Companies Home Search Profile

CCNP Security Core Online Training

Focused View

Knox Hutchinson

33:25:09

163 View
  • 01 - Introducing the Cybersecurity Landscape.mp4
    01:06
  • 02 - Know Your Assets.mp4
    06:18
  • 03 - Know Your Vulnerabilities.mp4
    04:53
  • 04 - Know Your Threats.mp4
    07:57
  • 05 - Virus, Trojan, and Malware.. Oh my!.mp4
    04:56
  • 06 - Phishing and Social Engineering.mp4
    05:17
  • 07 - DDoS - Attacking Availability.mp4
    04:40
  • 08 - Spoofing and MitM Attacks.mp4
    04:28
  • 09 - Summarizing the Threat Landscape.mp4
    00:34
  • 01 - Introducing Common Attack Vectors.mp4
    00:41
  • 02 - Get to Know OWASP.mp4
    05:50
  • 03 - The SQL Injection; SELECT - FROM table.mp4
    10:29
  • 04 - Cross-Site Scripting; var doCode{}.mp4
    06:20
  • 05 - Password Protection.mp4
    07:53
  • 06 - Plain-Text Protocols.mp4
    06:38
  • 07 - The Buffer Overflow.mp4
    03:02
  • 08 - Summarizing Common Vulnerabilities.mp4
    00:34
  • 01 - Introduction to Components of Cryptography.mp4
    00:48
  • 02 - Data Integrity.mp4
    06:00
  • 03 - Data Privacy.mp4
    04:13
  • 04 - SSL and TLS.mp4
    07:00
  • 05 - Public Key Infrastructure (PKI).mp4
    04:07
  • 06 - IPsec.mp4
    03:01
  • 07 - Authentication.mp4
    05:12
  • 08 - Components of Cryptography Summary.mp4
    00:44
  • 01 - Introduction to IPsec.mp4
    00:45
  • 02 - IPsec Overview.mp4
    05:46
  • 03 - IKEv1 and IKEv2.mp4
    07:44
  • 04 - Crypto Map IPsec.mp4
    04:29
  • 05 - VTI IPsec.mp4
    04:29
  • 06 - DMVPNs.mp4
    03:09
  • 07 - FlexVPN.mp4
    02:16
  • 08 - GET VPN.mp4
    03:42
  • 09 - NAT Traversal.mp4
    05:26
  • 10 - IPsec Fundamentals Summary.mp4
    00:36
  • 01 - Introducing Site-To-Site VPNs.mp4
    00:34
  • 02 - Planning for IPsec Site-To-Site.mp4
    08:19
  • 03 - Designing a Site-To-Site VPN.mp4
    04:27
  • 04 - Configuring an IKE Phase 1 Policy.mp4
    08:10
  • 05 - Configuring an IKE Phase 2 (IPsec) Policy.mp4
    11:32
  • 06 - Enabling the IPsec Policy.mp4
    11:20
  • 07 - Protocol Analysis IPsec.mp4
    05:19
  • 01 - Introduction to P2P GRE over IPsec VPNs.mp4
    00:26
  • 02 - Overview of GRE over IPsec VPNs.mp4
    06:37
  • 03 - P2P GRE Tunnel Design.mp4
    02:15
  • 04 - P2P GRE Tunnel Implementation.mp4
    05:02
  • 05 - P2P GRE Tunnel Verification.mp4
    05:33
  • 06 - IPsec Tunnel Protection Design.mp4
    02:19
  • 07 - IPsec Virtual Tunnel Interface Configuration.mp4
    08:48
  • 08 - IPsec Static VTI Verification.mp4
    02:39
  • 01 - Introduction to DMVPN.mp4
    00:39
  • 02 - DMVPN Overview.mp4
    03:50
  • 03 - Planning for the mGRE Tunnel.mp4
    02:53
  • 04 - mGRE Tunnel Configuration.mp4
    03:10
  • 05 - NHRP Overview and Design.mp4
    05:19
  • 06 - Configuring NHRP for DMVPN.mp4
    06:00
  • 07 - Adding Routing to DMVPN.mp4
    07:08
  • 08 - Verifying DMVPNs.mp4
    05:53
  • 09 - Adding IPsec Protection Profiles.mp4
    06:16
  • 10 - DMVPN Summary.mp4
    00:36
  • 01 - Introduction to GET VPN.mp4
    01:05
  • 02 - GET VPN Overview.mp4
