CCNP,CCIE Security SCOR (350-701) Training Part-2/2
CCNP,CCIE Security SCOR (350-701) Training Part-2/2, available at $79.99, has an average rating of 4.04, with 91 lectures, based on 338 reviews, and has 4794 subscribers.
You will learn about Compare common security vulnerabilities Describe functions of the cryptography components Compare site-to-site VPN and remote access VPN deployment types Compare network security solutions that provide intrusion prevention Configure and verify network infrastructure security methods Device hardening of network infrastructure security devices Implement segmentation, access control policies, AVC, URL filtering Implement management options for network security solutions Configure and verify site-to-site VPN and remote access VPN Describe identity management and secure network access common threats against on-premises and cloud environments Configure secure network management of perimeter security Configure AAA for device and network access Identify security solutions for cloud environments This course is ideal for individuals who are Course has been designed for anyone who wants to start learning Security or This course is for students trying to obtain the CCNP and CCIE SCOR or This course is for students trying to learn the CCNP Security or Any Network or Security Engineer want to learn or polish their Skills. It is particularly useful for Course has been designed for anyone who wants to start learning Security or This course is for students trying to obtain the CCNP and CCIE SCOR or This course is for students trying to learn the CCNP Security or Any Network or Security Engineer want to learn or polish their Skills.
Enroll now: CCNP,CCIE Security SCOR (350-701) Training Part-2/2
Summary
Title: CCNP,CCIE Security SCOR (350-701) Training Part-2/2
Price: $79.99
Average Rating: 4.04
Number of Lectures: 91
Number of Published Lectures: 91
Number of Curriculum Items: 91
Number of Published Curriculum Objects: 91
Original Price: $39.99
Quality Status: approved
Status: Live
What You Will Learn
- Compare common security vulnerabilities
- Describe functions of the cryptography components
- Compare site-to-site VPN and remote access VPN deployment types
- Compare network security solutions that provide intrusion prevention
- Configure and verify network infrastructure security methods
- Device hardening of network infrastructure security devices
- Implement segmentation, access control policies, AVC, URL filtering
- Implement management options for network security solutions
- Configure and verify site-to-site VPN and remote access VPN
- Describe identity management and secure network access
- common threats against on-premises and cloud environments
- Configure secure network management of perimeter security
- Configure AAA for device and network access
- Identify security solutions for cloud environments
Who Should Attend
- Course has been designed for anyone who wants to start learning Security
- This course is for students trying to obtain the CCNP and CCIE SCOR
- This course is for students trying to learn the CCNP Security
- Any Network or Security Engineer want to learn or polish their Skills.
Target Audiences
- Course has been designed for anyone who wants to start learning Security
- This course is for students trying to obtain the CCNP and CCIE SCOR
- This course is for students trying to learn the CCNP Security
- Any Network or Security Engineer want to learn or polish their Skills.
Security Concepts, Explain common threats against on-premises and cloud environments, Configure and verify network infrastructure security methods, Configure AAA for device and network access, Configure secure network management of perimeter security, Configure and verify site-to-site VPN and remote access VPN , Describe identity management and secure network access, Network security solutions that provide intrusion prevention and firewall, Network Security, Securing the Cloud, Content Security, Endpoint Protection and Detection , Secure Network Access, Visibility, and Enforcement, Secure network access, SDN and Network Automation Concepts, Describe the components, capabilities, and benefits of Cisco Umbrella, Endpoint Protection and Detection, Secure Network Access, Visibility, and Enforcement, Describe the benefits of network telemetry, Implement traffic redirection and capture methods, Describe the concept of DevSecOps, Identify security solutions for cloud environments, Compare the customer vs. provider security responsibility, Configure AAA for device and network access, Implement segmentation, access control policies, AVC, Explain North Bound and South Bound APIs in the SDN architecture, Describe security intelligence authoring, sharing, and consumption, Describe security intelligence authoring, sharing, and consumption, Interpret basic Python scripts used to call Cisco Security appliances APIs, Cloud service models: SaaS, PaaS, IaaS, Security assessment in the cloud, Patch management in the cloud, Describe the benefits of device compliance and application control
Course Curriculum
Chapter 1: CCNP, CCIE Security 350-701
Lecture 1: Lecture-95:Configure Initial Working Lab Cisco FTD and Cisco FMC.
Lecture 2: Lecture-96:Configure and Verify Access Control Policies.
Lecture 3: Lecture-97:Configure and Verify Pre-Filter Policy in FTD.
Lecture 4: Lecture-98:Configure and Verify Intrusion Policy in FTD.
Lecture 5: Lecture-99:Configure and Verify SSL Policy in Cisco FTD.
Lecture 6: Lecture-100:Configure and Verify Malware & File Policy in FTD.
