Scor (350-701) V1.1 Video Training Series
Published 12/2023
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 4.34 GB | Duration: 10h 50m
Published 12/2023
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 4.34 GB | Duration: 10h 50m
Get ready to CRUSH your Cisco SCOR (350-701) v1.1 exam! Designed for the new (2023) SCOR (350-701) exam blueprint.
What you'll learn
This course is designed to fully prepare you for Cisco's SCOR (350-701) exam
Fundamental Security Concepts
Network Security
Cloud Security
Content Security
Endpoint Protection
Secure Access
Requirements
Basic familiarity with network technologies
A desire to learn and willingness to play full out
Description
Get Ready to Crush Your Cisco SCOR (350-701) v1.1 Exam The SCOR (350-701) exam serves as the core exam in Cisco's CCNP Security track, and also acts as the written exam for Cisco's CCIE Security certification.This course is designed to prepare you for version 1.1 of Cisco's SCOR (350-701) exam.Guiding you through your journey is Charles Judd, CCNP.You’ll validate your learning with quiz questions following each lesson. Then challenge yourself with a 94-question comprehensive practice exam after completing the course.What You’ll Get:10.5 hours of instruction from Charles Judd, CCNP covering every topic on Cisco’s SCOR (350-701) v1.1 exam blueprintLesson quizzes to confirm your understanding of each topicA 94-question comprehensive practice exam to reveal any weak spots you might have before taking the “real thing”Who this Course is for:Cisco CCNP Security certification candidatesIT professionals wishing to learn best practices for securing enterprise networksWhy CCNP Security?High Demand: In today's digitally-driven world, the demand for highly skilled IT professionals in network security is escalating rapidly. This comprehensive Cisco SCOR (350-701) course not only prepares you for the crucial Cisco CCNP Security certification but also places you at the forefront of enterprise network security expertise.Future-Proof Your Skills: The benefits of being CCNP Security certified extend beyond recognition. It opens doors to higher-level positions, offers better job security, and often leads to a higher salary. Employers actively seek individuals with this certification for roles such as Network Security Engineer, Cybersecurity Analyst, and more. By completing this course, you're not just learning; you're future-proofing your career and positioning yourself at the cutting edge of network security.
Overview
Section 1: Module 0: Course Introduction
Lecture 1 Introduction and Hands-On Practice
Section 2: Module 1 Introduction: Fundamental Security Concepts
Lecture 2 Introduction: Fundamental Security Concepts
Section 3: Module 1 - Lesson 1: Common Threats
Lecture 3 Introduction: Common Threats
Lecture 4 1.1.1 On-Premise Threats
Lecture 5 1.1.2 Cloud-based Threats
Section 4: Module 1 - Lesson 2: Common Vulnerabilities
Lecture 6 Introduction: Common Vulnerabilities
Lecture 7 1.2.1 Software
Lecture 8 1.2.2 SQL Injection
Lecture 9 1.2.3 Buffer Overflow
Lecture 10 1.2.4 Cross-site Request Forgery
Section 5: Module 1 - Lesson 3: Cryptography Components
Lecture 11 Introduction: Cryptography Components
Lecture 12 1.3.1 Hashing
Lecture 13 1.3.2 Encryption
Lecture 14 1.3.3 Public Key Infrastructure (PKI)
Lecture 15 1.3.4 IPsec
Lecture 16 1.3.5 NAT-T IPv4 for IPsec
Lecture 17 1.3.6 Pre-shared Key Authentication
Section 6: Module 1 - Lesson 4: Virtual Private Networks
Lecture 18 Introduction: Virtual Private Networks
Lecture 19 1.4.1 Site-to-Site VPN
Lecture 20 1.4.2 Remote Access VPN
Lecture 21 1.4.3 sVTI-based VPN
Lecture 22 1.4.4 DMVPN
Lecture 23 1.4.5 FLEXVPN
Section 7: Module 1 - Lesson 5: SDN Architecture
Lecture 24 Introduction: SDN Architecture
Lecture 25 1.5.1 Cisco DNA Center Overview
Lecture 26 1.5.2 Cisco DNA Center and vManage APIs
Lecture 27 1.5.3 Python Scripts
Section 8: Module 2 Introduction: Network Security
Lecture 28 Introduction: Network Security
Section 9: Module 2 - Lesson 1: Network Security Solutions
Lecture 29 Introduction: Network Security Solutions
Lecture 30 2.1.1 IPS and Firewall Solutions
Lecture 31 2.1.2 Deployment Models and Architectures
Lecture 32 2.1.3 Device Hardening
Lecture 33 2.1.4 Device Management Security
Lecture 34 2.1.5 NetFlow
Lecture 35 2.1.6 SNMPv3
Lecture 36 2.1.7 Role-Based CLI Access
Lecture 37 2.1.8 NTP with Authentication
Section 10: Module 2 - Lesson 2: Layer 2 Security
Lecture 38 Introduction: Layer 2 Security
Lecture 39 2.2.1 VLANs
Lecture 40 2.2.2 VRF-lite
