Welcome to ONLC Training Centers

SCOR v2.0 - Implementing and Operating Cisco® Security Core Technologies Course

Class Dates
(click date for class times)
(click Enroll for locations)

Fee:  $4295
Need a price quote?

Follow the link to our self-service price quote form to generate an email with a price quote.

Need a class for a group?

We can deliver this class for your group. Follow the link to request more information.

Email Alert

Receive an email when this class is available as "Ready to Run" or "Early Notice" status.

Train from your home or office

If you have high-speed internet and a computer you can likely take this class from your home or office.


SCOR v2.0 - Implementing and Operating Cisco® Security Core Technologies Course

 

Special Note to New Hampshire Residents
This course has not yet been approved by the New Hampshire Department of Education. Please contact us for an update on when the class will be available in New Hampshire.

Overview

​The Implementing and Operating Cisco Security Core Technologies (SCOR) training helps you gain the skills and technologies needed to implement core Cisco security solutions. This training will ready you to provide advanced threat protection against cybersecurity attacks and prepare you for senior-level security roles.

This training prepares you for the 350-701 SCOR exam. If passed, you earn the Cisco Certified Specialist - Security Core certification and satisfy the core exam requirement for the Cisco Certified Network Professional (CCNP) Security and Cisco Certified Internetwork Expert (CCIE) Security certifications. This training also earns you 64 Continuing Education (CE) credits towards recertification.

This training will help you:
• Gain hands-on experience implementing core security technologies and learn best practices using Cisco security solutions
• Qualify for professional and expert-level security job roles
• Prepare for the 350-701 SCOR exam
• Earn 64 CE credits towards recertification
​• Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) v1.0 is a 120-minute exam associated with the Cisco Certified Specialist - Security Core certification and satisfies the core exam requirement for the CCNP Security and CCIE Security certifications.

This exam tests your knowledge of implementing and operating core security technologies, including:
• Network security
• Cloud security
• Content security
• Endpoint protection and detection
• Secure network access
• Visibility and enforcement

SCOR Course Objectives


Describe information security concepts and strategies within the network
Describe security flaws in the transmission protocol/internet protocol (TCP/IP) and how they can be used to attack networks and hosts
Describe network application-based attacks
Describe how various network security technologies work together to guard against attacks
Implement access control on Cisco Secure Firewall Adaptive Security Appliance (ASA)
Deploy Cisco Secure Firewall Threat Defense basic configurations
Deploy Cisco Secure Firewall Threat Defense IPS, malware, and fire policies
Deploy Cisco Secure Email Gateway basic configurations
Deploy Cisco Secure Email Gateway policy configurations
Describe and implement basic web content security features and functions provided by Cisco Secure Web Appliance
Describe various attack techniques against the endpoints
Describe Cisco Umbrellaฎ security capabilities, deployment models, policy management, and Investigate console
Provide basic understanding of endpoint security and be familiar with common endpoint security technologies
Describe Cisco Secure Endpoint architecture and basic features
Describe Cisco Secure Network Access solutions
Describe 802.1X and extensible authentication protocol (EAP) authentication
Configure devices for 802.1X operations
Introduce VPNs and describe cryptography solutions and algorithms
Describe Cisco secure site-to-site connectivity solutions
Deploy Cisco Internetwork Operating System (Cisco IOS) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs
Configure point-to-point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
Describe Cisco secure remote access connectivity solutions
Deploy Cisco secure remote access connectivity solutions
Provide an overview of network infrastructure protection controls
Examine various defenses on Cisco devices that protect the control plane
Configure and verify Cisco IOS software layer 2 data plane controls
Configure and verify Cisco IOS software and Cisco ASA layer 3 data plane controls
Examine various defenses on Cisco devices that protect the management plane
Describe the baseline forms of telemetry recommended for network infrastructure and security devices
Describe deploying Cisco Secure Network Analytics
Describe basics of cloud computing and common cloud attacks
Describe how to secure cloud environment
Describe the deployment of Cisco Secure Cloud Analytics
Describe basics of software-defined networks and network programmability

Prerequisites

There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
• Familiarity with Ethernet and TCP/IP networking
• Working knowledge of the Windows operating system
• Working knowledge of Cisco IOS networking and concepts
• Familiarity with basics of networking security concepts

These prerequisite skills can be found in the following Cisco Learning Course:
Implementing and Administering Cisco Solutions (CCNA).

