|
SCOR - Implementing and Operating Cisco Security Core Technologies город Астана
| 40 |
|
| 04-08.11.2024 очно/онлайн 11-15.11.2024 онлайн/очно
|
|
Кому следует посетить
-
Security Engineer
-
Network Engineer
-
Network Designer
-
Network Administrator
-
Systems Engineer
-
Consulting Systems Engineer
-
Technical Solutions Architect
-
Cisco Integrators/Partners
-
Network Manager
-
Cisco integrators and partners
Предварительные требования
To fully benefit from this course, you should have the following knowledge and skills:
-
Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA) v1.0 course
-
Familiarity with Ethernet and TCP/IP networking
-
Working knowledge of the Windows operating system
-
Working knowledge of Cisco IOS networking and concepts
-
Familiarity with basics of networking security concepts
Цели курса
After taking this course, you should be able to:
-
Describe information security concepts and strategies within the network
-
Describe common TCP/IP, network application, and endpoint attacks
-
Describe how various network security technologies work together to guard against attacks
-
Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall
-
Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance
-
Describe and implement web content security features and functions provided by Cisco Web Security Appliance
-
Describe Cisco Umbrella security capabilities, deployment models, policy management, and Investigate console
-
Introduce VPNs and describe cryptography solutions and algorithms
-
Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco IOS VTI-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco FirePower NGFW
-
Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and EAP authentication
-
Provide basic understanding of endpoint security and describe AMP for Endpoints architecture and basic features
-
Examine various defenses on Cisco devices that protect the control and management plane
-
Configure and verify Cisco IOS Software Layer 2 and Layer 3 Data Plane Controls
-
Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions
-
Describe basics of cloud computing and common cloud attacks and how to secure cloud environment
This course will help you:
-
Gain hands-on experience implementing core security technologies and learn best practices using Cisco security solutions
-
Prepare for the Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) exam
-
Qualify for professional and expert-level security job roles
This course will help you prepare to take the Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) exam. This exam tests a candidate's knowledge of implementing and operating core security technologies.
Содержание курса
-
Describing Information Security Concepts*
-
Describing Common TCP/IP Attacks*
-
Describing Common Network Application Attacks*
-
Describing Common Endpoint Attacks*
-
Describing Network Security Technologies
-
Deploying Cisco ASA Firewall
-
Deploying Cisco Firepower Next-Generation Firewall
-
Deploying Email Content Security
-
Deploying Web Content Security
-
Deploying Cisco Umbrella*
-
Explaining VPN Technologies and Cryptography
-
Introducing Cisco Secure Site-to-Site VPN Solutions
-
Deploying Cisco IOS VTI-Based Point-to-Point
-
Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW
-
Introducing Cisco Secure Remote Access VPN Solutions
-
Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW
-
Explaining Cisco Secure Network Access Solutions
-
Describing 802.1X Authentication
-
Configuring 802.1X Authentication
-
Describing Endpoint Security Technologies*
-
Deploying Cisco AMP for Endpoints*
-
Introducing Network Infrastructure Protection*
-
Deploying Control Plane Security Controls*
-
Deploying Layer 2 Data Plane Security Controls*
-
Deploying Layer 3 Data Plane Security Controls*
* This section is self-study material that can be done at your own pace if you are taking the instructor-led version of this course.
|