Lecture 7: Lecture-101:Configure and Verify DNS Policy in Cisco FTD.
Lecture 8: Lecture-102:Introduction and Concept of Security Intelligence in FTD.
Lecture 9: Lecture-103:Introduction and Concept of IPS and Deployment Modes.
Lecture 10: Lecture-104:Install and Add Cisco NGIPS 6.2.3-83 on EVE-NG Lab.
Lecture 11: Lecture-105:Cisco Firepower NGIPS First Time Configuration Lab.
Lecture 12: Lecture-106:Basic Terminologies Proxy,Forward and Reverse Proxy etc.
Lecture 13: Lecture-107:Introduction to Cisco Ironport WSA, Need and Features.
Lecture 14: Lecture-108:Introduction to Cisco Ironport WSA Deployment Modes.
Lecture 15: Lecture-109:Install Cisco Ironport WSA Version 10 on EVE NG Lab.
Lecture 16: Lecture-110:Configure Basic Topology for Cisco WSA in EVE NG Lab.
Lecture 17: Lecture-111:Cisco Ironport WSA First Time CLI Configuration Lab.
Lecture 18: Lecture-112:Configure License Cisco Ironport WSA Version 10 Lab.
Lecture 19: Lecture-113:Cisco WSA First Time Configuration Setup Wizard Lab.
Lecture 20: Lecture-114:Traffic Redirection Explicit Mode Cisco Ironport WSA.
Lecture 21: Lecture-115:Access Policies & Identification Profile in Cisco WSA.
Lecture 22: Lecture-116:Configure and Verify Custom URL Category Cisco in WSA.
Lecture 23: Lecture-117:Application Visibility, Objects & Anti-Malware Policies.
Lecture 24: Lecture-118:Traffic Redirection Transparent Mode Cisco Ironport WSA.
Lecture 25: Lecture-119:Introduction to Cisco Ironport ESA Features and Functions.
Lecture 26: Lecture-120:Basic Terminologies of Cisco Ironport ESA and EMail.
Lecture 27: Lecture-121:Install Cisco Ironport ESA Version 10 on EVE NG.
Lecture 28: Lecture-122:Configure Basic Topology for Cisco ESA in EVE NG.
Lecture 29: Lecture-123:Cisco Ironport ESA First Time CLI Configuration Lab.
Lecture 30: Lecture-124:Configure License Cisco Ironport ESA Version 10 Lab.
Lecture 31: Lecture-125:Cisco ESA First Time Configuration Setup Wizard Lab.
Lecture 32: Lecture-126:Windows DNS Server Installation and Configuration Lab.
Lecture 33: Lecture-127:Install, Setup and Configure hMailServer Email Server.
Lecture 34: Lecture-128:Install, Setup and Configure Thunderbird Email Client.
Lecture 35: Lecture-129:Cisco ESA Incoming Content Filters & Email Policies Lab.
Lecture 36: Lecture-130:Cisco ESA Outgoing Content Filters & Email Policies Lab.
Lecture 37: Lecture-131:Introduction and Concept of OpenDNS and Cisco Umbrella.
Lecture 38: Lecture-132:Introduction and Concept of Endpoint EPP and EDR.
Lecture 39: Lecture-133:Introduction and Concept of Multifactor Authentication.
Lecture 40: Lecture-134:Introduction and Concept of Mobile Device Management MDM.
Lecture 41: Lecture-135:Role of The Endpoint Protection from Phishing Attacks.
Lecture 42: Lecture-136:Introduction & Concept of Advanced Malware Protection.
Lecture 43: Lecture-137:Introduction and Concept of Endpoint Patching Strategy.
Lecture 44: Lecture-138:Interpret Basic Python Scripts Network Automation Lab.
Lecture 45: Lecture-139:Introduction to Application Programming Interface API.
Lecture 46: Lecture-140:NETCONF Application Programming Interface Theory & Lab.
Lecture 47: Lecture-141:RESTCONF Application Programming Interface Theory & Lab.
Lecture 48: Lecture-142:Introduction and Concept of Software Defined Networking.
Lecture 49: Lecture-143:Introduction to North Bound API and South Bound API.
Lecture 50: Lecture-144:Introduction & Concept of Cisco DNA Center (Cisco DNAC).
Lecture 51: Lecture-145:Introduction to Cloud and Different Types of Cloud.
Lecture 52: Lecture-146:Introduction and Concept of Cloud Service Models.
Lecture 53: Lecture-147:Introduction and Concept of Cloud Patch Management.
Lecture 54: Lecture-148:Introduction to Security Assessment in the Cloud.
Lecture 55: Lecture-149:Introduction to Cloud Access Security Brokder (CASB).
Lecture 56: Lecture-150:Introduction and Concept of DevOps and DevSecOps.
