skip to Main Content

Implementing and Operating Cisco Security Core Technologies (SCOR)

The Implementing and Operating Cisco Security Core Technologies (SCOR) training helps you master the skills and technologies needed to implement core Cisco security solutions. This training will ready you to provide advanced threat protection against cybersecurity attacks and prepare you for senior-level security roles.

    • Examining Cisco Enterprise Network Architecture
    • Exploring Cisco Switching Paths
    • Implementing Campus LAN Connectivity
    • Building Redundant Switched Topology
    • Implementing Layer 2 Port Aggregation
    • Understanding EIGRP
    • Implementing OSPF
    • Optimizing OSPF
    • Exploring EBGP
    • Implementing Network Redundancy
    • Implementing NAT
    • Introducing Virtualization Protocols and Techniques
    • Understanding Virtual Private Networks and Interfaces
    • Understanding Wireless Principles
    • Examining Wireless Deployment Options
    • Understanding Wireless Roaming and Location Services
    • Examining Wireless AP Operation
    • Implementing Wireless Client Authentication
    • Troubleshooting Wireless Client Connectivity
    • Implementing Network Services
    • Using Network Analysis Tools
    • Implementing Infrastructure Security
    • Implementing Secure Access Control
    • Discovering the Basics of Python Programming
    • Discovering Network Programmability Protocols
    • Implementing Layer 2 Port Aggregation
    • Discovering Multicast Protocols
    • Understanding QoS
    • Exploring Enterprise Network Security Architecture
    • Exploring Automation and Assurance Using Cisco DNA Center
    • Examining the Cisco SD-Access Solution
    • Understanding the Working Principles of the Cisco SDWAN Solution

 

  • Describe information security concepts and strategies within the network
  • Describe security flaws in the transmission protocol/internet protocol (TCP/IP) and how they can be used to attack networks and hosts
  • Describe network application-based attacks
  • Describe how various network security technologies work together to guard against attacks
  • Implement access control on Cisco Secure Firewall Adaptive Security Appliance (ASA)
  • Deploy Cisco Secure Firewall Threat Defense basic configurations
  • Deploy Cisco Secure Firewall Threat Defense IPS, malware, and fire policies
  • Deploy Cisco Secure Email Gateway basic configurations
  • Deploy Cisco Secure Email Gateway policy configurations
  • Describe and implement basic web content security features and functions provided by Cisco Secure Web Appliance
  • Describe various attack techniques against the endpoints
  • Describe Cisco Umbrella® security capabilities, deployment models, policy management, and Investigate console
  • Provide basic understanding of endpoint security and be familiar with common endpoint security technologies
  • Describe Cisco Secure Endpoint architecture and basic features
  • Describe Cisco Secure Network Access solutions
  • Describe 802.1X and extensible authentication protocol (EAP) authentication
  • Configure devices for 802.1X operations
  • Introduce VPNs and describe cryptography solutions and algorithms
  • Describe Cisco secure site-to-site connectivity solutions
  • Deploy Cisco Internetwork Operating System (Cisco IOS®) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs
  • Configure point-to-point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
  • Describe Cisco secure remote access connectivity solutions
  • Deploy Cisco secure remote access connectivity solutions
  • Provide an overview of network infrastructure protection controls
  • Examine various defenses on Cisco devices that protect the control plane
  • Configure and verify Cisco IOS software layer 2 data plane controls
  • Configure and verify Cisco IOS software and Cisco ASA layer 3 data plane controls
  • Examine various defenses on Cisco devices that protect the management plane
  • Describe the baseline forms of telemetry recommended for network infrastructure and security devices
  • Describe deploying Cisco Secure Network Analytics
  • Describe basics of cloud computing and common cloud attacks
  • Describe how to secure cloud environment
  • Describe the deployment of Cisco Secure Cloud Analytics
  • Describe basics of software-defined networks and network programmability
  • Security Engineers
  • Network Engineers
  • Network Designers
  • Network Administrators
  • Systems Engineers
  • Consulting Systems Engineers
  • Technical Solutions Architects
  • Cisco Integrators and Partners
  • Network Managers
  • Program Managers
  • Project Managers

There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:

  • Familiarity with Ethernet and TCP/IP networking
  • Working knowledge of the Windows operating system
  • Working knowledge of Cisco IOS networking and concepts
  • Familiarity with basics of networking security concepts

    Contact us for more information!

    ARE YOU READY?

    If you need this course, you can fill out the form or contact us.

      Contact us for more information!

      Back To Top