Implementing and Operating Cisco Security Core Technologies (SCOR)

Beskrivelse


After taking this course, you should be able to:

  • Describe information security concepts and strategies within the network
  • Describe common TCP/IP, network application, and endpoint attacks
  • Describe how various network security technologies work together to guard against attacks
  • Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall
  • Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance
  • Describe and implement web content security features and functions provided by Cisco Web Security Appliance
  • Describe Cisco Umbrella® security capabilities, deployment models, policy management, and Investigate console
  • Introduce VPNs and describe cryptography solutions and algorithms
  • Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco Internetwork Operating System (Cisco IOS®) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco Firepower Next-Generation Firewall (NGFW)
  • Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and Extensible Authentication Protocol (EAP) authentication
  • ...

    Vis mere

    ...

  • Provide basic understanding of endpoint security and describe Advanced Malware Protection (AMP) for Endpoints architecture and basic features
  • Examine various defenses on Cisco devices that protect the control and management plane
  • Configure and verify Cisco IOS software Layer 2 and Layer 3 data plane controls
  • Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions
  • Describe basics of cloud computing and common cloud attacks and how to secure cloud environment

Indhold


Kurset i overskrifter:

  • Describing Information Security Concepts*
  • Describing Common TCP/IP Attacks*
  • Describing Common Network Application Attacks*
  • Describing Common Endpoint Attacks*
  • Describing Network Security Technologies
  • Deploying Cisco ASA Firewall
  • Deploying Cisco Firepower Next-Generation Firewall
  • Deploying Email Content Security
  • Deploying Web Content Security
  • Deploying Cisco Umbrella*
  • Explaining VPN Technologies and Cryptography
  • Introducing Cisco Secure Site-to-Site VPN Solutions
  • Deploying Cisco IOS VTI-Based Point-to-Point IPsec VPNs
  • Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW
  • Introducing Cisco Secure Remote Access VPN Solutions
  • Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW
  • Explaining Cisco Secure Network Access Solutions
  • Describing 802.1X Authentication
  • Configuring 802.1X Authentication
  • Describing Endpoint Security Technologies*
  • Deploying Cisco Advanced Malware Protection (AMP) for Endpoints*
  • Introducing Network Infrastructure Protection*
  • Deploying Control Plane Security Controls*
  • Deploying Layer 2 Data Plane Security Controls*
  • Deploying Layer 3 Data Plane Security Controls*
  • Deploying Traffic Telemetry Methods*
  • Describing Cloud and Common Cloud Attacks*
  • Deploying Cisco Stealthwatch Cloud*
  • This section is self-study material that can be done at your own pace if you are taking the instructor-led version of this course. Labs:
  • Lab Familiarization (Base Learning Lab)
  • Configure Secure Management Access for Cisco Wireless LAN Controllers (WLCs) and Access Points (APs)
  • Add Network Devices and External Resources to Cisco Prime Infrastructure
  • Capture a Successful AP Authentication
  • Implement Authentication, Authorization, and Accounting (AAA) Services for Central Mode WLANs
  • Implement AAA Services for FlexConnect Mode Wireless LANs (WLANs)
  • Configure Guest Services in the Wireless Network
  • Configure Bring Your Own Device (BYOD) in the Wireless Network
  • Capture Successful Client Authentications
  • Configure QoS in the Wireless Network for Voice and Video Services
  • Configure Cisco Application Visibility and Control (AVC) in the Wireless Network
  • Capture Successful QoS Traffic Marking in the Wireless Network
  • Configure, Detect, and Locate Services on the Cisco CMX
  • Identify Wireless Clients and Security Threats

Har du spørgsmål?

Hvis du har yderligere spørgsmål til dette produkt eller ønsker at få fremsendt materiale i forbindelse med produktet, er du velkommen til at benytte kontaktformularen herunder.

Implementing and Operating Cisco Security Core Technologies (SCOR)

Forhandler
Superusers
Normalpris
25.000,00 kr
Udsalgspris
25.000,00 kr
Normalpris
Udsolgt
Pris pr. stk.
pr. 
Eksklusiv moms.

Efter aftale / Kontakt for pris

Hvis du har valgt Efter aftale, kan du udfylde formularen nedenfor og så vender vi tilbage til dig og aftaler nærmere.

Har du spørgsmål?

Hvis du har yderligere spørgsmål til dette produkt eller ønsker at få fremsendt materiale i forbindelse med produktet, er du velkommen til at benytte kontaktformularen herunder.