CCNP-SCOR (350-701)
Create new career opportunities by being Cisco CCNP certified with the CCNP-SCOR (350-701) course and lab. The CCNP security training course and lab comprehensively cover the 350-701 SCOR exam objectives and expertise in the areas such as network security, cloud security, content security, endpoint protection, and detection, secure network access, visibility, and enforcement, and more. The CCNP certification training guide is equipped with comprehensive learning resources to help you deploy and configure Site-to-Site VPNs in Cisco Routers.
- Price: $279.99
- Delivery method: eLearning
- DIR Discount: 20%
Submit form to obtain discount
Test Prep
100+ Pre Assessment Questions |
2+ Full Length Tests |
100+ Post Assessment Questions |
200+ Practice Test Questions
Features
54+ LiveLab |
55+ Video tutorials |
01:40+ Hours
Fill in the blanks, drag and drop, multiple-choice single answer, ,multiple-choice multiple answer
Why choose TOPTALENT?
- Get assistance every step of the way from our Texas-based team, ensuring your training experience is hassle-free and aligned with your goals.
- Access an expansive range of over 3,000 training courses with a strong focus on Information Technology, Business Applications, and Leadership Development.
- Have confidence in an exceptional 95% approval rating from our students, reflecting outstanding satisfaction with our course content, program support, and overall customer service.
- Benefit from being taught by Professionally Certified Instructors with expertise in their fields and a strong commitment to making sure you learn and succeed.
Outline
Lessons 1:
Introduction
- The CCNP Security Certification
- The CCIE Security Certification
- The Exam Objectives (Domains)
- Steps to Pass the SCOR Exam
- Facts About the Exam
Lessons 2:
Cybersecurity Fundamentals
- Introduction to Cybersecurity
- Defining What Are Threats, Vulnerabilities, and Exploits
- Common Software and Hardware Vulnerabilities
- Confidentiality, Integrity, and Availability
- Cloud Security Threats
- IoT Security Threats
- An Introduction to Digital Forensics and Incident Response
- Summary
- Review All Key Topics
Lessons 3:
Cryptography
- Introduction to Cryptography
- Fundamentals of PKI
- Review All Key Topics
Lessons 4:
Software-Defined Networking Security and Network Programmability
- Introduction to Software-Defined Networking
- Introduction to Network Programmability
- Review All Key Topics
Lessons 5:
Authentication, Authorization, Accounting (AAA) and Identity Management
- Introduction to Authentication, Authorization, and Accounting
- Authentication
- Authorization
- Accounting
- Infrastructure Access Controls
- AAA Protocols
- Cisco Identity Services Engine (ISE)
- Configuring TACACS+ Access
- Configuring RADIUS Authentication
- Additional Cisco ISE Design Tips
- Review All Key Topics
Lessons 6:
Network Visibility and Segmentation
- Introduction to Network Visibility
- NetFlow
- IP Flow Information Export (IPFIX)
- NetFlow Deployment Scenarios
- Cisco Stealthwatch
- Cisco Cognitive Threat Analytics (CTA) and Encrypted Traffic Analytics (ETA)
- NetFlow Collection Considerations and Best Practices
- Configuring NetFlow in Cisco IOS and Cisco IOS-XE
- Configuring NetFlow in NX-OS
- Introduction to Network Segmentation
- Micro-Segmentation with Cisco ACI
- Segmentation with Cisco ISE
- Review All Key Topics
Lessons 7:
Infrastructure Security
- Securing Layer 2 Technologies
- Common Layer 2 Threats and How to Mitigate Them
- Network Foundation Protection
- Understanding and Securing the Management Plane
- Understanding the Control Plane
- Understanding and Securing the Data Plane
- Securing Management Traffic
- Implementing Logging Features
- Configuring NTP
- Securing the Network Infrastructure Device Image and Configuration Files
- Securing the Data Plane in IPv6
- Securing Routing Protocols and the Control Plane
- Review All Key Topics
Lessons 8:
Cisco Next-Generation Firewalls and Cisco Next-Generation Intrusion Prevention Systems
- Introduction to Cisco Next-Generation Firewalls …-Generation Intrusion Prevention Systems (NGIPS)
- Comparing Network Security Solutions That Provide Firewall Capabilities
- Deployment Modes of Network Security Solutions and Architectures That Provide Firewall Capabilities
- High Availability and Clustering
- Implementing Access Control
- Cisco Firepower Intrusion Policies
- Cisco Advanced Malware Protection (AMP)
- Security Intelligence, Security Updates, and Keeping Firepower Software Up to Date
- Review All Key Topics
Lessons 9:
Virtual Private Networks (VPNs)
- Virtual Private Network (VPN) Fundamentals
- Deploying and Configuring Site-to-Site VPNs in Cisco Routers
- Configuring Site-to-Site VPNs in Cisco ASA Firewalls
- Configuring Remote Access VPNs in the Cisco ASA
- Configuring Clientless Remote Access SSL VPNs in the Cisco ASA
- Configuring Client-Based Remote-Access SSL VPNs in the Cisco ASA
- Configuring Remote Access VPNs in FTD
- Configuring Site-to-Site VPNs in FTD
- Review All Key Topics
Lessons 10:
Securing the Cloud
- What Is Cloud and What Are the Cloud Service Models?
- DevOps, Continuous Integration (CI), Continuous Delivery (CD), and DevSecOps
- Describing the Customer vs. Provider Security Responsibility for the Different Cloud Service Models
- Cisco Umbrella
- Cisco Email Security in the Cloud
- Cisco Cloudlock
- Stealthwatch Cloud
- AppDynamics Cloud Monitoring
- Cisco Tetration
- Review All Key Topics
Lessons 11:
Content Security
- Content Security Fundamentals
- Cisco WSA
- Cisco ESA
- Cisco Content Security Management Appliance (SMA)
- Review All Key Topics
Lessons 12:
Endpoint Protection and Detection
- Introduction to Endpoint Protection and Detection
- Cisco AMP for Endpoints
- Cisco Threat Response
- Review All Key Topics
Lessons 13:
Final Preparation
- Hands-on Activities
- Suggested Plan for Final Review and Study
- Summary