CCNP Security Core (SCOR)

by Routing Switching Tigers Claim Listing

This course is designed for anyone seeking CCNP Security - Cisco Security Core Technologies (SCOR) certification and gives in-depth knowledge to design, deploy, configure, and manage core Cisco Security solution to provide advanced threat protection against cybersecurity attacks.

₹25000

Contact the Institutes

Fill this form

Advertisement

Routing Switching Tigers Logo

img Duration

120 Hours

Course Details

This course is designed for anyone seeking CCNP Security - Cisco Security Core Technologies (SCOR) certification and gives in-depth knowledge to design, deploy, configure, and manage core Cisco Security solution to provide advanced threat protection against cybersecurity attacks.

Candidates will learn endpoint protection, securing content, networks, cloud, network access, Stealthwatch (Enterprise and Cloud) threat detection features, Cisco Umbrella Secure Internet Gateway (SIG), visibility, and enforcement.

Candidates will learn to deploy Cisco Firepower Next-Generation Firewall and Cisco ASA Firewall, configuring access control policies, mail policies, 802.1x Authentication, IPS, URL filtering, Cisco Advanced Malware Protection (AMP), SSL/TLS proxy, and much more. This is a lab-intensive course and objectives are accomplished through hands on learning.

This 120hrs (Lectures + hands-on Lab) CCNP Security - Cisco Security Core Technologies (SCOR) training is designed for personnel involved in deploying, troubleshooting, and managing Cisco Security solution to provide advanced threat protection against cybersecurity attacks.

This course provides candidates with in-depth knowledge to design, deploy, configure, and manage core Cisco Security solutions to provide advanced threat protection against cybersecurity attacks. Candidates will learn endpoint protection, securing content, networks, cloud, network access, Stealthwatch (Enterprise and Cloud) threat detection features, Cisco Umbrella Secure Internet Gateway (SIG), visibility, and enforcements. Candidates will learn to deploy Cisco Firepower Next-Generation Firewall and Cisco ASA Firewall, configuring access control policies, mail policies, 802.1x Authentication, IPS, URL filtering, Cisco Advanced Malware Protection (AMP), SSL/TLS proxy, and much more. This is a lab-intensive course and objectives are accomplished through hands on learning.

 

The key to a high success rate is based on the program’s objectives as follows:

  • Course contents are based on Cisco Security Core Technologies (SCOR) course outlines.
  • Dedicated Monitoring to evaluate and report candidate’s progress.
  • Extensive hands-on lab exercises.
  • Industry acclaimed, experienced and certified instructors.

 

Highlights:

  • Project manager can be assigned to track candidate’s performance.
  • Curriculum based on course outlines defined by Cisco Systems.
  • This Instructor-led classroom course is designed with an aim to build theoretical knowledge supplemented by ample hands-on lab exercises.
  • Facility of Lab on cloud available.
  • Courseware includes reference material to maximize learning.
  • Assignments and tests to ensure concept absorption.
  • Courseware includes reference material to maximize learning.
  • Repeating of lectures allowed (On approval basis)
  • Candidates can attend lectures online.

 

Objectives:

  • Describe information security concepts and strategies within the network.
  • Describe common TCP/IP, network application, and endpoint attacks.
  • Describe how various network security technologies work together to guard against attacks.
  • Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall.
  • Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance.
  • Describe and implement web content security features and functions provided by Cisco Web Security Appliance.
  • Describe Cisco Umbrella security capabilities, deployment models, policy management, and Investigate console.
  • Introduce VPNs and describe cryptography solutions and algorithms.
  • Configure and verify Cisco IOS Software Layer 2 and Layer 3 data plane controls.
  • Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco IOS Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco Firepower Next-Generation Firewall (NGFW).
  • Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1x and Extensible Authentication Protocol (EAP) authentication.
  • Provide basic understanding of endpoint security and describe Advanced Malware Protection (AMP) for Endpoints architecture and basic features.
  • Examine various defences on Cisco devices to protect the control / management plane.
  • Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions.
  • Describe basics of cloud computing and common cloud attacks and how to secure cloud environment.

