- Home
- Courses
- Курсове с Инструктор
- Cisco
- 350-701 – SCOR – Cisco – CCNP Security – Implementing and Operating Cisco Security Core Technologies
350-701 – SCOR – Cisco – CCNP Security – Implementing and Operating Cisco Security Core Technologies
- 2 (Registered)
-
(0 Reviews)
Curriculum
- 34 Sections
- 149 Lessons
- 9999 Weeks
Expand all sectionsCollapse all sections
- 1. Describing Information Security Concepts (SP)0
- 2. Describing Common TCP/IP Attacks (SP)0
- 3. Describing Common Network Application Attacks (SP)0
- 4. Describing Common Endpoint Attacks (SP)0
- 5. Describing Network Security Technologies18
- 6.15.1 Introduction
- 6.25.2 Defense-in-Depth Strategy
- 6.35.3 Defending Across the Attack Continuum
- 6.45.4 Network Segmentation and Virtualization Overview
- 6.55.5 Stateful Firewall Overview
- 6.65.6 Security Intelligence Overview
- 6.75.7 Threat Information Standardization
- 6.85.8 Network-Based Malware Protection Overview
- 6.95.9 IPS Overview
- 6.105.10 Next Generation Firewall Overview
- 6.115.11 Email Content Security Overview
- 6.125.12 Web Content Security Overview
- 6.135.13 Threat Analytic Systems Overview
- 6.145.14 DNS Security Overview
- 6.155.15 Authentication, Authorization, and Accounting Overview
- 6.165.16 Identity and Access Management Overview
- 6.175.17 Virtual Private Network Technology Overview
- 6.185.18 Network Security Device Form Factors Overview
- 6. Deploying Cisco ASA Firewall12
- 7.16.1 Intro
- 7.26.2 Cisco ASA Deployment Types
- 7.36.3 Cisco ASA Interface Security Levels
- 7.46.4 Cisco ASA Objects and Object Groups
- 7.56.5 Network Address Translation
- 7.66.6 Configure Network Settings and NAT on Cisco ASA
- 7.76.7 Cisco ASA Interface ACL
- 7.86.8 Cisco ASA Global ACLs
- 7.96.9 Cisco ASA Advanced Access Policies
- 7.106.10 Configure Cisco ASA Access Control Policies
- 7.116.11 Cisco ASA HA Overview
- 7.126.12 Summary Challenge
- 7. Deploying Cisco Firepower Next-Generation Firewall16
- 8.17.1 Intro
- 8.27.2 Deploying Cisco Firepower Next-Generation Firewall
- 8.37.3 Cisco Firepower NGFW Packet Processing and Policies
- 8.47.4 Cisco Firepower NGFW Objects
- 8.57.5 Cisco Firepower NGFW NAT
- 8.67.6 Configure Cisco Firepower NGFW NAT
- 8.77.7 Cisco Firepower NGFW Prefilter Policies
- 8.87.8 Cisco Firepower NGFW Access Control Policies
- 8.97.9 Cisco Firepower NGFW Security Intelligence
- 8.107.10 Configure Cisco Firepower NGFW Access Control Policy
- 8.117.11 Cisco Firepower NGFW Discovery Policies
- 8.127.12 Cisco Firepower NGFW IPS Policies
- 8.137.13 Configure Cisco Firepower NGFW Discovery and IPS Policy
- 8.147.14 Cisco Firepower NGFW Malware and File Policies
- 8.157.15 Configure Cisco NGFW Malware and File Policy
- 8.167.16 Summary Challenge
- 8. Deploying Email Content Security16
- 9.18.1 Intro
- 9.28.2 Cisco Email Content Security Overview
- 9.38.3 SMTP Overview
- 9.48.4 Email Pipeline Overview
- 9.58.5 Public and Private Listeners
- 9.68.6 Host Access Table Overview
- 9.78.7 Recipient Access Table Overview
- 9.88.8 Configure Listener, HAT, and RAT on Cisco ESA
- 9.98.9 Mail Policies Overview
- 9.108.10 Protection Against Spam and Graymail