    05:15
  • 03 - GET VPN Key Servers (KS).mp4
    06:25
  • 04 - GET VPN Members (GM).mp4
    05:58
  • 05 - GET VPN Design.mp4
    05:19
  • 06 - Implementing KS Configuration.mp4
    08:42
  • 07 - Implementing GM Configuration.mp4
    06:05
  • 08 - GET VPN verification.mp4
    08:13
  • 09 - GET VPN Summary.mp4
    00:59
  • 01 - Introduction to FlexVPN.mp4
    00:41
  • 02 - FlexVPN Overview.mp4
    03:42
  • 03 - FlexVPN Components.mp4
    05:19
  • 04 - IKEv2 Flex VPN Site-To-Site Planning.mp4
    04:01
  • 05 - IKEv2 FlexVPN Site-To-Site Configuration.mp4
    05:56
  • 06 - IKEv2 FlexVPN Verification.mp4
    04:40
  • 07 - Adding Routing to FlexVPN.mp4
    04:24
  • 08 - FlexVPN Summary.mp4
    00:54
  • 01 - Introduction to RA VPNs.mp4
    00:37
  • 02 - RA VPN Overview.mp4
    04:18
  • 03 - FlexVPN IPsec RA VPNs.mp4
    05:54
  • 04 - FlexVPN RA Design.mp4
    03:37
  • 05 - Setting CA Services in IOS.mp4
    06:50
  • 06 - Configuring FlexVPN RA.mp4
    07:34
  • 07 - AnyConnect Profile Editor.mp4
    05:31
  • 08 - Testing and Verifying the RA VPN.mp4
    07:10
  • 09 - Flex VPN RA Summary.mp4
    00:32
  • 01 - Introduction to Debugging IPsec.mp4
    00:34
  • 02 - Overview of IPsec Options.mp4
    02:21
  • 03 - Troubleshooting Tips for IPsec.mp4
    05:03
  • 04 - IKEv1, Phase 1, Missing Routes.mp4
    08:56
  • 05 - IKEv1, Phase 1, Bad Config.mp4
    06:55
  • 06 - IKEv1, Phase 2 Bad Config.mp4
    07:13
  • 07 - IKEv2 Troubleshooting.mp4
    08:12
  • 08 - Summary Troubleshooting IPsec.mp4
    00:37
  • 01 - Introduction to Security Intelligence.mp4
    00:40
  • 02 - Security Intelligence Overview.mp4
    04:25
  • 03 - Cisco Talos Overview.mp4
    03:11
  • 04 - Talos Vulnerability Information.mp4
    05:47
  • 05 - Talos Reputation Center.mp4
    04:49
  • 06 - Security Intelligence Summary.mp4
    00:49
  • 01 - Introducing APIs and SDN.mp4
    00:51
  • 02 - What is an API anyway.mp4
    13:16
  • 03 - The Northbound API.mp4
    04:00
  • 04 - The Southbound API.mp4
    02:22
  • 05 - The Eastbound API.mp4
    03:32
  • 06 - The Westbound API.mp4
    02:35
  • 07 - Summarizing APIs and SDN.mp4
    00:45
  • 01 - Introducing DNA Center.mp4
    00:39
  • 02 - What DNA Center Does.mp4
    12:35
  • 03 - What an SD-Access Fabric Does.mp4
    09:33
  • 04 - The Four Workflows of DNA Center.mp4
    09:08
  • 05 - The DNA Center Platform APIs.mp4
    07:12
  • 06 - Summarizing DNA Center.mp4
    00:39
  • 01 - Introducing Basic Python Security Scripts.mp4
    00:56
  • 02 - Extending Python and Setting Variables.mp4
    11:41
  • 03 - Getting Authenticated.mp4
    11:44
  • 04 - Getting Monitored Applications.mp4
    08:38
  • 05 - Summarizing Interpreting Python Scripts.mp4
    01:03
  • 01 - Introduction to Troubleshooting NetFlow.mp4
    00:49
  • 02 - NetFlow Overview.mp4
    03:42
  • 03 - Flavors of NetFlow.mp4
    05:56
  • 04 - NetFlow v5.mp4
    04:36
  • 05 - Flexible NetFlow.mp4
    05:59
  • 06 - NetFlow Collectors and Analyzers.mp4
    03:29
  • 01 - Intro to components of Network Security Design.mp4