Lecture 41 2.2.3 Port Security
Lecture 42 2.2.4 DHCP Snooping
Lecture 43 2.2.5 Dynamic ARP Inspection
Lecture 44 2.2.6 Storm Control
Lecture 45 2.2.7 PVLANs
Section 11: Module 2 - Lesson 3: AAA Security
Lecture 46 Introduction: AAA Security
Lecture 47 2.3.1 TACACS+ and RADIUS
Lecture 48 2.3.2 Downloadable ACL (dACL)
Section 12: Module 3 Introduction: Cloud Security
Lecture 49 Introduction: Cloud Security
Section 13: Module 3 - Lesson 1: Cloud Environments
Lecture 50 Introduction: Cloud Environments
Lecture 51 3.1.1 Public, Private, Hybrid, and Community Clouds
Lecture 52 3.1.2 Cloud Service Models: SaaS, PaaS, and IaaS
Lecture 53 3.1.3 Customer vs. Provider Responsibility
Section 14: Module 3 - Lesson 2: Security Considerations
Lecture 54 Introduction: Security Considerations
Lecture 55 3.2.1 Patch Management
Lecture 56 3.2.2 Security Assessments
Lecture 57 3.2.3 Cloud-Delivered Security Solutions
Lecture 58 3.2.4 DevSecOps
Lecture 59 3.2.5 Application and Data Security
Lecture 60 3.2.6 Policy Management
Lecture 61 3.2.7 Cloud Logging and Monitoring
Lecture 62 3.2.8 Cloud Application and Workload Security
Section 15: Module 4 Introduction: Content Security
Lecture 63 Introduction: Content Security
Section 16: Module 4 - Lesson 1: Web Security
Lecture 64 Introduction: Web Security
Lecture 65 4.1.1 Secure Internet Gateway
Lecture 66 4.1.2 Blacklisting and Whitelisting
Lecture 67 4.1.3 URL Filtering and Categorization
Lecture 68 4.1.4 Malware Scanning
Lecture 69 4.1.5 Web Application Filtering
Lecture 70 4.1.6 TLS Decryption
Lecture 71 4.1.7 Traffic Redirection and Capture
Lecture 72 4.1.8 User Authentication
Section 17: Module 4 - Lesson 2: Email Security
Lecture 73 Introduction: Email Security
Lecture 74 4.2.1 SPAM Filtering
Lecture 75 4.2.2 Data Loss Prevention (DLP)
Lecture 76 4.2.3 Email Encryption
Lecture 77 4.2.4 Email Blacklisting
Lecture 78 4.2.5 Antimalware Filtering
Section 18: Module 4 - Lesson 3: Cisco Umbrella
Lecture 79 Introduction: Cisco Umbrella
Lecture 80 4.3.1 Cisco Umbrella Overview
Lecture 81 4.3.2 Cisco Umbrella Identities
Lecture 82 4.3.3 Cisco Umbrella URL Content Settings
Lecture 83 4.3.4 Cisco Umbrella Destination Lists
Lecture 84 4.3.5 Cisco Umbrella Reporting
Section 19: Module 5 Introduction: Endpoint Protection
Lecture 85 Introduction: Endpoint Protection
Section 20: Module 5 - Lesson 1: Endpoint Security Fundamentals
Lecture 86 Introduction: Endpoint Security Fundamentals
Lecture 87 5.1.1 Antimalware
Lecture 88 5.1.2 Retrospective Security
Lecture 89 5.1.3 Indication of Compromise (IOC)
Lecture 90 5.1.4 Antivirus
Lecture 91 5.1.5 Dynamic File Analysis
Section 21: Module 5 - Lesson 2: Management Considerations
Lecture 92 Introduction: Management Considerations
Lecture 93 5.2.1 Endpoint Device Management
Lecture 94 5.2.2 Asset Inventory
Lecture 95 5.2.3 Mobile Device Management (MDM)
Section 22: Module 5 - Lesson 3: Protection Strategies
Lecture 96 Introduction: Protection Strategies
Lecture 97 5.3.1 Multifactor Authentication (MFA)
Lecture 98 5.3.2 Endpoint Posture Assessment
Lecture 99 5.3.3 Endpoint Patching
Section 23: Module 6 Introduction: Secure Access
Lecture 100 Introduction: Secure Access
Section 24: Module 6 - Lesson 1: Network Identity Management
Lecture 101 Introduction: Network Identity Management
Lecture 102 6.1.1 Guest Services
Lecture 103 6.1.2 Profiling
Lecture 104 6.1.3 BYOD Policies
Section 25: Module 6 - Lesson 2: Configuring Secure Access
Lecture 105 Introduction: Configuring Secure Access
Lecture 106 6.2.1 802.1X
Lecture 107 6.2.2 MAB
Lecture 108 6.2.3 WebAuth
Section 26: Module 6 - Lesson 3: Exfiltration Techniques
Lecture 109 Introduction: Exfiltration Techniques
Lecture 110 6.3.1 DNS Tunneling
Lecture 111 6.3.2 HTTPS
Lecture 112 6.3.3 Email
Lecture 113 6.3.4 File Transfer Protocols
Lecture 114 6.3.5 ICMP
Lecture 115 6.3.6 NTP
Section 27: Module 6 - Lesson 4: Cisco Security Products
Lecture 116 Introduction: Cisco Security Products
Lecture 117 6.4.1 Cisco Stealthwatch (a.k.a. Cisco Network Analytics)
Lecture 118 6.4.2 Cisco Stealthwatch Cloud (a.k.a. Cisco Secure Cloud Analytics)
Lecture 119 6.4.3 Cisco pxGrid
Lecture 120 6.4.4 Cisco CTA and ETA
Lecture 121 6.4.5 Cisco AnyConnect Network Visibility Module (NVM)
Section 28: SCOR (350-701) v1.1 Practice Exam
Lecture 122 Download SCOR (350-701) v1.1 Practice Exam
Section 29: Where to Get Help with Your Studies
Lecture 123 Where to Get Help with Your Studies
Cisco CCNP Security certification candidates,Beginner or intermediate students interested in network security