Who Should Attend:

• Security Engineers
• Network Engineers
• Network Designers
• Network Administrators
• Systems Engineers
• Consulting Systems Engineers
• Technical Solutions Architects
• Cisco Integrators and Partners
• Network Managers
• Program Managers
• Project Managers

SCOR COURSE OUTLINE


Network Security Technologies
Cisco Secure Firewall ASA Deployment
Cisco Secure Firewall Threat Defense Basics
Cisco Secure Firewall Threat Defense IPS, Malware, and File Policies
Cisco Secure Email Gateway Basics
Cisco Secure Email Policy Configuration
Cisco Secure Web Appliance Deployment
VPN Technologies and Cryptography Concepts
Cisco Secure Site-to-Site VPN Solutions
Cisco IOS VTI-Based Point-to-Point IPsec VPNs
Point-to-Point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
Cisco Secure Remote-Access VPN Solutions
Remote-Access SSL VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
Describing Information Security Concepts
Describe Common TCP/IP Attacks
Describe Common Network Application Attacks
Common Endpoint Attacks
Cisco Umbrella Deployment
Endpoint Security Technologies
Cisco Secure Endpoint
Cisco Secure Network Access Solutions
802.1X Authentication
802.1X Authentication Configuration
Network Infrastructure Protection
Control Plane Security Solutions
Layer 2 Data Plane Security Controls
Layer 3 Data Plane Security Controls
Management Plane Security Controls
Traffic Telemetry Methods
Cisco Secure Network Analytics Deployment
Cloud Computing and Cloud Security
Cloud Security
Cisco Secure Cloud Analytics Deployment
Software-Defined Networking

Lab Outline


Configure Network Settings and NAT on Cisco Secure Firewall ASA
Configure Cisco Secure Firewall ASA Access Control Policies
Configure Cisco Secure Firewall Threat Defense NAT
Configure Cisco Secure Firewall Threat Defense Access Control Policy
Configure Cisco Secure Firewall Threat Defense Discovery and IPS Policy
Configure Cisco Secure Firewall Threat Defense Malware and File Policy
Configure Listener, HAT, and RAT on Cisco Email Secure Email Gateway
Configure Cisco Secure Email Policies
Configure Proxy Services, Authentication, and HTTPS Decryption
Enforce Acceptable Use Control and Malware Protection
Configure Static VTI Point-to-Point IPsec IKEv2 Tunnel
Configure Point-to-Point VPN between Cisco Secure Firewall Threat Defense Devices
Configure Remote Access VPN on the Cisco Secure Firewall Threat Defense
Examine Cisco Umbrella Dashboard and DNS Security
Examine Cisco Umbrella Secure Web Gateway and Cloud-Delivered Firewall
Explore Cisco Umbrella CASB Funtionalities
Explore Cisco Secure Endpoint
Perform Endpoint Analysis Using Cisco Secure Endpoint Console
Explore File Ransomware Protection by Cisco Secure Endpoint Console
Explore Secure Network Analytics v7.4.2
Explore Global Threat Alerts Integration and ETA Cryptographic Audit
Explore Cloud Analytics Dashboard and Operations
Explore Secure Cloud Private and Public Cloud Monitoring

Related Certifications

CCNP Security

 

View outline in Word

CSCOR2

Attend hands-on, instructor-led SCOR v2.0 - Implementing and Operating Cisco® Security Core Technologies training classes at ONLC's nationwide locations. Not near one of our locations? Attend these same live classes from your home/office PC via our Remote Classroom Instruction (RCI) technology.

For additional training options, check out our list of Cisco Courses and select the one that's right for you.

GENERAL INFO

Class Format
Class Policies
Student Reviews


HAVE QUESTIONS?
First Name

Last Name

Company

Phone

Email

Location

Question/Comment



ONLC TRAINING CENTERS
800-288-8221
www.onlc.com