    00:58
  • 02 - Network Access Control.mp4
    05:35
  • 03 - End Point Security.mp4
    02:31
  • 04 - Next Generation Firewalls and IPS.mp4
    03:55
  • 05 - TrustSec and MACsec.mp4
    03:26
  • 01 - Introducing Port Security.mp4
    00:59
  • 02 - Understanding Port Security and Why we Need It.mp4
    06:57
  • 03 - Port Security Defaults.mp4
    04:09
  • 04 - Implementing Port Security on Layer 2 Interface.mp4
    06:45
  • 05 - Customizing Port Security.mp4
    09:40
  • 06 - Configuring Auto Errdisable Recovery.mp4
    07:33
  • 07 - Applying Port Security Skills in Production.mp4
    05:53
  • 08 - Review of Configure and Verify Cisco Port Security.mp4
    02:36
  • 01 - Introducing DHCP Snooping.mp4
    00:56
  • 02 - Why is DHCP Snooping Needed.mp4
    04:35
  • 03 - The Recipe for DHCP Snooping.mp4
    05:56
  • 04 - Building and Implementing DHCP Snooping in PT.mp4
    11:46
  • 05 - Adding Source Guard to a Switch.mp4
    05:37
  • 06 - Applying DHCP Snooping in Production.mp4
    12:31
  • 07 - Review of Configure and Verify Cisco DHCP Snooping.mp4
    03:00
  • 01 - Introducing Dynamic ARP Inspection (DAI).mp4
    00:37
  • 02 - Why is DAI Needed.mp4
    03:36
  • 03 - The Recipe and Commands for DAI.mp4
    03:57
  • 04 - Implementing DAI.mp4
    04:59
  • 05 - ARP Access Lists for Non-DHCP Devices.mp4
    06:43
  • 06 - Additional DAI Options and Features.mp4
    06:45
  • 07 - Applying DAI to the Production Network.mp4
    06:08
  • 08 - Review of Configure and Verify Cisco Dynamic ARP Inspection.mp4
    02:13
  • 01 - Introduction to Private VLANs.mp4
    00:57
  • 02 - PVLANs Overview.mp4
    05:55
  • 03 - Promiscuous Ports.mp4
    06:14
  • 04 - PVLAN Design.mp4
    02:46
  • 05 - Implement PVLANs.mp4
    06:05
  • 06 - Verify PVLANs.mp4
    08:13
  • 07 - Trunking and PVLANs.mp4
    07:24
  • 08 - PVLAN Summary.mp4
    00:48
  • 01 - Introduction to VRF-lite.mp4
    00:24
  • 02 - VRF-lite Overview.mp4
    06:25
  • 03 - VRF-lite Configuration Basics.mp4
    03:51
  • 04 - VRFs on a Multi-Layer Switch.mp4
    02:03
  • 05 - VRF-lite Design.mp4
    02:25
  • 06 - VRF-lite Implementation.mp4
    06:40
  • 07 - VRF-lite Adding Routing.mp4
    07:56
  • 08 - VRF-lite Routing Verification.mp4
    05:53
  • 09 - DHCP VRF Services.mp4
    07:03
  • 10 - VRF-lite Summary.mp4
    00:31
  • 01 - Introduction to Device Hardening.mp4
    00:30
  • 02 - Device Hardening Overview.mp4
    05:44
  • 03 - Cisco Guide to Harden IOS Devices.mp4
    02:32
  • 04 - Management Plane Hardening.mp4
    15:45
  • 05 - Control Plane Hardening.mp4
    07:32
  • 06 - Data Plane Hardening.mp4
    06:54
  • 07 - Device Hardening Checklist.mp4
    04:34
  • 08 - Hardening Review.mp4
    00:43
  • 01 - Introduction to TrustSec.mp4
    00:55
  • 02 - TrustSec Overview.mp4
    04:48
  • 03 - TrustSec Security Groups.mp4
    03:55
  • 04 - Security Group ACLs.mp4
    03:44
  • 05 - TrustSec Policies.mp4
    06:40
  • 06 - Configure Network Devices for TrustSec.mp4
    06:53
