Cisco Security: Cisco SITCS 2.0 expert

https://www.skillsoft.com/channel/cisco-security-d9ed8870-e251-11e6-91a7-0242c0a80704?technologyandversion=63001&expertiselevel=63013 https://www.skillsoft.com/channel/cisco-security-d9ed8870-e251-11e6-91a7-0242c0a80704?technologyandversion=63003&expertiselevel=63009 https://www.skillsoft.com/channel/cisco-security-d9ed8870-e251-11e6-91a7-0242c0a80704?technologyandversion=63004&expertiselevel=63013 https://www.skillsoft.com/channel/cisco-security-d9ed8870-e251-11e6-91a7-0242c0a80704?technologyandversion=63006&expertiselevel=63013 https://www.skillsoft.com/channel/cisco-security-d9ed8870-e251-11e6-91a7-0242c0a80704?technologyandversion=63007&expertiselevel=63009 https://www.skillsoft.com/channel/cisco-security-d9ed8870-e251-11e6-91a7-0242c0a80704?technologyandversion=63008&expertiselevel=63013 https://www.skillsoft.com/channel/cisco-security-d9ed8870-e251-11e6-91a7-0242c0a80704?technologyandversion=63010&expertiselevel=63013 https://www.skillsoft.com/channel/cisco-security-d9ed8870-e251-11e6-91a7-0242c0a80704?technologyandversion=63011&expertiselevel=63013 https://www.skillsoft.com/channel/cisco-security-d9ed8870-e251-11e6-91a7-0242c0a80704?technologyandversion=63012&expertiselevel=63013
  • 2 Books | 27h 28m
  • 14 Courses | 13h 54m 59s
  • 4 Books | 43h 23m
  • 4 Books | 43h 23m
  • 1 Book | 11h 48m
  • 13 Courses | 11h 26m 33s
  • 2 Books | 27h 28m
  • 10 Courses | 9h 16m 7s
  • 2 Books | 21h 39m
  • 17 Courses | 16h 49m 55s
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
 
Security is a primary concern of all network administrators. Explore the various security methods, tools, and technologies of Cisco networking.