 

Topics:

  • Describing Information Security Concepts
  • Information Security Overview
  • Assets, Vulnerabilities, and Countermeasures
  • Managing Risk
  • Vulnerability Assessment
  • Understanding CVSS
  • Describing Common TCP/IP Attacks
  • Legacy TCP/IP Vulnerabilities
  • IP Vulnerabilities
  • ICMP Vulnerabilities
  • TCP Vulnerabilities
  • UDP Vulnerabilities
  • Attack Surface and Attack Vectors
  • Reconnaissance Attacks
  • Access Attacks
  • Man-In-The-Middle Attacks
  • Denial of Service and Distributed Denial of Service Attacks
  • Reflection and Amplification Attacks
  • Spoofing Attacks
  • DHCP Attacks
  • Describing Common Network Application Attacks
  • Password Attacks
  • DNS-Based Attacks
  • DNS Tunneling
  • Web-Based Attacks
  • HTTP 302 Cushioning
  • Command Injections
  • SQL Injections
  • Cross-Site Scripting and Request Forgery
  • Email-Based Attacks
  • Describing Common Endpoint Attacks
  • Buffer Overflow
  • Malware
  • Reconnaissance Attack
  • Gaining Access and Control
  • Gaining Access via Social Engineering
  • Gaining Access via Web-Based Attacks
  • Exploit Kits and Rootkits
  • Privilege Escalation
  • Post-Exploitation Phase
  • Angler Exploit Kit
  • Describing Network Security Technologies
  • Defense-in-Depth Strategy
  • Defending Across the Attack Continuum
  • Network Segmentation and Virtualization Overview
  • Stateful Firewall Overview
  • Security Intelligence Overview
  • Threat Information Standardization
  • Network-Based Malware Protection Overview
  • IPS Overview
  • Next-Generation Firewall Overview
  • Email Content Security Overview
  • Web Content Security Overview
  • Threat Analytic Systems Overview
  • DNS Security Overview
  • Authentication, Authorization, and Accounting Overview
  • Identity and Access Management Overview
  • Virtual Private Network Technology Overview
  • Network Security Device Form Factors Overview
  • Deploying Cisco ASA Firewall
  • Cisco ASA Deployment Types
  • Cisco ASA Interface Security Levels
  • Cisco ASA Objects and Object Groups
  • Network Address Translation
  • Configure Network Settings and NAT on Cisco ASA
  • Cisco ASA Interface ACLs
  • Cisco ASA Global ACLs
  • Cisco ASA Advanced Access Policies
  • Configure Cisco ASA Access Control Policies
  • Cisco ASA High Availability Overview
  • Deploying Cisco Firepower Next-Generation Firewall
  • Cisco Firepower NGFW Deployments
  • Cisco Firepower NGFW Packet Processing and Policies
  • Cisco Firepower NGFW Objects
  • Cisco Firepower NGFW NAT
  • Configure Cisco Firepower NGFW NAT
  • Cisco Firepower NGFW Prefilter Policies
  • Cisco Firepower NGFW Access Control Policies
  • Cisco Firepower NGFW Security Intelligence
  • Configure Cisco Firepower NGFW Access Control Policy
  • Cisco Firepower NGFW Discovery Policies
  • Cisco Firepower NGFW IPS Policies
  • Configure Cisco Firepower NGFW Discovery and IPS Policy
  • Cisco Firepower NGFW Malware and File Policies
  • Configure Cisco NGFW Malware and File Policy
  • And more.
  • Mumbai Branch

    3rd floor, Sunshine Plaza MMGS Marg Gautam Nagar, Mumbai

Check out more CCNP courses in India

C-Tech Institute Logo

Networking Essential

Networking Essential course is offered by C-Tech Institute. At C-TECH we are committed to developing individuals like you into complete professionals. To provide you with technical skills as well as the success skills for life.

by C-Tech Institute [Claim Listing ]
Inter Networkz Logo

CompTIA Network+

The CompTIA Network+ certification we offer is a proof of the knowledge of networking features and functions besides being a  leading vendor-neutral certification for networking professionals.

by Inter Networkz [Claim Listing ]
World Computer Education Logo

WADCHN (World Advance Diploma in Computer Hardware & Networking)

WADCHN (World Advance Diploma in Computer Hardware & Networking) course is offered by World Computer Education. We are the Best Institute in Kanpur, known for the excellence, quality and consistency.

by World Computer Education [Claim Listing ]
The George Telegraph Training Institute Logo

Network Expert

After successful completion of this course students would be able to work as Network Engineer, IP Engineer, Network Administrator, NOC Engineer, Field Engineer.

by The George Telegraph Training Institute [Claim Listing ]
CyberX Technologies Logo

CCNP Voice

CCNP Voice Training (Cisco Certified Network Professional – VOICE) This certification prepares for candidates configuring collaboration and video apps.by it certification handle combined collaboration solution in a standard environment.

by CyberX Technologies [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy