
-Describing identity management and secure network access concepts such as guest services, profiling, posture assessment and BYOD
-Configuring and verifying network access device functionality such as 802.1X, MAB

Cisco Voice Professional CCNA + CCNP Voice

Modul 1 CCENT/ICND 1 225 UE/5 Wochen

Alle Angaben ohne Gewähr. Für die Richtigkeit der Angaben sind ausschließlich die Anbieter verantwortlich.

Erstmals erschienen am 06.10.2022, zuletzt aktualisiert am 29.05.2024