GETTING STARTED

SNCF: Cisco Firewall, IPS Systems, & the FMCv in AWS

  • 9m 18s
  • 8m 48s

COURSES INCLUDED

CBROPS: The CIA Triad & Security Approaches
For those aspiring or current IT professionals pursuing a job role as an entry or associate-level cybersecurity analyst, or for those pursuing the Cisco Certified CyberOps Associate certification, this course will introduce you to cybersecurity operations in a security operation center. You'll review security concepts, policies, and procedures used by a CyberOps Associate working within a SOC. You'll learn about the CIA triad, a model of implementing security on networks. Next, you'll explore basic models for cybersecurity and various security approaches. Finally, you'll review security terminology you should be familiar with and common security practices and tools for the CyberOps Associate. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
4 videos | 1h 8m has Assessment available Badge
CBROPS: Threat Actors, Security, & Risk Management
In this course, you'll learn about threat actor types and review related examples. You'll then explore commonly confused security concepts - risk, threat, vulnerability, and exploit. Finally, you'll examine risk management concepts, including risk scoring/weighting, risk reduction, and risk assessment. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
3 videos | 56m has Assessment available Badge
CBROPS: CVSS, Deployments, Access Control, & Data Visibility
A SOC data analyst may depend on external data to help with understanding potential attacks against systems. In this course, you'll learn how the CVSS helps and what information it provides to a cybersecurity data analyst. You'll examine the implementation of security methods and how they fit into security design. You'll review how access control is implemented across an organization and some of the available access control models. Finally, it's important to know about network data visibility challenges, so you'll learn what they are and how to deal with them. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
4 videos | 1h 17m has Assessment available Badge
CBROPS: Data Loss, Host Isolation, & Detection Methods
In this course, you'll learn to identify potential data loss indicators noted from a traffic profile. Then, you'll explore the 5-tuple approach for isolating a host. Finally, there are different detection methods that are used when securing networks dynamically. You'll review the similarities between them and how they operate to bring about usable results. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
3 videos | 51m has Assessment available Badge
CBROPS: Attack Surfaces, Vulnerability, & Analysis Tools
There are many things in cybersecurity that sound similar but are not. In this course, you'll learn to distinguish the attack surface from vulnerability. You'll also learn the basics of the tcpdump and NetFlow tools. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operation
2 videos | 30m has Assessment available Badge
CBROPS: Firewall, Filtering, Visibility, & Control Data
A key part of your role as an SOC data analyst is knowing what tool will give you the type of data type you want to analyze. In this course, you'll learn about useful next-gen and stateful firewall data. You'll explore content filtering, as well as web and e-mail content filtering, and why they are useful. Next, you'll review application level visibility and control data. Finally, you'll learn how the use of different technology can cause unexpected data visibility challenges. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
4 videos | 1h 2m has Assessment available Badge
CBROPS: Data & Attack Types
In this course, you'll learn about data types that provide valuable information for security monitoring. You'll explore different network attacks, including protocol-based, DoS, DDoS and MITM attacks. Finally, you'll also look at common web application attacks like SQL injection, command injection, and cross-site scripting. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
3 videos | 52m has Assessment available Badge
CBROPS: Social Engineering, Evasion, Obfuscation, & Certificates
In this course, you'll examine multiple examples of social engineering attacks that you should be familiar with as an analyst. Attacks are not always easily identified, so you'll learn about the different evasion and obfuscation techniques. Finally, you'll learn about the different components of digital certificates and what these components do. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
3 videos | 53m has Assessment available Badge
CBROPS: Host-based Analysis & the Role of Attribution
In this course, you'll learn about host-based attacks in their various forms. Next, you'll explore components of Windows 10 and Ubuntu that are useful in host-based analysis. Finally, you'll examine the concept of attribution and its importance when investigating an organizational security breach. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
4 videos | 1h 9m has Assessment available Badge
CBROPS: Log Evidence, Disk Images, & Malware Analysis Output
In this course, you'll examine the importance of logs, as well as types of evidence that can be acquired from them. Next, you'll learn how critical disk images can be during an investigation and about the comparisons and analysis that can transpire in an investigation. Finally, you'll review some of the most important information that can be found in the out of malware analysis tools. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
3 videos | 51m has Assessment available Badge
CBROPS: Security Events, Firewall Operations, & Traffic Analysis
In this course, you'll learn to categorize intrusion events according to the cyber kill chain and diamond intrusion models. Next, with so many tools available, you'll examine which ones should be used to identify different security events. You'll learn the differences between deep packet inspection, packet filtering, and stateful firewall operations. Finally, you'll review the differences between inline traffic interrogation, taps, and traffic monitoring. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
4 videos | 1h 12m has Assessment available Badge
CBROPS: File Extraction, Event Artifacts, & Regular Expressions
In this course, you'll learn how to extract files from a TCP stream from a PCAP file using Wireshark. Next, you'll explore how to identify intrusion elements from a given pcap file using Wireshark. You'll learn how to interpret common artifacts from events for an alert using the Cisco FMC. Finally, you'll examine how to use basic regular expressions with grep and the Cisco CLI. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
4 videos | 1h 6m has Assessment available Badge
CBROPS: Incident Response, Security Management, & Analysis
In this course, you'll review NIST800-86 to learn basic forensic techniques for incident response. You'll examine management concepts needed to be known and addressed in a security policy. Finally, you'll explore the relationship between metrics and scope analysis in a SOC. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
3 videos | 54m has Assessment available Badge
CBROPS: Protected Data, Profiling, Forensics, & IRP
In this course, you'll learn how to identify protected data in a network, as well as how to identify elements in network and server profiling. You'll explore the use of NIST SP 800-61 to identify forensic elements and how to apply them to the incident handling process. Finally, you'll learn how NIST SP 800-61 guides incident handling and review the elements of an incident response plan. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
4 videos | 1h 7m has Assessment available Badge
SHOW MORE
FREE ACCESS