- 9.118.11 Antivirus and Anti-malware Protection
- 9.128.12 Outbreak Filters
- 9.138.13 Content Filters
- 9.148.14 Data Loss Prevention
- 9.158.15 Email Encryption
- 9.168.16 Configure Mail Policies
- 9. Deploying Web Content Security11
- 10.19.1 Introduction
- 10.29.2 Cisco WSA Overview
- 10.39.3 Deployment Options
- 10.49.4 Network Users Authentication
- 10.59.5 HTTPS Traffic Decryption
- 10.69.6 Configure Proxy Services, Authentication, and HTTPS Decryption
- 10.79.7 Access Policies and Identification
- 10.89.8 Acceptable Use Controls Settings
- 10.99.9 Anti-Malware Protection
- 10.109.10 Enforce Acceptable Use Control and Malware Protection
- 10.119.11 Summary
- 10. Deploying Cisco Umbrella (SP)9
- 11.110.1 Introduction
- 11.210.2 Cisco Umbrella Architecture
- 11.310.3 Deploying Cisco Umbrella
- 11.410.4 Cisco Umbrella Roaming Client
- 11.510.5 Managing Cisco Umbrella
- 11.610.6 Cisco Umbrella Investigate Overview
- 11.710.7 Examine the Umbrella Dashboard
- 11.810.8 Examine Cisco Umbrella Investigate
- 11.910.9 Explore DNS Ransomware Protection by Cisco Umbrella
- 11. Explaining VPN Technologies and Cryptography6
- 12. Introducing Cisco Secure Site-to-Site VPN Solutions7
- 13. Deploying Cisco IOS VTI-Based Point-to-Point IPsec VPNs4
- 14. Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW5
- 15. Introducing Cisco Secure Remote Access VPN Solutions4
- 16. Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW7
- 17. Explaining Cisco Secure Network Access Solutions6
- 18. Describing 802.1X Authentication5
- 19. Configuring 802.1X Authentication6
- 20. Describing Endpoint Security Technologies (SP)0
- 21. Deploying Cisco Advanced Malware Protection (AMP) for Endpoints (SP)0
- 22. Introducing Network Infrastructure Protection (SP)0
- 23. Deploying Control Plane Security Controls (SP)0
- 24. Deploying Layer 2 Data Plane Security Controls (SP)0
- 25. Deploying Layer 3 Data Plane Security Controls (SP)0
- 26. Deploying Management Plane Security Controls (SP)0
- 27. Deploying Cisco Stealthwatch Enterprise (SP)0
- 28. Deploying Traffic Telemetry Methods (SP)0
- 29. Describing Cloud and Common Cloud Attacks (SP)0
- 30. Deploying Cisco Stealthwatch Cloud (SP)0
- 31. Securing the Cloud (SP)0
- 32. Describing Software-Defined Networking (SDN)0
- Labs16
- 34.1Configure Network Settings and NAT on Cisco ASA
- 34.2Configure Cisco ASA Access Control Policies
- 34.3Configure Cisco Firepower NGFW NAT
- 34.4Configure Cisco Firepower NGFW Access Control Policy
- 34.5Configure Cisco NGFW Malware and File Policy
- 34.6Configure Mail Policies
- 34.7Configure Proxy Services, Authentication, and HTTPS Decryption
- 34.8Enforce Acceptable Use Control and Malware Protection
- 34.9Examine the Umbrella Dashboard
- 34.10Examine Cisco Umbrella Investigate
- 34.11Configure Remote Access VPN on the Cisco Firepower NGFW
- 34.12Perform Endpoint Analysis Using AMP for Endpoints Console
- 34.13Explore Cisco Stealthwatch Enterprise v6.9.3
- 34.14Explore Cognitive Threat Analytics (CTA) in Stealthwatch Enterprise v7.0
- 34.15Explore the Cisco Cloudlock Dashboard and User Security
- 34.16Explore Cisco Cloudlock Application and Data Security
- Resources1