CCNP Security Core (SCOR)

by Routing Switching Tigers Claim Listing

This course is designed for anyone seeking CCNP Security - Cisco Security Core Technologies (SCOR) certification and gives in-depth knowledge to design, deploy, configure, and manage core Cisco Security solution to provide advanced threat protection against cybersecurity attacks.

₹25000

Contact the Institutes

Fill this form

Advertisement

Routing Switching Tigers Logo

img Duration

120 Hours

Course Details

This course is designed for anyone seeking CCNP Security - Cisco Security Core Technologies (SCOR) certification and gives in-depth knowledge to design, deploy, configure, and manage core Cisco Security solution to provide advanced threat protection against cybersecurity attacks.

Candidates will learn endpoint protection, securing content, networks, cloud, network access, Stealthwatch (Enterprise and Cloud) threat detection features, Cisco Umbrella Secure Internet Gateway (SIG), visibility, and enforcement.

Candidates will learn to deploy Cisco Firepower Next-Generation Firewall and Cisco ASA Firewall, configuring access control policies, mail policies, 802.1x Authentication, IPS, URL filtering, Cisco Advanced Malware Protection (AMP), SSL/TLS proxy, and much more. This is a lab-intensive course and objectives are accomplished through hands on learning.

This 120hrs (Lectures + hands-on Lab) CCNP Security - Cisco Security Core Technologies (SCOR) training is designed for personnel involved in deploying, troubleshooting, and managing Cisco Security solution to provide advanced threat protection against cybersecurity attacks.

This course provides candidates with in-depth knowledge to design, deploy, configure, and manage core Cisco Security solutions to provide advanced threat protection against cybersecurity attacks. Candidates will learn endpoint protection, securing content, networks, cloud, network access, Stealthwatch (Enterprise and Cloud) threat detection features, Cisco Umbrella Secure Internet Gateway (SIG), visibility, and enforcements. Candidates will learn to deploy Cisco Firepower Next-Generation Firewall and Cisco ASA Firewall, configuring access control policies, mail policies, 802.1x Authentication, IPS, URL filtering, Cisco Advanced Malware Protection (AMP), SSL/TLS proxy, and much more. This is a lab-intensive course and objectives are accomplished through hands on learning.

 

The key to a high success rate is based on the program’s objectives as follows:

  • Course contents are based on Cisco Security Core Technologies (SCOR) course outlines.
  • Dedicated Monitoring to evaluate and report candidate’s progress.
  • Extensive hands-on lab exercises.
  • Industry acclaimed, experienced and certified instructors.

 

Highlights:

  • Project manager can be assigned to track candidate’s performance.
  • Curriculum based on course outlines defined by Cisco Systems.
  • This Instructor-led classroom course is designed with an aim to build theoretical knowledge supplemented by ample hands-on lab exercises.
  • Facility of Lab on cloud available.
  • Courseware includes reference material to maximize learning.
  • Assignments and tests to ensure concept absorption.
  • Courseware includes reference material to maximize learning.
  • Repeating of lectures allowed (On approval basis)
  • Candidates can attend lectures online.

 

Objectives:

  • Describe information security concepts and strategies within the network.
  • Describe common TCP/IP, network application, and endpoint attacks.
  • Describe how various network security technologies work together to guard against attacks.
  • Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall.
  • Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance.
  • Describe and implement web content security features and functions provided by Cisco Web Security Appliance.
  • Describe Cisco Umbrella security capabilities, deployment models, policy management, and Investigate console.
  • Introduce VPNs and describe cryptography solutions and algorithms.
  • Configure and verify Cisco IOS Software Layer 2 and Layer 3 data plane controls.
  • Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco IOS Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco Firepower Next-Generation Firewall (NGFW).
  • Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1x and Extensible Authentication Protocol (EAP) authentication.
  • Provide basic understanding of endpoint security and describe Advanced Malware Protection (AMP) for Endpoints architecture and basic features.
  • Examine various defences on Cisco devices to protect the control / management plane.
  • Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions.
  • Describe basics of cloud computing and common cloud attacks and how to secure cloud environment.