COURSES INCLUDED

SENSS 1.0: IOS Security Configuration
Discover the steps required to configure a new Cisco router or switch, including basic configuration settings and specific security-related settings designed to harden the attack surface of the device.
3 videos | 55m has Assessment available Badge
SENSS 1.0: Role-Based Access Control
Explore how to harden an IOS device to prevent unauthorized access by configuring filtered command sets that can be assigned to users based on their role. Examine IOS zone-based firewalls and the steps necessary to enable them.
2 videos | 53m has Assessment available Badge
SENSS 1.0: Zone-Based Firewalls
Explore the final steps in configuring an IOS-based router as a network firewall and special zones that can be used alongside the configuration. Discover how the "self" zone functions and how single zone traffic is handled.
2 videos | 36m has Assessment available Badge
SENSS 1.0: ASA Firewall Configuration & Access Control
Explore how to configure a new Cisco ASA firewall, including the initial configuration commands needed to enable the firewall and how to secure administrative access to the device in preparation of placing a firewall into production use.
3 videos | 1h 8m has Assessment available Badge
SENSS 1.0: Twice NAT & Network Object NAT
Explore network address translation on Cisco devices using Twice NAT and the newer Network Object NAT.
2 videos | 57m has Assessment available Badge
SENSS 1.0: ASA Firewall Access Control
Discover how Access Control Lists (ACLs) and Network Objects can be used to configure and build firewall rules on Cisco devices.
2 videos | 1h has Assessment available Badge
SENSS 1.0: IPv6 Support & Traffic Inspection
Explore IPv6, how to use IPv6 NAT, and how to use the advanced traffic inspection features to prevent network attacks.
2 videos | 48m has Assessment available Badge
SENSS 1.0: Transparent Firewalls & Security Contexts
Discover transparent and virtual firewalls and how they can be used to improve network security.
2 videos | 1h 1m has Assessment available Badge
SENSS 1.0: High Availability & Private VLANs
Explore high availability by clustering Cisco devices and use private VLANs to isolate systems in a multi-tenant environment.
2 videos | 1h 2m has Assessment available Badge
SENSS 1.0: DHCP Snooping & IP Source Guard
Discover how DHCP snooping, ARP inspection, and IP Source Guard can be configured and used to prevent network attacks.
2 videos | 42m has Assessment available Badge
SENSS 1.0: Cisco Port-Based Traffic Control
Discover Storm Control and how it can be used to prevent broadcast attacks and use port security to link ports to MAC addresses to prevent unauthorized hardware on a network.
2 videos | 49m has Assessment available Badge
SENSS 1.0: Traffic & Device Monitoring
Explore how NetFlow can be leveraged to gain visibility into the types of traffic passing through a network and how SNMP can be used to poll performance and configuration data from a Cisco device.
2 videos | 50m has Assessment available Badge
SENSS 1.0: Centralized Logging & Device Management
Examine the importance of having a central location to store device logs from an organization's network infrastructure and explore some of the centralized device management solutions available from Cisco.
2 videos | 40m has Assessment available Badge
SHOW MORE
FREE ACCESS

