Implementing and Operating Cisco Security Core Technologies (SCOR)

This course replaces:

Implementing Cisco Edge Network Security Solutions (SENSS)
Implementing Cisco Secure Mobility Solutions (SIMOS)
Implementing Cisco Secure Access Solutions (SISAS)
Implementing Cisco Threat Control Solutions (SITCS)
 

Course Overview

The Implementing and Operating Cisco Security Core Technologies (SCOR) training helps you gain the skills and technologies needed to implement core Cisco security solutions. This training will ready you to provide advanced threat protection against cybersecurity attacks and prepare you for senior-level security roles.

This training prepares you for the 350-701 SCOR v1.0 exam. If passed, you earn the Cisco Certified Specialist - Security Core certification and satisfy the core exam requirement for the Cisco Certified Network Professional (CCNP) Security and Cisco Certified Internetwork Expert (CCIE) Security certifications. This training also earns you 64 Continuing Education (CE) credits towards recertification.

How You'll Benefit

This training will help you:

  • Gain hands-on experience implementing core security technologies and learn best practices using Cisco security solutions
  • Qualify for professional and expert-level security job roles
  • Prepare for the 350-701 SCOR v1.0 exam
  • Earn 64 CE credits towards recertification

What to Expect in the Exam

Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) v1.0 is a 120-minute exam associated with the Cisco Certified Specialist - Security Core certification and satisfies the core exam requirement for the CCNP Security and CCIE Security certifications.

This exam tests your knowledge of implementing and operating core security technologies, including:

  • Network security
  • Cloud security
  • Content security
  • Endpoint protection and detection
  • Secure network access
  • Visibility and enforcement

Who should attend

  • Security Engineers
  • Network Engineers
  • Network Designers
  • Network Administrators
  • Systems Engineers
  • Consulting Systems Engineers
  • Technical Solutions Architects
  • Cisco Integrators and Partners
  • Network Managers
  • Program Managers
  • Project Managers

Certifications

This course is part of the following Certifications:

Prerequisites

There are no formal prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:

  • Familiarity with Ethernet and TCP/IP networking
  • Working knowledge of the Windows operating system
  • Working knowledge of Cisco IOS networking and concepts
  • Familiarity with basics of networking security concept

s These skills can be found in the following Cisco Learning Offering:

Course Objectives

After taking this course, you should be able to:

  • Describe information security concepts and strategies within the network
  • Describe security flaws in the transmission protocol/internet protocol (TCP/IP) and how they can be used to attack networks and hosts
  • Describe network application-based attacks
  • Describe how various network security technologies work together to guard against attacks
  • Implement access control on Cisco Secure Firewall Adaptive Security Appliance (ASA)
  • Deploy Cisco Secure Firewall Threat Defense basic configurations
  • Deploy Cisco Secure Firewall Threat Defense IPS, malware, and fire policies
  • Deploy Cisco Secure Email Gateway basic configurations
  • Deploy Cisco Secure Email Gateway policy configurations
  • Describe and implement basic web content security features and functions provided by Cisco Secure Web Appliance
  • Describe various attack techniques against the endpoints
  • Describe Cisco Umbrella® security capabilities, deployment models, policy management, and Investigate console
  • Provide basic understanding of endpoint security and be familiar with common endpoint security technologies
  • Describe Cisco Secure Endpoint architecture and basic features
  • Describe Cisco Secure Network Access solutions
  • Describe 802.1X and extensible authentication protocol (EAP) authentication
  • Configure devices for 802.1X operations
  • Introduce VPNs and describe cryptography solutions and algorithms
  • Describe Cisco secure site-to-site connectivity solutions
  • Deploy Cisco Internetwork Operating System (Cisco IOS®) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs
  • Configure point-to-point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
  • Describe Cisco secure remote access connectivity solutions
  • Deploy Cisco secure remote access connectivity solutions
  • Provide an overview of network infrastructure protection controls
  • Examine various defenses on Cisco devices that protect the control plane
  • Configure and verify Cisco IOS software layer 2 data plane controls
  • Configure and verify Cisco IOS software and Cisco ASA layer 3 data plane controls
  • Examine various defenses on Cisco devices that protect the management plane
  • Describe the baseline forms of telemetry recommended for network infrastructure and security devices
  • Describe deploying Cisco Secure Network Analytics
  • Describe basics of cloud computing and common cloud attacks
  • Describe how to secure cloud environment
  • Describe the deployment of Cisco Secure Cloud Analytics
  • Describe basics of software-defined networks and network programmability

Follow On Courses

Prices & Delivery methods

Online Training

Duration
5 days

Price

Courseware language: English

Classroom Training

Duration
5 days

Price

Courseware language: English

E-Learning

Subscription duration
180 days

Price
  • Germany: 500.— €
  • Switzerland: US $ 500.—

Schedule

Guaranteed date:   The course is guaranteed to run regardless of the number of participants. This excludes unforeseeable events (e.g. accident, illness of the trainer) which make it impossible to carry out the course.
Instructor-led Online Training:   Course conducted online in a virtual classroom.
FLEX Classroom Training (hybrid course):   Course participation either on-site in the classroom or online from the workplace or from home.

English

European Time Zones

Online Training Time zone: Greenwich Mean Time (GMT) Guaranteed date!
Online Training
Classroom option: Cairo, Egypt
Time zone: Eastern European Time (EET)
Online Training
Classroom option: Utrecht, Netherlands
Time zone: Central European Time (CET)
Online Training
Classroom option: Kiev, Ukraine
Time zone: Eastern European Time (EET)
Online Training Time zone: Greenwich Mean Time (GMT)
Online Training
Classroom option: Utrecht, Netherlands
Time zone: Central European Time (CET)
Online Training
Classroom option: Kiev, Ukraine
Time zone: Eastern European Summer Time (EEST)
Online Training Time zone: British Summer Time (BST)
+ show all dates

3 hours difference to Central European Time (CET)

Online Training
Classroom option: Dubai, United Arab Emirates
Time zone: Gulf Standard Time (GST)

6 hours difference to Central European Time (CET)

Online Training Time zone: Eastern Standard Time (EST)
Online Training Time zone: Eastern Standard Time (EST)

7 hours difference to Central European Time (CET)

Online Training Time zone: Central Daylight Time (CDT)
Online Training Time zone: Central Daylight Time (CDT)
Online Training Time zone: Central Standard Time (CST)
Online Training Time zone: Central Standard Time (CST)

9 hours difference to Central European Time (CET)

Online Training Time zone: Pacific Daylight Time (PDT)
Online Training Time zone: Pacific Daylight Time (PDT)
Online Training Time zone: Pacific Daylight Time (PDT)
Online Training Time zone: Pacific Daylight Time (PDT)
FLEX Classroom Training (hybrid course):   Course participation either on-site in the classroom or online from the workplace or from home.

Germany

Munich
Munich
Hamburg
Frankfurt
Düsseldorf
Berlin
Munich
Hamburg
+ show all dates

Switzerland

Basel
Bern
Zurich
Zurich
Zurich
Zurich
Zurich
Zurich
Zurich

If you can't find a suitable date, don't forget to check our world-wide FLEX training schedule.