Scor (350-701) V1.1 Video Training Series

Posted By: ELK1nG

Scor (350-701) V1.1 Video Training Series
Published 12/2023
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 4.34 GB | Duration: 10h 50m

Get ready to CRUSH your Cisco SCOR (350-701) v1.1 exam! Designed for the new (2023) SCOR (350-701) exam blueprint.

What you'll learn

This course is designed to fully prepare you for Cisco's SCOR (350-701) exam

Fundamental Security Concepts

Network Security

Cloud Security

Content Security

Endpoint Protection

Secure Access

Requirements

Basic familiarity with network technologies

A desire to learn and willingness to play full out

Description

Get Ready to Crush Your Cisco SCOR (350-701) v1.1 Exam The SCOR (350-701) exam serves as the core exam in Cisco's CCNP Security track, and also acts as the written exam for Cisco's CCIE Security certification.This course is designed to prepare you for version 1.1 of Cisco's SCOR (350-701) exam.Guiding you through your journey is Charles Judd, CCNP.You’ll validate your learning with quiz questions following each lesson. Then challenge yourself with a 94-question comprehensive practice exam after completing the course.What You’ll Get:10.5 hours of instruction from Charles Judd, CCNP covering every topic on Cisco’s SCOR (350-701) v1.1 exam blueprintLesson quizzes to confirm your understanding of each topicA 94-question comprehensive practice exam to reveal any weak spots you might have before taking the “real thing”Who this Course is for:Cisco CCNP Security certification candidatesIT professionals wishing to learn best practices for securing enterprise networksWhy CCNP Security?High Demand: In today's digitally-driven world, the demand for highly skilled IT professionals in network security is escalating rapidly. This comprehensive Cisco SCOR (350-701) course not only prepares you for the crucial Cisco CCNP Security certification but also places you at the forefront of enterprise network security expertise.Future-Proof Your Skills: The benefits of being CCNP Security certified extend beyond recognition. It opens doors to higher-level positions, offers better job security, and often leads to a higher salary. Employers actively seek individuals with this certification for roles such as Network Security Engineer, Cybersecurity Analyst, and more. By completing this course, you're not just learning; you're future-proofing your career and positioning yourself at the cutting edge of network security.

Overview

Section 1: Module 0: Course Introduction

Lecture 1 Introduction and Hands-On Practice

Section 2: Module 1 Introduction: Fundamental Security Concepts

Lecture 2 Introduction: Fundamental Security Concepts

Section 3: Module 1 - Lesson 1: Common Threats

Lecture 3 Introduction: Common Threats

Lecture 4 1.1.1 On-Premise Threats

Lecture 5 1.1.2 Cloud-based Threats

Section 4: Module 1 - Lesson 2: Common Vulnerabilities

Lecture 6 Introduction: Common Vulnerabilities

Lecture 7 1.2.1 Software

Lecture 8 1.2.2 SQL Injection

Lecture 9 1.2.3 Buffer Overflow

Lecture 10 1.2.4 Cross-site Request Forgery

Section 5: Module 1 - Lesson 3: Cryptography Components

Lecture 11 Introduction: Cryptography Components

Lecture 12 1.3.1 Hashing

Lecture 13 1.3.2 Encryption

Lecture 14 1.3.3 Public Key Infrastructure (PKI)

Lecture 15 1.3.4 IPsec

Lecture 16 1.3.5 NAT-T IPv4 for IPsec

Lecture 17 1.3.6 Pre-shared Key Authentication

Section 6: Module 1 - Lesson 4: Virtual Private Networks

Lecture 18 Introduction: Virtual Private Networks

Lecture 19 1.4.1 Site-to-Site VPN

Lecture 20 1.4.2 Remote Access VPN

Lecture 21 1.4.3 sVTI-based VPN

Lecture 22 1.4.4 DMVPN

Lecture 23 1.4.5 FLEXVPN

Section 7: Module 1 - Lesson 5: SDN Architecture

Lecture 24 Introduction: SDN Architecture

Lecture 25 1.5.1 Cisco DNA Center Overview

Lecture 26 1.5.2 Cisco DNA Center and vManage APIs

Lecture 27 1.5.3 Python Scripts

Section 8: Module 2 Introduction: Network Security

Lecture 28 Introduction: Network Security

Section 9: Module 2 - Lesson 1: Network Security Solutions

Lecture 29 Introduction: Network Security Solutions

Lecture 30 2.1.1 IPS and Firewall Solutions

Lecture 31 2.1.2 Deployment Models and Architectures

Lecture 32 2.1.3 Device Hardening

Lecture 33 2.1.4 Device Management Security

Lecture 34 2.1.5 NetFlow

Lecture 35 2.1.6 SNMPv3

Lecture 36 2.1.7 Role-Based CLI Access

Lecture 37 2.1.8 NTP with Authentication

Section 10: Module 2 - Lesson 2: Layer 2 Security

Lecture 38 Introduction: Layer 2 Security

Lecture 39 2.2.1 VLANs

Lecture 40 2.2.2 VRF-lite

Lecture 41 2.2.3 Port Security

Lecture 42 2.2.4 DHCP Snooping

Lecture 43 2.2.5 Dynamic ARP Inspection

Lecture 44 2.2.6 Storm Control

Lecture 45 2.2.7 PVLANs

Section 11: Module 2 - Lesson 3: AAA Security

Lecture 46 Introduction: AAA Security

Lecture 47 2.3.1 TACACS+ and RADIUS

Lecture 48 2.3.2 Downloadable ACL (dACL)