COURSES INCLUDED

SNCF: Cisco Firewall, IPS Systems, & the FMCv in AWS
Cisco Firepower devices from Cisco Systems have become very popular in enterprise environments. In this course, you'll first review the requirements of the SNCF 300-710 exam. Next, you'll look at the history of firewalls and IPS systems in the Cisco product portfolio. You'll learn about the AWS version of the FMCv, including the restrictions, limitations, and capabilities of this device. Finally, you'll examine the steps involved in constructing the Virtual Private Cloud when building a Firepower lab. This course can be used in preparation for the 300-710: Securing Networks with Cisco Firepower (SNCF) certification exam.
4 videos | 1h 4m has Assessment available Badge
SNCF: FMCv Deployment & Initial Setup
Are you ready to see the deployment of Cisco Firepower Management Center (FMC)? In this course, you'll learn the basics of an FMC deployment with an example that uses the Cisco Firepower Management Center Virtual (FMCv) image in AWS. Then, you'll move on to examine the initial configurations you should make to your FMCv after you have successfully installed the FMC. You'll also explore the FMCv interface. This course can be used in preparation for the 300-710: Securing Networks with Cisco Firepower (SNCF) certification exam.
2 videos | 44m has Assessment available Badge
SNCF: Deploying NGFWv & Adding It to the FMCv
In this course, you'll learn about the Cisco Firepower Next-Generation Firewall Virtual (NGFWv) appliance for AWS, including the requirements and caveats of a cloud-based implementation. You'll explore the typical steps for the deployment of an NGFWv in AWS, including integration with the FMCv for the management of your security devices. Finally, you'll learn how to add your NGFWv to the FMCv for the most robust management and configuration options. This course can be used in preparation for the 300-710: Securing Networks with Cisco Firepower (SNCF) certification exam.
3 videos | 52m has Assessment available Badge
SNCF: NGFW Modes, Interface Types, & Link Redundancy
There are multiple ways in which you can deploy a Next-Generation Firewall (NGFW) from Cisco Systems. In this course, you'll learn about the standard routed mode as well as alternative transparent mode. You'll also learn about the flexibility of Firepower devices, which is due in part to the many different types of interfaces supported. Finally, you'll explore the options that exist on Cisco Firepower devices for link redundancy. This course can be used in preparation for the 300-710: Securing Networks with Cisco Firepower (SNCF) certification exam.
4 videos | 58m has Assessment available Badge
SNCF: Failover, Multi-instance Deployments, & Clustering
In this course, you'll learn how to configure multiple Firepower devices for redundancy purposes. Then, you'll look at multi-instance deployments of Cisco Firepower. Finally, you'll learn how clustering helps you to ramp up the horsepower and availability of your Cisco Firepower implementation. This course can be used in preparation for the 300-710: Securing Networks with Cisco Firepower (SNCF) certification exam.
3 videos | 47m has Assessment available Badge
SNCF: FMC Settings, Object Management, & Intrusion Rules
There are many options for management of the Cisco Firepower Management Center (FMC) using the console. In this course, you'll learn about the key features of the FMC that can make your life as a security engineer much, much easier. Objects permit you to define reusable object components that you can leverage for the fast configuration of policies, searches, reports, and dashboards. You'll learn how you can manage the objects that help define your network and your security operations. Finally, you'll examine the Intrusion Rules section of the Objects area and how it allows you to modify the IPS rules for the Firepower device. This course can be used in preparation for the 300-710: Securing Networks with Cisco Firepower (SNCF) certification exam.
3 videos | 54m has Assessment available Badge
SNCF: Access Control, FTD, & Prefilter Policies
Access control policies are critically important as almost all of your traffic will pass through this policy at some point. This policy dictates whether traffic will be passed, blocked, or logged by your Firepower device. In this course, you'll learn about the creation of access control policies. Next, you'll examine how Cisco's Firepower Threat Defense (FTD) can take many actions against traffic at many different points in the traffic flow through the device. Finally, you'll explore the powerful prefilter policy actions of Firepower FTD and why you will want to take advantage of them. This course can be used in preparation for the 300-710: Securing Networks with Cisco Firepower (SNCF) certification exam.
3 videos | 56m has Assessment available Badge
SNCF: Security Intelligence & Policies
You'll definitely want to take advantage of all the great security intelligence that Cisco Talos can provide dynamically. In this course, you'll learn about the integration of security intelligence with Firepower polices and the number of security checks and safeguards that the Cisco Firepower devices bring to your network. You'll also learn about the powerful malware and file policies you can create and associate with your access control policy. Next, you'll look at the FTD's intrusion prevention capabilities with a close examination of the intrusion polices. Finally, you'll learn about the SSL inspection feature, which allows you to either block encrypted traffic without inspecting it or inspect encrypted or decrypted traffic with access control. This course can be used in preparation for the 300-710: Securing Networks with Cisco Firepower (SNCF) certification exam.
4 videos | 1h 11m has Assessment available Badge
SNCF: Network Discovery, Identity and DNS Policies, & Correlation
The network discovery policy on the Firepower Management Center controls how the system collects data on your organization's network assets and which network segments and ports are monitored. In this course, you'll learn about this policy and how to configure it. Next, you'll examine the authentication options that are possible thanks to identity policies. You'll learn about DNS-based security intelligence and how it allows you to allow or block traffic based on the domain name requested by a client using an Allow or Block list. Cisco provides domain name intelligence, so you'll learn how to customize this and even add your own domains. Finally, you'll explore why you might want to have your FTD engage in event correlation to enact some remediation for a very tricky and specific situation. This course can be used in preparation for the 300-710: Securing Networks with Cisco Firepower (SNCF) certification exam.
4 videos | 1h 6m has Assessment available Badge
SNCF: NAT, QoS, VPN, & Device Management
Cisco Firepower devices support different NAT variations and VPN configurations. In this course, you'll learn about the many variations of NAT supported by Firepower, including the classic options of static and dynamic. You'll learn that Firepower devices also support the different configuration approaches to NAT on the Cisco security devices, including auto NAT and manual NAT. Next, you'll explore the QoS support Firepower provides, as well as support limitations. You'll learn about the types of VPNs that are supported on Firepower systems. Finally, you'll examine why you might want to break your Firepower deployment into domains in large enterprise environments. This course can be used in preparation for the 300-710: Securing Networks with Cisco Firepower (SNCF) certification exam.
4 videos | 40m has Assessment available Badge
SHOW MORE
FREE ACCESS