Lecture 57: Lecture-151:Introduction and Concept of CI/CD Pipeline in DevOps.
Lecture 58: Lecture-152:Concept of Docker, Container & Container Orchestration.
Lecture 59: Lecture-153:Cloud Logging and Monitoring Secure Cloud Analytics.
Lecture 60: Lecture-154:Introduction to Cisco Identity Services Engine (ISE).
Lecture 61: Lecture-155:Install and Configure Cisco ISE on VMware Workstation.
Lecture 62: Lecture-156:Add, Install and Configure Cisco ISE on EVE-NG.
Lecture 63: Lecture-157:Cisco Identity Services Engine (ISE) CLI Commands.
Lecture 64: Lecture-158:Cisco Identity Services Engine Dashboard Walkthrough.
Lecture 65: Lecture-159:Cisco Identity Services Engine Basic Terminologies.
Lecture 66: Lecture-160:Cisco Identity Services Engine Three Persona Theory.
Lecture 67: Lecture-161:Cisco Identity Services Engine Deployment Options.
Lecture 68: Lecture-162:Introduction to Device Administration & Network Access.
Lecture 69: Lecture-163:Introduction, Theory and Concept of AAA Server.
Lecture 70: Lecture-164:Introduction to AAA Options TACACS+ and RADIUS Protocols.
Lecture 71: Lecture-165:Introduction and Concept of 802.1X (Dot1x) & Components.
Lecture 72: Lecture-166:Introduction to 802.1X (Dot1x) Port States and Host Modes.
Lecture 73: Lecture-167:Configure and Verify AAA 802.1X (Dot1x) Lab.
Lecture 74: Lecture-168:Introduction to Media Access Control Authentication Bypass.
Lecture 75: Lecture-169:Configure Media Access Control Authentication Bypass Lab.
Lecture 76: Lecture-170:Introduction and Concept of Downloadable ACL (DACL).
Lecture 77: Lecture-171:Configure and Verify Downloadable ACL (DACL) Lab.
Lecture 78: Lecture-172:Introduction and Concept of Dynamic VLAN (DVLAN).
Lecture 79: Lecture-173:Configure and Verify Dynamic VLAN (DVLAN) Lab.
Lecture 80: Lecture-174:Introduction to Central Web Authentication (CWA).
Lecture 81: Lecture-175:Configure and Verify Central Web Authentication Lab.
Lecture 82: Lecture-176:Configure and Verify Device Administration Lab.
Lecture 83: Lecture-177:Introduction and Concept of Guest Services in ISE.
Lecture 84: Lecture-178:Introduction and Concept of BYOD in Cisco ISE.
Lecture 85: Lecture-179:Introduction and Concept of Change of Authorization CoA.
Lecture 86: Lecture-180:Introduction to Profiling, Profiler Services & Probes.
Lecture 87: Lecture-181:Configure and Verify Profiling using ISE Probes Lab.
Lecture 88: Lecture-182:Introduction and Concept of Posture in Cisco ISE.
Lecture 89: Lecture-183:Introduction to Endpoint Compliance in Cisco ISE.
Lecture 90: Lecture-184:Introduction and Concept of Network Telemetry.
Lecture 91: Lecture-185:Introduction and Concept of Data Ex-filtration.
Instructors
-
Ahmad Ali
Cyber Security Consultant & Cisco Certified Trainer
Rating Distribution
- 1 stars: 5 votes
- 2 stars: 7 votes
- 3 stars: 30 votes
- 4 stars: 100 votes
- 5 stars: 196 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Top 10 Video Editing Courses to Learn in November 2024
- Top 10 Music Production Courses to Learn in November 2024
- Top 10 Animation Courses to Learn in November 2024
- Top 10 Digital Illustration Courses to Learn in November 2024
- Top 10 Renewable Energy Courses to Learn in November 2024
- Top 10 Sustainable Living Courses to Learn in November 2024
- Top 10 Ethical AI Courses to Learn in November 2024
- Top 10 Cybersecurity Fundamentals Courses to Learn in November 2024
- Top 10 Smart Home Technology Courses to Learn in November 2024
- Top 10 Holistic Health Courses to Learn in November 2024
- Top 10 Nutrition And Diet Planning Courses to Learn in November 2024
- Top 10 Yoga Instruction Courses to Learn in November 2024
- Top 10 Stress Management Courses to Learn in November 2024
- Top 10 Mindfulness Meditation Courses to Learn in November 2024
- Top 10 Life Coaching Courses to Learn in November 2024
- Top 10 Career Development Courses to Learn in November 2024
- Top 10 Relationship Building Courses to Learn in November 2024
- Top 10 Parenting Skills Courses to Learn in November 2024
- Top 10 Home Improvement Courses to Learn in November 2024
- Top 10 Gardening Courses to Learn in November 2024