Implementing and Operating Cisco Security Core Technologies (SCOR) training course

On‑Demand: $500 | Instructor‑Led: $4,080 | Duration: 5 Days

The Implementing and Operating Cisco Security Core Technologies (SCOR) training helps you gain the skills and technologies needed to implement core Cisco security solutions. This training will ready you to provide advanced threat protection against cybersecurity attacks and prepare you for senior-level security roles.  

This training prepares you for the 350-701 SCOR v1.1 exam. If passed, you earn the Cisco Certified Specialist – Security Core certification and satisfy the core exam requirement for the Cisco Certified Network Professional (CCNP) Security and Cisco Certified Internetwork Expert (CCIE) Security certifications. This training also earns you 64 Continuing Education (CE) credits toward recertification. 

Reserve your seat in an upcoming class date or select a Learning Method below:

There are currently no upcoming course dates scheduled. Please complete the form to request a date/receive schedule update notifications:

    Course Highlights

    LEVEL: 
    • Intermediate
    TOPICS & JOB ROLES: 

    Implementing and Operating Cisco Security Core Technologies (SCOR) Course Outline

    The Implementing and Operating Cisco Security Core Technologies (SCOR) training helps you gain the skills and technologies needed to implement core Cisco security solutions. This training will ready you to provide advanced threat protection against cybersecurity attacks and prepare you for senior-level security roles.  

    This training prepares you for the 350-701 SCOR v1.1 exam. If passed, you earn the Cisco Certified Specialist – Security Core certification and satisfy the core exam requirement for the Cisco Certified Network Professional (CCNP) Security and Cisco Certified Internetwork Expert (CCIE) Security certifications. This training also earns you 64 Continuing Education (CE) credits toward recertification. 

    Who Should Attend this Course?
    • Security Engineers 
    • Network Engineers 
    • Network Designers 
    • Network Administrators 
    • Systems Engineers 
    • Consulting Systems Engineers 
    • Technical Solutions Architects 
    • Cisco Integrators and Partners 
    • Network Managers 
    • Program Managers 
    • Project Managers 
    PREREQUISITES

    There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are: 

    • Familiarity with Ethernet and TCP/IP networking 
    • Working knowledge of the Windows operating system 
    • Working knowledge of Cisco IOS networking and concepts 
    • Familiarity with basics of networking security concepts 

    These skills can be found in the following Cisco Learning Offering:  

    • Implementing and Administering Cisco Solutions (CCNA®) 

    • Network Security Technologies 
    • Cisco Secure Firewall ASA Deployment 
    • Cisco Secure Firewall Threat Defense Basics 
    • Cisco Secure Firewall Threat Defense IPS, Malware, and File Policies 
    • Cisco Secure Email Gateway Basics 
    • Cisco Secure Email Policy Configuration 
    • Cisco Secure Web Appliance Deployment 
    • VPN Technologies and Cryptography Concepts 
    • Cisco Secure Site-to-Site VPN Solutions 
    • Cisco IOS VTI-Based Point-to-Point IPsec VPNs 
    • Point-to-Point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense 
    • Cisco Secure Remote-Access VPN Solutions 
    • Remote-Access SSL VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense 
    • Describing Information Security Concepts 
    • Describe Common TCP/IP Attacks 
    • Describe Common Network Application Attacks 
    • Common Endpoint Attacks 
    • Cisco Umbrella Deployment 
    • Endpoint Security Technologies 
    • Cisco Secure Endpoint 
    • Cisco Secure Network Access Solutions 
    • 802.1X Authentication 
    • 802.1X Authentication Configuration 
    • Network Infrastructure Protection 
    • Control Plane Security Solutions 
    • Layer 2 Data Plane Security Controls 
    • Layer 3 Data Plane Security Controls 
    • Management Plane Security Controls 
    • Traffic Telemetry Methods 
    • Cisco Secure Network Analytics Deployment 
    • Cloud Computing and Cloud Security 
    • Cloud Security 
    • Cisco Secure Cloud Analytics Deployment 
    • Software-Defined Networking 

    Lab Outline

    • Configure Network Settings and NAT on Cisco Secure Firewall ASA 
    • Configure Cisco Secure Firewall ASA Access Control Policies 
    • Configure Cisco Secure Firewall Threat Defense NAT 
    • Configure Cisco Secure Firewall Threat Defense Access Control Policy 
    • Configure Cisco Secure Firewall Threat Defense Discovery and IPS Policy 
    • Configure Cisco Secure Firewall Threat Defense Malware and File Policy 
    • Configure Listener, HAT, and RAT on Cisco Email Secure Email Gateway 
    • Configure Cisco Secure Email Policies 
    • Configure Proxy Services, Authentication, and HTTPS Decryption 
    • Enforce Acceptable Use Control and Malware Protection 
    • Configure Static VTI Point-to-Point IPsec IKEv2 Tunnel  
    • Configure Point-to-Point VPN between Cisco Secure Firewall Threat Defense Devices 
    • Configure Remote Access VPN on the Cisco Secure Firewall Threat Defense 
    • Examine Cisco Umbrella Dashboard and DNS Security 
    • Examine Cisco Umbrella Secure Web Gateway and Cloud-Delivered Firewall 
    • Explore Cisco Umbrella CASB Functionalities 
    • Explore Cisco Secure Endpoint 
    • Perform Endpoint Analysis Using Cisco Secure Endpoint Console 
    • Explore File Ransomware Protection by Cisco Secure Endpoint Console 
    • Explore Secure Network Analytics v7.4.2 
    • Explore Global Threat Alerts Integration and ETA Cryptographic Audit 
    • Explore Cloud Analytics Dashboard and Operations 
    • Explore Secure Cloud Private and Public Cloud Monitoring 

    Related Job Roles

    Explore Related Training Courses with TechSherpas 365