COURSES INCLUDED

SCOR: Security Basics & Common Threats
In this course, you'll first review basic SCOR concepts and why they are important. Next, you'll move on to explore common language when it comes to securing your lT architecture and how to correctly use this language when discussing your security environment. You'll examine common attack methods in order to properly secure your on-prem IT environment. With the popularity of the cloud, computer criminals have begun targeting these areas with more and more frequency. To wrap up this course, you'll learn about some of the most common attacks against the cloud. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
4 videos | 58m has Assessment available Badge
SCOR: Security Vulnerabilities, Attack Mitigations, & Cryptographic Solutions
There are many common vulnerabilities in software and systems and you must understand them to effectively secure your network systems. In this course, you'll learn about some of these vulnerabilities, as well as common attack mitigation techniques for network application style attacks. Before reviewing cybersecurity technologies in greater detail, you'll first look at the basics of cryptography and the critical role it plays in computer and network security. Finally, you'll explore some current cryptographic solutions and what they are used for. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
4 videos | 1h 17m has Assessment available Badge
SCOR: PKI & IKE
A major aspect of Internet-based security these days hinges upon the Public Key Infrastructure. In this course, you'll learn the basics of this critical set of technologies. PKI is the magic behind the use of seamless SSL/TLS authentication and encryption on the public Internet and this clever implementation of asymmetric encryption algorithms can also be used in your private enterprise. You'll continue your exploration of PKI by learning how to fulfill a certificate request. Finally, you'll learn about the Internet Key Exchange, including the differences between IKE v1 and v2. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
3 videos | 48m has Assessment available Badge
SCOR: VPNs, Security Intelligence, & Social Engineering Attacks
There is no denying it, VPN is a hugely popular part of the modern Internet. In this course, you'll learn about different types of VPN, its uses, and various technologies you can use. Next, you'll explore security devices and their ability to help you author, share, and consume security intelligence data. You'll examine social engineering attacks that are very prevalent today, including how to protect against them and the software you can use for defense. Finally, you'll learn about some of the most common attacks today, including many different variations of phishing attacks. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
4 videos | 1h 14m has Assessment available Badge
SCOR: SDN APIs & Security Appliance API Calls
In this course, you'll learn about SDN and the northbound and southbound APIs used with it. You'll also learn about the RESTful APIs that you can make use of for the programmability of your Cisco security devices. You'll also discover how these API calls can be used in an actual network environment and how to quickly get started with programmatic code referencing these important APIs. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
2 videos | 39m has Assessment available Badge
SCOR: Security Models & Frameworks
There is often confusion about why there are intrusion prevention devices when we already have firewalls. Aren't these devices doing the same thing? In this course, you'll learn the differences between these network security functions and tools. You'll also look at some specialized devices in more detail, including the Web Security Appliance and the Email Security Appliance. You'll move on to explore how you can deploy the ASA and Firepower in different ways like routed or transparent mode. Next, you'll learn about NetFlow and Flexible NetFlow, valuable tools for monitoring the flows of data through your network. You'll also see how you can safely leverage the power of Flexible NetFlow to help control your network. Finally, you'll learn about techniques for adding segmentation to your network, including EPGs in Cisco ACI and SGTs. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
4 videos | 1h has Assessment available Badge
SCOR: DHCP Snooping, DAI, IP Source Guard, Private VLANs, & Storm Control
When you think about attacking a network with a rogue DHCP device, you realize it is such a relatively easy attack to carry out. In this course, you'll learn about the DHCP snooping feature and how it is configured. Next, you'll examine how multiple different security features can leverage the DHCP snooping database that results from a proper implementation of DHCP snooping, including a demonstration of both the DAI and IP Source Guard features. You'll learn about the often intimidating security feature private VLANs, including the details of these structures and the reason why they exist. Finally, you'll explore traffic storms, including when they occur, how they create excessive traffic and can degrade network performance, and how to use the traffic storm control feature. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
4 videos | 1h 11m has Assessment available Badge
SCOR: Port Security, VLAN Hopping, Network Hardening, & Access Control
Port security is not one of the most important features when it comes to securing your network and it does have its challenges, but this feature is definitely a nice layer of defense in your overall defense-in-depth strategy. In this course, you'll learn about port security, as well as the VLAN hopping attack and how it can be prevented. You'll explore several security techniques you can use to help harden the network against security attacks and how it can benefit you to break the network and network device functionality down into the three planes of operation - management, data, and control planes. You'll also examine examples of security technologies you can use at each plane of operation to harden the overall network. Finally, you'll learn about different approaches to providing secure access to data in network systems, including MAC, DAC, and RBAC. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
3 videos | 57m has Assessment available Badge
SCOR: Network Access & Secure Network Management
In this course, you'll learn about options for the management of Cisco Firepower devices, including FMC, FDM, and ASDM. You'll explore how AAA can protect access through the device and to the device. Next, you'll learn about the RADIUS and TACACS+ security protocols, as well as commands you should use to ensure authentication to a Cisco device. Finally, you'll learn about critical best practices in secure network management for your enterprise and the syntax used with SNMP version 3. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
