Cisco CCNP Security (SCOR 350-701)           Virtuelles Klassenzimmer

Наступний запис:
20.03.2023 - Montag - Freitag  (9.00 - 17.00 Uhr)
Курс завершується:
24.03.2023
Загальна тривалість:
in 5 Tagen
Практика:
Nein
Мови навчання:
  • Deutsch
Вид заходу:
  • Weiterbildung 
Форма проведення:
  • Virtuelles Klassenzimmer 
Час проведення:
  • Tagesveranstaltung
Мінімальна кількість учасників:
keine Angaben
Максимальна кількість учасників:
15
Ціна:
keine Angaben
Вид документа про освіту:
Herstellerzertifikat 
Випускний екзамен:
Ja
Спеціальність:
Cisco Certified Specialist - Security Core
Сертифікати курсу:
  • Cisco
Курс тільки для жінок:
Nein
Догляд за дітьми:
Nein
Інформаційна якість:
Suchportal Standard

Цільові групи:
 Angehende IT Supporter, Netzwerktechniker, IT- Kundenbetreuer, Systembetreuer der Netzwerke (LAN WAN), Servicetechniker, Es richtet sich an Mitarbeiter der Bereiche Administration und Support
Професійні вимоги:
Netzwerkgrundlagen auf CCNA-Ebene
Технічні вимоги:
Keine besonderen Anforderungen.
Номенклатура агенцій з працевлаштування:
  • C 1430-10-25 Andere Betriebssysteme, Netzwerke - Administration und Zertifizierungen
  • C 1430-25-10 IT-Sicherheit, Datenschutz - allgemein

Зміст

Implementing and Operating Cisco Security Core Technologies v1.0 (SCOR 350-701)

Dieser Kurs vermittelt Kenntnisse an die Teilnehmer über die Implementierung und den Betrieb von zentralen Sicherheitstechnologien, einschließlich Netzwerksicherheit, Cloud-Sicherheit, Inhaltssicherheit, Endpunktschutz und -erkennung, sicherem Netzwerkzugriff, Sichtbarkeit und Durchsetzung. Der Kurs Implementierung und Betrieb von Cisco Security Core Technologies hilft den Kandidaten, sich auf diese Prüfung vorzubereiten.
Abschluss: Cisco Certified Specialist - Security Core


Course Content

Security Concepts
Explaining common threats against on-premises and cloud environments
Comparing common security vulnerabilities such as software bugs, weak and/or hardcoded passwords, SQL injection, missing encryption, buffer overflow, path traversal, cross-site scripting/forgery
Describing functions of the cryptography components such as hashing, encryption, PKI, SSL, IPsec, NAT-T IPv4 for IPsec, pre-shared key and certificate based authorization
Comparing site-to-site VPN and remote access VPN deployment types such as sVTI, IPsec, Cryptomap, DMVPN, FLEXVPN including high availability considerations, and AnyConnect
Explaining North Bound and South Bound APIs in the SDN architecture
Explaining DNAC APIs for network provisioning, optimization, monitoring, and troubleshooting
Interpreting basic Python scripts used to call Cisco Security appliances APIs

Network Security
Comparing network security solutions that provide intrusion prevention and firewall capabilities
Describing deployment models of network security solutions and architectures that provide intrusion prevention and firewall capabilities
Describing the components, capabilities, and benefits of NetFlow and Flexible NetFlow records
Configuring and verifying network infrastructure security methods (router, switch, wireless)
Implementing segmentation, access control policies, AVC, URL filtering, and malware protection
Configuring AAA for device and network access (authentication and authorization, TACACS+, RADIUS and RADIUS flows, accounting, and dACL)
Configuring secure network management of perimeter security and infrastructure devices (secure device management, SNMPv3, views, groups, users, authentication, and encryption, secure logging, and NTP with authentication)
Configuring and verify site-to-site VPN and remote access VPN

Securing the Cloud
Identifying security solutions for cloud environments
Comparing the customer vs. provider security responsibility for the different cloud service models
Describing the concept of DevSecOps (CI/CD pipeline, container orchestration, and security
Implementing application and data security in cloud environments

Content Security
Implementing traffic redirection and capture methods
Describing web proxy identity and authentication including transparent user identification
Comparing the components, capabilities, and benefits of local and cloud-based email and web solutions (ESA, CES, WSA)
Configuring and verifying web and email security deployment methods to protect on-premises and remote users (inbound and outbound controls and policy management)
Configuring and verifying email security features such as SPAM filtering, antimalware filtering, DLP, blacklisting, and email encryption
Configuring and verifying secure internet gateway and web security features such as blacklisting, URL filtering, malware scanning, URL categorization, web application filtering, and TLS decryption

Endpoint Protection and Detection
Comparing Endpoint Protection Platforms (EPP) and Endpoint Detection & Response (EDR) solutions
Explaining antimalware, retrospective security, Indication of Compromise (IOC), antivirus, dynamic file analysis, and endpoint-sourced telemetry
Configuring and verifying outbreak control and quarantines to limit infection
Describing justifications for endpoint-based security
Describing the value of endpoint device management and asset inventory such as MDM
Describing the uses and importance of a multifactor authentication (MFA) strategy

Secure Network Access, Visibility, and Enforcement
Describing identity management and secure network access concepts such as guest services, profiling, posture assessment and BYOD
Configuring and verifying network access device functionality such as 802.1X, MAB, WebAuth
Describing network access with CoA
Describing the benefits of device compliance and application control
Explaining exfiltration techniques (DNS tunneling, HTTPS, email, FTP/SSH/SCP/SFTP, ICMP, Messenger, IRC, NTP)

Ми не гарантуємо правильність інформації. Відповідальність за правильність даних несуть виключно освітні організації.

Дата першої публікації: 18.09.2021, дата останнього оновлення: 20.03.2023