Section 12: Module 3 Introduction: Cloud Security

Lecture 49 Introduction: Cloud Security

Section 13: Module 3 - Lesson 1: Cloud Environments

Lecture 50 Introduction: Cloud Environments

Lecture 51 3.1.1 Public, Private, Hybrid, and Community Clouds

Lecture 52 3.1.2 Cloud Service Models: SaaS, PaaS, and IaaS

Lecture 53 3.1.3 Customer vs. Provider Responsibility

Section 14: Module 3 - Lesson 2: Security Considerations

Lecture 54 Introduction: Security Considerations

Lecture 55 3.2.1 Patch Management

Lecture 56 3.2.2 Security Assessments

Lecture 57 3.2.3 Cloud-Delivered Security Solutions

Lecture 58 3.2.4 DevSecOps

Lecture 59 3.2.5 Application and Data Security

Lecture 60 3.2.6 Policy Management

Lecture 61 3.2.7 Cloud Logging and Monitoring

Lecture 62 3.2.8 Cloud Application and Workload Security

Section 15: Module 4 Introduction: Content Security

Lecture 63 Introduction: Content Security

Section 16: Module 4 - Lesson 1: Web Security

Lecture 64 Introduction: Web Security

Lecture 65 4.1.1 Secure Internet Gateway

Lecture 66 4.1.2 Blacklisting and Whitelisting

Lecture 67 4.1.3 URL Filtering and Categorization

Lecture 68 4.1.4 Malware Scanning

Lecture 69 4.1.5 Web Application Filtering

Lecture 70 4.1.6 TLS Decryption

Lecture 71 4.1.7 Traffic Redirection and Capture

Lecture 72 4.1.8 User Authentication

Section 17: Module 4 - Lesson 2: Email Security

Lecture 73 Introduction: Email Security

Lecture 74 4.2.1 SPAM Filtering

Lecture 75 4.2.2 Data Loss Prevention (DLP)

Lecture 76 4.2.3 Email Encryption

Lecture 77 4.2.4 Email Blacklisting

Lecture 78 4.2.5 Antimalware Filtering

Section 18: Module 4 - Lesson 3: Cisco Umbrella

Lecture 79 Introduction: Cisco Umbrella

Lecture 80 4.3.1 Cisco Umbrella Overview

Lecture 81 4.3.2 Cisco Umbrella Identities

Lecture 82 4.3.3 Cisco Umbrella URL Content Settings

Lecture 83 4.3.4 Cisco Umbrella Destination Lists

Lecture 84 4.3.5 Cisco Umbrella Reporting

Section 19: Module 5 Introduction: Endpoint Protection

Lecture 85 Introduction: Endpoint Protection

Section 20: Module 5 - Lesson 1: Endpoint Security Fundamentals

Lecture 86 Introduction: Endpoint Security Fundamentals

Lecture 87 5.1.1 Antimalware

Lecture 88 5.1.2 Retrospective Security

Lecture 89 5.1.3 Indication of Compromise (IOC)

Lecture 90 5.1.4 Antivirus

Lecture 91 5.1.5 Dynamic File Analysis

Section 21: Module 5 - Lesson 2: Management Considerations

Lecture 92 Introduction: Management Considerations

Lecture 93 5.2.1 Endpoint Device Management

Lecture 94 5.2.2 Asset Inventory

Lecture 95 5.2.3 Mobile Device Management (MDM)

Section 22: Module 5 - Lesson 3: Protection Strategies

Lecture 96 Introduction: Protection Strategies

Lecture 97 5.3.1 Multifactor Authentication (MFA)

Lecture 98 5.3.2 Endpoint Posture Assessment

Lecture 99 5.3.3 Endpoint Patching

Section 23: Module 6 Introduction: Secure Access

Lecture 100 Introduction: Secure Access

Section 24: Module 6 - Lesson 1: Network Identity Management

Lecture 101 Introduction: Network Identity Management

Lecture 102 6.1.1 Guest Services

Lecture 103 6.1.2 Profiling

Lecture 104 6.1.3 BYOD Policies

Section 25: Module 6 - Lesson 2: Configuring Secure Access

Lecture 105 Introduction: Configuring Secure Access

Lecture 106 6.2.1 802.1X

Lecture 107 6.2.2 MAB

Lecture 108 6.2.3 WebAuth

Section 26: Module 6 - Lesson 3: Exfiltration Techniques

Lecture 109 Introduction: Exfiltration Techniques

Lecture 110 6.3.1 DNS Tunneling

Lecture 111 6.3.2 HTTPS

Lecture 112 6.3.3 Email

Lecture 113 6.3.4 File Transfer Protocols

Lecture 114 6.3.5 ICMP

Lecture 115 6.3.6 NTP

Section 27: Module 6 - Lesson 4: Cisco Security Products

Lecture 116 Introduction: Cisco Security Products

Lecture 117 6.4.1 Cisco Stealthwatch (a.k.a. Cisco Network Analytics)

Lecture 118 6.4.2 Cisco Stealthwatch Cloud (a.k.a. Cisco Secure Cloud Analytics)

Lecture 119 6.4.3 Cisco pxGrid

Lecture 120 6.4.4 Cisco CTA and ETA

Lecture 121 6.4.5 Cisco AnyConnect Network Visibility Module (NVM)

Section 28: SCOR (350-701) v1.1 Practice Exam

Lecture 122 Download SCOR (350-701) v1.1 Practice Exam

Section 29: Where to Get Help with Your Studies

Lecture 123 Where to Get Help with Your Studies

Cisco CCNP Security certification candidates,Beginner or intermediate students interested in network security