 

Topics:

  • Describing Information Security Concepts
  • Information Security Overview
  • Assets, Vulnerabilities, and Countermeasures
  • Managing Risk
  • Vulnerability Assessment
  • Understanding CVSS
  • Describing Common TCP/IP Attacks
  • Legacy TCP/IP Vulnerabilities
  • IP Vulnerabilities
  • ICMP Vulnerabilities
  • TCP Vulnerabilities
  • UDP Vulnerabilities
  • Attack Surface and Attack Vectors
  • Reconnaissance Attacks
  • Access Attacks
  • Man-In-The-Middle Attacks
  • Denial of Service and Distributed Denial of Service Attacks
  • Reflection and Amplification Attacks
  • Spoofing Attacks
  • DHCP Attacks
  • Describing Common Network Application Attacks
  • Password Attacks
  • DNS-Based Attacks
  • DNS Tunneling
  • Web-Based Attacks
  • HTTP 302 Cushioning
  • Command Injections
  • SQL Injections
  • Cross-Site Scripting and Request Forgery
  • Email-Based Attacks
  • Describing Common Endpoint Attacks
  • Buffer Overflow
  • Malware
  • Reconnaissance Attack
  • Gaining Access and Control
  • Gaining Access via Social Engineering
  • Gaining Access via Web-Based Attacks
  • Exploit Kits and Rootkits
  • Privilege Escalation
  • Post-Exploitation Phase
  • Angler Exploit Kit
  • Describing Network Security Technologies
  • Defense-in-Depth Strategy
  • Defending Across the Attack Continuum
  • Network Segmentation and Virtualization Overview
  • Stateful Firewall Overview
  • Security Intelligence Overview
  • Threat Information Standardization
  • Network-Based Malware Protection Overview
  • IPS Overview
  • Next-Generation Firewall Overview
  • Email Content Security Overview
  • Web Content Security Overview
  • Threat Analytic Systems Overview
  • DNS Security Overview
  • Authentication, Authorization, and Accounting Overview
  • Identity and Access Management Overview
  • Virtual Private Network Technology Overview
  • Network Security Device Form Factors Overview
  • Deploying Cisco ASA Firewall
  • Cisco ASA Deployment Types
  • Cisco ASA Interface Security Levels
  • Cisco ASA Objects and Object Groups
  • Network Address Translation
  • Configure Network Settings and NAT on Cisco ASA
  • Cisco ASA Interface ACLs
  • Cisco ASA Global ACLs
  • Cisco ASA Advanced Access Policies
  • Configure Cisco ASA Access Control Policies
  • Cisco ASA High Availability Overview
  • Deploying Cisco Firepower Next-Generation Firewall
  • Cisco Firepower NGFW Deployments
  • Cisco Firepower NGFW Packet Processing and Policies
  • Cisco Firepower NGFW Objects
  • Cisco Firepower NGFW NAT
  • Configure Cisco Firepower NGFW NAT
  • Cisco Firepower NGFW Prefilter Policies
  • Cisco Firepower NGFW Access Control Policies
  • Cisco Firepower NGFW Security Intelligence
  • Configure Cisco Firepower NGFW Access Control Policy
  • Cisco Firepower NGFW Discovery Policies
  • Cisco Firepower NGFW IPS Policies
  • Configure Cisco Firepower NGFW Discovery and IPS Policy
  • Cisco Firepower NGFW Malware and File Policies
  • Configure Cisco NGFW Malware and File Policy
  • And more.
  • Mumbai Branch

    3rd floor, Sunshine Plaza MMGS Marg Gautam Nagar, Mumbai

Check out more CCNP courses in India

APEC Logo

Hardware (CompTIA A+)

Everyone uses computers, laptops, mobile internet and iPads these days. This growth in technology has led to growth in the scope of hardware and networking too. There is a huge demand for people trained in this field to work as Hardware Engineers with knowledge of personal computers.

by APEC [Claim Listing ]
ITPC (Information Technology Promotion Council) Logo

Hardware & Networking Engineering

Computer Hardware & Networking is the demanding career field among the young ones. Hardware and Networking domain is the highest paying and fastest growing domain in IT sector.

by ITPC (Information Technology Promotion Council) [Claim Listing ]
Aaron Computer Education Logo

Hardware And Networking

Hardware and Networking course is offered by Aaron Computer Education. The course enables you to fix hardware and network issues. It's the parts that make the computer system.

by Aaron Computer Education [Claim Listing ]
Career College Logo

Embedded Systems

Embedded Systems course is offered by Career College. The emblem of Career College lays emphasis on the all-round development of students. Our commitment to transforming them into compatible, confident individuals as well as humble and responsible citizens of India.

by Career College [Claim Listing ]
Shine Computer Education Logo

Hardware & Networking

Hardware & Networking course is offered by Shine Computer Education. We have been providing quality computer teaching for more than 6 years. Our aim is to provide expertise computer education to our students in their interested field.

by Shine Computer Education [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy