Cisco CCNP Security (SCOR 350-701)           Virtuelles Klassenzimmer

Następny termin:
15.04.2024 - Montag - Freitag  (9.00 - 17.00 Uhr)
Oferta wygasa w dniu:
19.04.2024
Łączny czas trwania:
40 Stunden in 5 Tagen
Praktyka:
Nein
Język wykładowy:
  • Deutsch
Rodzaj szkolenia:
  • Weiterbildung 
Forma oferty:
  • Virtuelles Klassenzimmer 
Czas przeprowadzania zajęć:
  • Tagesveranstaltung
Min. ilość uczestników:
keine Angaben
Maks. ilość uczestników:
15
Cena:
keine Angaben
Rodzaj dyplomu:
Herstellerzertifikat 
Egzamin końcowy:
Ja
Rodzaj świadectwa ukończenia:
Cisco Certified Specialist - Security Core
Certyfikaty oferty:
  • Cisco
Oferty tylko dla kobiet:
Nein
Organizatorzy oferujący opieką dla dzieci:
Nein
Jakość informacji:
Suchportal Standard

Grupy docelowe:
 Angehende IT Supporter, Netzwerktechniker, IT- Kundenbetreuer, Systembetreuer der Netzwerke (LAN WAN), Servicetechniker, Es richtet sich an Mitarbeiter der Bereiche Administration und Support
Wymagania specjalistyczne:
Netzwerkgrundlagen auf CCNA-Ebene
Wymagania techniczne:
Keine besonderen Anforderungen.
Systematyka agencji zatrudnienia:
  • C 1430-10-25 Andere Betriebssysteme, Netzwerke - Administration und Zertifizierungen
  • C 1430-25-10 IT-Sicherheit, Datenschutz - allgemein

Treści

Implementing and Operating Cisco Security Core Technologies v1.0 (SCOR 350-701)

Dieser Kurs vermittelt Kenntnisse an die Teilnehmer über die Implementierung und den Betrieb von zentralen Sicherheitstechnologien, einschließlich Netzwerksicherheit, Cloud-Sicherheit, Inhaltssicherheit, Endpunktschutz und -erkennung, sicherem Netzwerkzugriff, Sichtbarkeit und Durchsetzung. Der Kurs Implementierung und Betrieb von Cisco Security Core Technologies hilft den Kandidaten, sich auf diese Prüfung vorzubereiten.
Abschluss: Cisco Certified Specialist - Security Core


Course Content

Security Concepts
Explaining common threats against on-premises and cloud environments
Comparing common security vulnerabilities such as software bugs, weak and/or hardcoded passwords, SQL injection, missing encryption, buffer overflow, path traversal, cross-site scripting/forgery
Describing functions of the cryptography components such as hashing, encryption, PKI, SSL, IPsec, NAT-T IPv4 for IPsec, pre-shared key and certificate based authorization
Comparing site-to-site VPN and remote access VPN deployment types such as sVTI, IPsec, Cryptomap, DMVPN, FLEXVPN including high availability considerations, and AnyConnect
Explaining North Bound and South Bound APIs in the SDN architecture
Explaining DNAC APIs for network provisioning, optimization, monitoring, and troubleshooting
Interpreting basic Python scripts used to call Cisco Security appliances APIs

Network Security
Comparing network security solutions that provide intrusion prevention and firewall capabilities
Describing deployment models of network security solutions and architectures that provide intrusion prevention and firewall capabilities
Describing the components, capabilities, and benefits of NetFlow and Flexible NetFlow records
Configuring and verifying network infrastructure security methods (router, switch, wireless)
Implementing segmentation, access control policies, AVC, URL filtering, and malware protection
Configuring AAA for device and network access (authentication and authorization, TACACS+, RADIUS and RADIUS flows, accounting, and dACL)
Configuring secure network management of perimeter security and infrastructure devices (secure device management, SNMPv3, views, groups, users, authentication, and encryption, secure logging, and NTP with authentication)
Configuring and verify site-to-site VPN and remote access VPN

Securing the Cloud
Identifying security solutions for cloud environments
Comparing the customer vs. provider security responsibility for the different cloud service models
Describing the concept of DevSecOps (CI/CD pipeline, container orchestration, and security
Implementing application and data security in cloud environments

Content Security
Implementing traffic redirection and capture methods
Describing web proxy identity and authentication including transparent user identification
Comparing the components, capabilities, and benefits of local and cloud-based email and web solutions (ESA, CES, WSA)
Configuring and verifying web and email security deployment methods to protect on-premises and remote users (inbound and outbound controls and policy management)
Configuring and verifying email security features such as SPAM filtering, antimalware filtering, DLP, blacklisting, and email encryption
Configuring and verifying secure internet gateway and web security features such as blacklisting, URL filtering, malware scanning, URL categorization, web application filtering, and TLS decryption

Endpoint Protection and Detection
Comparing Endpoint Protection Platforms (EPP) and Endpoint Detection & Response (EDR) solutions
Explaining antimalware, retrospective security, Indication of Compromise (IOC), antivirus, dynamic file analysis, and endpoint-sourced telemetry
Configuring and verifying outbreak control and quarantines to limit infection
Describing justifications for endpoint-based security
Describing the value of endpoint device management and asset inventory such as MDM
Describing the uses and importance of a multifactor authentication (MFA) strategy

Secure Network Access, Visibility, and Enforcement
Describing identity management and secure network access concepts such as guest services, profiling, posture assessment and BYOD
Configuring and verifying network access device functionality such as 802.1X, MAB, WebAuth
Describing network access with CoA
Describing the benefits of device compliance and application control
Explaining exfiltration techniques (DNS tunneling, HTTPS, email, FTP/SSH/SCP/SFTP, ICMP, Messenger, IRC, NTP)

Wszystkie informacje bez gwarancji. Za poprawność informacji odpowiadają wyłącznie organizatorzy.

Po raz pierwszy opublikowano dnia 09.02.2021, Ostatnia aktualizacja 15.04.2024