3 videos | 47m has Assessment available Badge
SCOR: Configuring and Verifying VPN & IPsec
There are many different styles of site-to-site VPNs possible because there are Cisco-centric types, as well as open standard designs. In this course, you'll examine a typical configuration of a site-to-site VPN, such as the DMVPN configuration and verification. Then you'll explore the many types of remote access VPN Cisco supports, including having a Cisco ASA provide VPN access to remote clients. Finally, you'll learn how to determine if your traffic is being protected in your IPsec site-to-site VPN built between Cisco devices. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
3 videos | 1h 6m has Assessment available Badge
SCOR: Cloud Deployment, Service Models, Responsibilities, & Security
In this course, you'll learn about the cloud in general, including the NIST definition of cloud (NIST 800-145) and cloud deployment and service models. You'll discover that you don't have to sacrifice security when you move to the cloud and explore the types of security responsibilities that exist with the cloud and the parties that are responsible for them. Finally, you'll learn about various cloud security processes and solutions that you should be familiar with if the cloud is an important aspect of your IT infrastructure, including cloud logging, auditing, and the security of workloads. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
3 videos | 1h 1m has Assessment available Badge
SCOR: Cisco Firepower, Traffic Management, Identity, & Authentication
In this course, you'll learn about the ASAv, FMCv, and FTDv in AWS, as well as how you would register an FTD in the FMC. Next, you'll move on to explore the need to deploy web security solutions transparently and how to implement this using the Web Cache Communication Protocol. You'll also learn how to view the implementation with a Cisco ASA. Finally, you'll learn about Cisco's Web Security Appliance, how it handles web requests in the network, and the importance of identity and authentication on the Cisco WSA. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
3 videos | 1h 2m has Assessment available Badge
SCOR: Working with ESA, CES, & WSA
Cisco has demonstrated its commitment to securing the enterprise with many different solutions that focus on specific needs, such as the Email Security Appliance, Cisco Cloud Email Security, and the Web Security Appliance. In this course, you'll learn the key facts about all three of these solutions. You'll explore how the WSA and ESA are impressive appliances when it comes to securing your web and e-mail infrastructures and about the components that make up these solutions. Even if you're not currently planning on implementing a WSA in your enterprise, it can be beneficial to see what a typical configuration is like. So next you'll look at the options available with the WSA. Finally, you'll learn about the steps involved in a typical ESA configuration and verification and how the ESA can function for you in the enterprise. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
4 videos | 1h 14m has Assessment available Badge
SCOR: Cisco Umbrella & Endpoint Security
When it comes to an IP and DNS-centric approach to network security, there is nothing quite like Cisco Umbrella. In this course, you'll learn about the Cisco Umbrella solution, including how to ensure it is properly configured and verified. Next, you'll examine EPP and EDR and their roles in securing network endpoints. You'll learn about the importance and uses of Cisco AMP and about a variety of other products that can be used to assist with keeping your endpoints secure. Finally, you'll explore the Outbreak Control functionality of Cisco AMP for Endpoints is the Outbreak Control. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
5 videos | 52m has Assessment available Badge
SCOR: MDM, MFA, & Endpoint Solutions
Mobile Device Management is widespread and getting more so all the time. MDM permits the management and control of all mobile devices that make their way to the typical enterprise today and in this course you'll learn about MDM as a cloud-based solution. Next, you'll look at the three main factors you can use to implement MFA and why you might choose some factors over the others. You'll examine the use of posture assessment as part of the overall security design and the key elements of this approach. Finally, you'll learn about the challenges of keeping systems patched, as well as various endpoint patching issues and approaches. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
4 videos | 1h 2m has Assessment available Badge
SCOR: Guest Services, BYOD, 802.1X, & CoA
In lower security environments, there is often a desire to permit guest access to the network. These guests might get limited Internet access or even access to some of the non-sensitive network resources and data. In this course, you'll learn about the Identity Service Engine, which is the component in the Cisco security portfolio that can make this access seamless to configure and implement. You'll also learn about guest access and BYOD for the network. Next, you'll move on to examine the use of 802.1X in high security enterprises to ensure that each network user is authenticated and then authorized for their network and resource access. You'll also look at related technologies like MAB and WebAuth. Finally, you'll explore the RADIUS Change of Authorization feature, which can be critical for certain network security functions. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
3 videos | 43m has Assessment available Badge
SCOR: Device Compliance, Exfiltration, Telemetry, & Security Products
In this course, you'll learn how device compliance and application control can be achieved using Cisco products. You'll explore why data exfiltration is one of the central concerns for security professionals. Next, you'll learn about network telemetry and model-driven telemetry and their increasing popularity in the industry. You'll also examine an example of how you might use telemetry in the Cisco network. Finally, you'll learn about the impressive number of security technologies in the Cisco solution portfolio, broken down by category and individual products in each category. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
4 videos | 49m has Assessment available Badge
SHOW MORE
FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE COURSES

