Cisco CCNP Security - SCOR (Dozentengeleitetes Vollzeit Präsenz und Virtuelles Training)

Prochain date:
14.08.2023 - Montag - Freitag  (9.00 - 16.00 Uhr)
Le cours se termine le:
29.09.2023
Durée totale:
280 Stunden in 35 Tagen
Stage:
Nein
Langues d'enseignement:
  • Deutsch
Type de formation:
  • Weiterbildung 
Forme de cours:
  • Präsenzveranstaltung 
Temps d'exécution:
  • Tagesveranstaltung
Participants min.:
6
Participants max.:
15
Prix:
keine Angaben
Opportunité de financement:
  • EU/Bund/Land 
  • Bildungsgutschein 
Type de diplôme:
Herstellerzertifikat 
Examen final:
Ja
Désignation de diplôme:
Implementing and Operating Cisco Security Core Technologies v1.0 (SCOR 350-701)
Certifications du cours:
  • SGB III-Maßnahmezulassung 
Numéro de certification du cours:
  • 922/243/2020
Cours pour femmes uniquement:
Nein
Garde d’enfants:
Nein
Qualité de l’information:
Suchportal Standard Plus

Groupes cibles:
 Arbeitssuchende IT Interessierte die lernbereit sind und für neue Perspektiven Ihre Zukunft vorbereiten möchten
Connaissances spécialisées:
Netzwerkgrundlagen auf CCNA-Ebene
Connaissances techniques:
Keine besonderen Anforderungen.
Classification de l’Agence pour l’emploi:
  • C 1430-10-25 Andere Betriebssysteme, Netzwerke - Administration und Zertifizierungen
  • C 1430-25-20 IT-Sicherheit - Zertifizierungen

Contenus

Implementing and Operating Cisco Security Core Technologies v1.0 (SCOR 350-701)

Dieser Kurs vermittelt Kenntnisse an die Teilnehmer über die Implementierung und den Betrieb von zentralen Sicherheitstechnologien, einschließlich Netzwerksicherheit, Cloud-Sicherheit, Inhaltssicherheit, Endpunktschutz und -erkennung, sicherem Netzwerkzugriff, Sichtbarkeit und Durchsetzung. Der Kurs Implementierung und Betrieb von Cisco Security Core Technologies hilft den Kandidaten, sich auf diese Prüfung vorzubereiten.

Security Concepts
-Explaining common threats against on-premises and cloud environments
-Comparing common security vulnerabilities such as software bugs, weak and/or hardcoded passwords, SQL injection, missing encryption, buffer overflow, path traversal, cross-site scripting/forgery
-Describing functions of the cryptography components such as hashing, encryption, PKI, SSL, IPsec, NAT-T IPv4 for IPsec, pre-shared key and certificate based authorization
-Comparing site-to-site VPN and remote access VPN deployment types such as sVTI, IPsec, Cryptomap, DMVPN, FLEXVPN including high availability considerations, and AnyConnect
-Describing security intelligence authoring, sharing, and consumption
-Explaining the role of the endpoint in protecting humans from phishing and social engineering attacks
-Explaining North Bound and South Bound APIs in the SDN architecture
-Explaining DNAC APIs for network provisioning, optimization, monitoring, and troubleshooting

Network Security
-Comparing network security solutions that provide intrusion prevention and firewall capabilities
-Describing deployment models of network security solutions and architectures that provide intrusion prevention and firewall capabilities
-Describing the components, capabilities, and benefits of NetFlow and Flexible NetFlow records
-Configuring and verifying network infrastructure security methods (router, switch, wireless)
-Implementing segmentation, access control policies, AVC, URL filtering, and malware protection
-Implementing management options for network security solutions such as intrusion prevention and perimeter security (Single vs. multidevice manager, in-band vs. out-of-band, CDP, DNS, SCP, SFTP, and DHCP security and risks)
-Configuring AAA for device and network access (authentication and authorization, TACACS+, RADIUS and RADIUS flows, accounting, and dACL)
-Configuring secure network management of perimeter security and infrastructure devices (secure device management, SNMPv3, views, groups, users, authentication, and encryption, secure logging, and NTP with authentication)

Securing the Cloud
-Identifying security solutions for cloud environments
-Comparing the customer vs. provider security responsibility for the different cloud service models
-Describing the concept of DevSecOps (CI/CD pipeline, container orchestration, and security
-Implementing application and data security in cloud environments
-Identifying security capabilities, deployment models, and policy management to secure the cloud
-Configuring cloud logging and monitoring methodologies

Content Security
-Implementing traffic redirection and capture methods
-Describing web proxy identity and authentication including transparent user identification
-Comparing the components, capabilities, and benefits of local and cloud-based email and web solutions (ESA, CES, WSA)
-Configuring and verifying web and email security deployment methods to protect on-premises and remote users (inbound and outbound controls and policy management)
-Configuring and verifying email security features such as SPAM filtering, antimalware filtering, DLP, blacklisting, and email encryption
-Configuring and verifying secure internet gateway and web security features such as blacklisting, URL filtering, malware scanning, URL categorization, web application filtering, and TLS decryption
-Describing the components, capabilities, and benefits of Cisco Umbrella

Endpoint Protection and Detection
-Comparing Endpoint Protection Platforms (EPP) and Endpoint Detection & Response (EDR) solutions
-Explaining antimalware, retrospective security, Indication of Compromise (IOC), antivirus, dynamic file analysis, and endpoint-sourced telemetry
-Configuring and verifying outbreak control and quarantines to limit infection
-Describing justifications for endpoint-based security
-Describing the value of endpoint device management and asset inventory such as MDM

Secure Network Access, Visibility, and Enforcement
-Describing identity management and secure network access concepts such as guest services, profiling, posture assessment and BYOD
-Configuring and verifying network access device functionality such as 802.1X, MAB, WebAuth
-Describing network access with CoA
-Describing the benefits of device compliance and application control
-Explaining exfiltration techniques(DNS tunneling, HTTPS, email FTP/SSH/SCP/SFTP, ICMP, Messenger, IRC, NTP)

Cisco Voice Professional CCNA + CCNP Voice

Modul 1 CCENT/ICND 1 225 UE/5 Wochen

Toutes les informations sont sans garantie. Les prestataires sont seuls responsables de la justesse des informations mises à disposition.

Première publication le 07.05.2020, dernière mise à jour le 14.08.2023