Product image media
Product image media

Implementing and Operating Cisco Security Core Technologies (SCOR)

25.000,00 kr

Beskrivelse


After taking this course, you should be able to:

  • Describe information security concepts and strategies within the network
  • Describe common TCP/IP, network application, and endpoint attacks
  • Describe how various network security technologies work together to guard against attacks
  • Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall
  • Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance
  • Describe and implement web content security features and functions provided by Cisco Web Security Appliance
  • Describe Cisco Umbrella® security capabilities, deployment models, policy management, and Investigate console
  • Introduce VPNs and describe cryptography solutions and algorithms
  • Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco Internetwork Operating System (Cisco IOS®) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco Firepower Next-Generation Firewall (NGFW)
  • Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and Extensible Authentication Protocol (EAP) authentication
  • ...%%%

    ...

  • Provide basic understanding of endpoint security and describe Advanced Malware Protection (AMP) for Endpoints architecture and basic features
  • Examine various defenses on Cisco devices that protect the control and management plane
  • Configure and verify Cisco IOS software Layer 2 and Layer 3 data plane controls
  • Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions
  • Describe basics of cloud computing and common cloud attacks and how to secure cloud environment

Indhold


Kurset i overskrifter:

  • Describing Information Security Concepts*
  • Describing Common TCP/IP Attacks*
  • Describing Common Network Application Attacks*
  • Describing Common Endpoint Attacks*
  • Describing Network Security Technologies
  • Deploying Cisco ASA Firewall
  • Deploying Cisco Firepower Next-Generation Firewall
  • Deploying Email Content Security
  • Deploying Web Content Security
  • Deploying Cisco Umbrella*
  • Explaining VPN Technologies and Cryptography
  • Introducing Cisco Secure Site-to-Site VPN Solutions
  • Deploying Cisco IOS VTI-Based Point-to-Point IPsec VPNs
  • Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW
  • Introducing Cisco Secure Remote Access VPN Solutions
  • Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW
  • Explaining Cisco Secure Network Access Solutions
  • Describing 802.1X Authentication
  • Configuring 802.1X Authentication
  • Describing Endpoint Security Technologies*
  • Deploying Cisco Advanced Malware Protection (AMP) for Endpoints*
  • Introducing Network Infrastructure Protection*
  • Deploying Control Plane Security Controls*
  • Deploying Layer 2 Data Plane Security Controls*
  • Deploying Layer 3 Data Plane Security Controls*
  • Deploying Traffic Telemetry Methods*
  • Describing Cloud and Common Cloud Attacks*
  • Deploying Cisco Stealthwatch Cloud*
  • This section is self-study material that can be done at your own pace if you are taking the instructor-led version of this course. Labs:
  • Lab Familiarization (Base Learning Lab)
  • Configure Secure Management Access for Cisco Wireless LAN Controllers (WLCs) and Access Points (APs)
  • Add Network Devices and External Resources to Cisco Prime Infrastructure
  • Capture a Successful AP Authentication
  • Implement Authentication, Authorization, and Accounting (AAA) Services for Central Mode WLANs
  • Implement AAA Services for FlexConnect Mode Wireless LANs (WLANs)
  • Configure Guest Services in the Wireless Network
  • Configure Bring Your Own Device (BYOD) in the Wireless Network
  • Capture Successful Client Authentications
  • Configure QoS in the Wireless Network for Voice and Video Services
  • Configure Cisco Application Visibility and Control (AVC) in the Wireless Network
  • Capture Successful QoS Traffic Marking in the Wireless Network
  • Configure, Detect, and Locate Services on the Cisco CMX
  • Identify Wireless Clients and Security Threats