Cisco CCNP Security (SCOR 350-701)           Virtuelles Klassenzimmer

Next Date:
08.04.2024 - Montag - Freitag  (9.00 - 17.00 Uhr)
Course ends on:
12.04.2024
Total Duration:
40 Stunden in 5 Tagen
Internship:
Nein
Teaching Languages:
  • Deutsch
Type of Course:
  • Weiterbildung 
Type of Provision:
  • Virtuelles Klassenzimmer 
Execution Time:
  • Tagesveranstaltung
min. Participants:
keine Angaben
max. Participants:
15
Price:
keine Angaben
Type of Qualification:
Herstellerzertifikat 
Final Examination:
Ja
Qualification Title:
Cisco Certified Specialist - Security Core
Certifications of the Course:
  • Cisco
Courses for Women only:
Nein
Childcare:
Nein
Quantity of Details:
Suchportal Standard

Target Groups:
 Angehende IT Supporter, Netzwerktechniker, IT- Kundenbetreuer, Systembetreuer der Netzwerke (LAN WAN), Servicetechniker, Es richtet sich an Mitarbeiter der Bereiche Administration und Support
Professional Requirements:
Netzwerkgrundlagen auf CCNA-Ebene
Technical Requirements:
Keine besonderen Anforderungen.
Classification of the Federal Employment Agency:
  • C 1430-10-25 Andere Betriebssysteme, Netzwerke - Administration und Zertifizierungen
  • C 1430-25-10 IT-Sicherheit, Datenschutz - allgemein

Contents

Implementing and Operating Cisco Security Core Technologies v1.0 (SCOR 350-701)

Dieser Kurs vermittelt Kenntnisse an die Teilnehmer über die Implementierung und den Betrieb von zentralen Sicherheitstechnologien, einschließlich Netzwerksicherheit, Cloud-Sicherheit, Inhaltssicherheit, Endpunktschutz und -erkennung, sicherem Netzwerkzugriff, Sichtbarkeit und Durchsetzung. Der Kurs Implementierung und Betrieb von Cisco Security Core Technologies hilft den Kandidaten, sich auf diese Prüfung vorzubereiten.
Abschluss: Cisco Certified Specialist - Security Core


Course Content

Security Concepts
Explaining common threats against on-premises and cloud environments
Comparing common security vulnerabilities such as software bugs, weak and/or hardcoded passwords, SQL injection, missing encryption, buffer overflow, path traversal, cross-site scripting/forgery
Describing functions of the cryptography components such as hashing, encryption, PKI, SSL, IPsec, NAT-T IPv4 for IPsec, pre-shared key and certificate based authorization
Comparing site-to-site VPN and remote access VPN deployment types such as sVTI, IPsec, Cryptomap, DMVPN, FLEXVPN including high availability considerations, and AnyConnect
Explaining North Bound and South Bound APIs in the SDN architecture
Explaining DNAC APIs for network provisioning, optimization, monitoring, and troubleshooting
Interpreting basic Python scripts used to call Cisco Security appliances APIs

Network Security
Comparing network security solutions that provide intrusion prevention and firewall capabilities
Describing deployment models of network security solutions and architectures that provide intrusion prevention and firewall capabilities
Describing the components, capabilities, and benefits of NetFlow and Flexible NetFlow records
Configuring and verifying network infrastructure security methods (router, switch, wireless)
Implementing segmentation, access control policies, AVC, URL filtering, and malware protection
Configuring AAA for device and network access (authentication and authorization, TACACS+, RADIUS and RADIUS flows, accounting, and dACL)
Configuring secure network management of perimeter security and infrastructure devices (secure device management, SNMPv3, views, groups, users, authentication, and encryption, secure logging, and NTP with authentication)
Configuring and verify site-to-site VPN and remote access VPN

Securing the Cloud
Identifying security solutions for cloud environments
Comparing the customer vs. provider security responsibility for the different cloud service models
Describing the concept of DevSecOps (CI/CD pipeline, container orchestration, and security
Implementing application and data security in cloud environments

Content Security
Implementing traffic redirection and capture methods
Describing web proxy identity and authentication including transparent user identification
Comparing the components, capabilities, and benefits of local and cloud-based email and web solutions (ESA, CES, WSA)
Configuring and verifying web and email security deployment methods to protect on-premises and remote users (inbound and outbound controls and policy management)
Configuring and verifying email security features such as SPAM filtering, antimalware filtering, DLP, blacklisting, and email encryption
Configuring and verifying secure internet gateway and web security features such as blacklisting, URL filtering, malware scanning, URL categorization, web application filtering, and TLS decryption

Endpoint Protection and Detection
Comparing Endpoint Protection Platforms (EPP) and Endpoint Detection & Response (EDR) solutions
Explaining antimalware, retrospective security, Indication of Compromise (IOC), antivirus, dynamic file analysis, and endpoint-sourced telemetry
Configuring and verifying outbreak control and quarantines to limit infection
Describing justifications for endpoint-based security
Describing the value of endpoint device management and asset inventory such as MDM
Describing the uses and importance of a multifactor authentication (MFA) strategy

Secure Network Access, Visibility, and Enforcement
Describing identity management and secure network access concepts such as guest services, profiling, posture assessment and BYOD
Configuring and verifying network access device functionality such as 802.1X, MAB, WebAuth
Describing network access with CoA
Describing the benefits of device compliance and application control
Explaining exfiltration techniques (DNS tunneling, HTTPS, email, FTP/SSH/SCP/SFTP, ICMP, Messenger, IRC, NTP)

All statements without guarantee. The providers are solely responsible for the correctness of the given information.

Published on 18.09.2021, last updated on 28.03.2024