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

BOOKS INCLUDED

Book

Cisco Networks: Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA
For beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this concise, one-stop reference lays out clear directions for installing, configuring, and troubleshooting networks with Cisco devices.
book Duration 11h 48m book Authors By Chris Carthern, Noel Rivera, Richard Bedwell, William Wilson

Book

Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance: Identify, Mitigate, and Respond to Network Attacks, Second Edition
Offering comprehensive sample configurations, proven troubleshooting methodologies, and debugging examples, this book provides an authoritative practitioner's guide to planning, deploying, managing, and troubleshooting security with Cisco ASA.
book Duration 15h 40m book Authors By Jazib Frahim, Omar Santos

BOOKS INCLUDED

Book

Cisco Secure Firewall Services Module (FWSM)
Comprehensively answering how and why the FWSM functions as it does, this book provides practical examples throughout and enables you to successfully deploy the FWSM and gain the greatest functional benefit from your deployment.
book Duration 6h 4m book Authors By Arvind Durai, Ray Blair

Book

Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance: Identify, Mitigate, and Respond to Network Attacks, Second Edition
Offering comprehensive sample configurations, proven troubleshooting methodologies, and debugging examples, this book provides an authoritative practitioner's guide to planning, deploying, managing, and troubleshooting security with Cisco ASA.
book Duration 15h 40m book Authors By Jazib Frahim, Omar Santos

Book

Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity
Devoted to forensic analysis of routers and switches, this book details where network forensics fits within the entire process of an investigation, end to end, from incident response and data collection to preparing a report and legal testimony.
book Duration 9h 51m book Authors By Dale Liu

Book

Cisco Networks: Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA
For beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this concise, one-stop reference lays out clear directions for installing, configuring, and troubleshooting networks with Cisco devices.
book Duration 11h 48m book Authors By Chris Carthern, Noel Rivera, Richard Bedwell, William Wilson

BOOKS INCLUDED

Book

Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance: Identify, Mitigate, and Respond to Network Attacks, Second Edition
Offering comprehensive sample configurations, proven troubleshooting methodologies, and debugging examples, this book provides an authoritative practitioner's guide to planning, deploying, managing, and troubleshooting security with Cisco ASA.
book Duration 15h 40m book Authors By Jazib Frahim, Omar Santos

Book

Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity
Devoted to forensic analysis of routers and switches, this book details where network forensics fits within the entire process of an investigation, end to end, from incident response and data collection to preparing a report and legal testimony.
book Duration 9h 51m book Authors By Dale Liu

Book

Cisco Networks: Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA
For beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this concise, one-stop reference lays out clear directions for installing, configuring, and troubleshooting networks with Cisco devices.
book Duration 11h 48m book Authors By Chris Carthern, Noel Rivera, Richard Bedwell, William Wilson

Book

Cisco Secure Firewall Services Module (FWSM)
Comprehensively answering how and why the FWSM functions as it does, this book provides practical examples throughout and enables you to successfully deploy the FWSM and gain the greatest functional benefit from your deployment.
book Duration 6h 4m book Authors By Arvind Durai, Ray Blair

BOOKS INCLUDED

Book

Cisco Networks: Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA
For beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this concise, one-stop reference lays out clear directions for installing, configuring, and troubleshooting networks with Cisco devices.
book Duration 11h 48m book Authors By Chris Carthern, Noel Rivera, Richard Bedwell, William Wilson

BOOKS INCLUDED

Book

Cisco Networks: Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA
For beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this concise, one-stop reference lays out clear directions for installing, configuring, and troubleshooting networks with Cisco devices.
book Duration 11h 48m book Authors By Chris Carthern, Noel Rivera, Richard Bedwell, William Wilson

Book

Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance: Identify, Mitigate, and Respond to Network Attacks, Second Edition
Offering comprehensive sample configurations, proven troubleshooting methodologies, and debugging examples, this book provides an authoritative practitioner's guide to planning, deploying, managing, and troubleshooting security with Cisco ASA.
book Duration 15h 40m book Authors By Jazib Frahim, Omar Santos

BOOKS INCLUDED

Book

Cisco Networks: Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA
For beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this concise, one-stop reference lays out clear directions for installing, configuring, and troubleshooting networks with Cisco devices.
book Duration 11h 48m book Authors By Chris Carthern, Noel Rivera, Richard Bedwell, William Wilson

Book

Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity
Devoted to forensic analysis of routers and switches, this book details where network forensics fits within the entire process of an investigation, end to end, from incident response and data collection to preparing a report and legal testimony.
book Duration 9h 51m book Authors By Dale Liu

SKILL BENCHMARKS INCLUDED

Cisco CyberOps Competency (Intermediate Level)
The Cisco CyberOps Competency benchmark will measure your ability to recognize key terms and concepts related to key Cisco CyberOps concepts. You will be evaluated on common vulnerabilities, access control models, NetFlow and tcpdump, and network attacks. A learner who scores high on this benchmark demonstrates that they have the skills related to Cisco CyberOps threat detection.
45m    |   30 questions
Cisco CyberOps Proficiency (Advanced Level)
The Cisco CyberOps Proficiency benchmark will measure your ability to recognize key terms and concepts related to key Cisco CyberOps concepts. You will be evaluated on endpoint-based attacks, attribution investigation, identifying security events, identifying intrusion elements, and forensic elements. A learner who scores high on this benchmark demonstrates that they have the skills related to performing Cisco CyberOps attribution analysis.
45m    |   30 questions

SKILL BENCHMARKS INCLUDED

Cisco Network Security Proficiency (Advanced Level)
The Cisco Network Security Proficiency benchmark will measure your ability to recognize key terms and concepts related to Cisco network security. You will be evaluated on security models, frameworks, DHCP snooping, IP Source Guard, port security, network hardening, network access, and IPsec. A learner who scores high on this benchmark demonstrates that they have the skills necessary for understanding key Cisco network security terminology and concepts.
17m    |   17 questions
Cisco Endpoint and Network Access Proficiency (Advanced Level)
The Cisco Endpoint and Network Access Proficiency benchmark will measure your ability to recognize key terms and concepts related to Cisco endpoints and network access. You will be evaluated on endpoint security, endpoint solutions, device compliance, exfiltration, telemetry, and security products. A learner who scores high on this benchmark demonstrates that they have the skills necessary for understanding key Cisco endpoints and network access terminology and concepts.
14m    |   14 questions
Cisco Security Proficiency (Advanced Level)
The Cisco Security Proficiency benchmark will measure your ability to recognize key terms and concepts related to architecture and design concepts. You will be evaluated on security concepts for enterprise networks, implementing resilience, security concepts for virtualization and cloud, security controls, authentication, and design. A learner who scores high on this benchmark demonstrates that they have the skills related to understanding key architecture and design terminology and concepts.
16m    |   16 questions
Cisco Cloud and Content Security Proficiency (Advanced Level)
The Cisco Cloud and Content Security Proficiency benchmark will measure your ability to recognize key terms and concepts related to Cisco cloud and content security. You will be evaluated on cloud deployment, service models, traffic management, and umbrella protection. A learner who scores high on this benchmark demonstrates that they have the skills necessary for understanding key Cisco cloud and content security terminology and concepts.
12m    |   12 questions
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)