  • 07 - ISE and NAD TrustSec Integration.mp4
    03:10
  • 08 - Verify TrustSec.mp4
    13:23
  • 09 - SGT eXchange Protocol (SXP).mp4
    06:59
  • 01 - Introduction to Additional Layer 2 Security Options.mp4
    00:34
  • 02 - Layer 2 Security Overview.mp4
    03:13
  • 03 - Storm Control.mp4
    08:10
  • 04 - Root Guard.mp4
    04:55
  • 05 - BPDU Guard.mp4
    05:04
  • 06 - Summary of Layer 2 Security.mp4
    00:31
  • 01 - Introduction to EIGRP Relationships and Authentication.mp4
    00:42
  • 02 - Neighborship Overview.mp4
    03:34
  • 03 - Authentication Overview.mp4
    10:54
  • 04 - EIGRP Hands on Lab with Authentication.mp4
    07:38
  • 01 - Intro to IPv4 OSPF Authentication and Troubleshooting.mp4
    00:39
  • 02 - Overview of OSPF Authentication.mp4
    13:42
  • 03 - Implement OSPF Authentication.mp4
    10:46
  • 04 - Virtual Links and Authentication.mp4
    03:30
  • 05 - Troubleshooting OSPF Authentication Lab 01.mp4
    11:35
  • 06 - Troubleshooting OSPF Authentication Lab 02.mp4
    13:31
  • 01 - Intro to IPv6 OSPF Authentication and Troubleshooting.mp4
    00:34
  • 02 - IPv6 OSPF Authentication Overview.mp4
    14:43
  • 03 - Implement and Verify Authentication.mp4
    07:31
  • 04 - Troubleshooting OSPF Authentication Lab 01.mp4
    09:51
  • 05 - Troubleshooting OSPF Authentication Lab 02.mp4
    08:20
  • 01 - Access Control Policy Overview.mp4
    07:58
  • 02 - Access Control Policy Rule Actions Concepts.mp4
    06:07
  • 03 - Access Control Policy Rule Actions Demonstration.mp4
    06:18
  • 04 - URL Filtering.mp4
    06:28
  • 05 - Malware and File Inspections.mp4
    08:22
  • 06 - SSL-TLS Decryption.mp4
    08:15
  • 07 - IPS Inspection.mp4
    04:28
  • 01 - Introduction to Secure Network Management.mp4
    00:37
  • 02 - Overview of Secure Management.mp4
    08:19
  • 03 - Syslog Overview.mp4
    05:19
  • 04 - NTP with Authentication.mp4
    06:29
  • 05 - Change Control.mp4
    03:20
  • 01 - Introduction to Troubleshooting SNMP.mp4
    00:42
  • 02 - SNMP Overview.mp4
    08:28
  • 03 - SNMPv2 Configuration.mp4
    09:31
  • 04 - SNMPv3 Client Configuration.mp4
    10:33
  • 05 - SNMPv3 Server Configuration.mp4
    05:01
  • 06 - Troubleshooting SNMP.mp4
    04:47
  • 01 - Introduction to Troubleshooting using Logging.mp4
    00:35
  • 02 - Logging Overview.mp4
    04:08
  • 03 - Configuring Logging.mp4
    11:11
  • 04 - Conditional Debugging.mp4
    08:59
  • 01 - Planning for Cloud Services.mp4
    07:45
  • 02 - Plan for Infrastructure As A Service.mp4
    08:12
  • 03 - Plan for Platform As A Service.mp4
    06:47
  • 04 - Plan for Software As A Service.mp4
    06:30
  • 05 - Plan for Cloud Deployment Models.mp4
    11:49
  • 01 - Software and App Development Methodologies.mp4
    03:52
  • 02 - Plan for Waterfall Method.mp4
    15:10
  • 03 - Plan for Lean and Agile Methods.mp4
    10:54
  • 04 - Plan for Kanban and Scrum Teams.mp4
    08:11
  • 05 - Continuous Integration, Deployment, and Delivery.mp4
    11:18
  • 06 - Understand CICD Pipelines in Action.mp4
    14:07
  • 07 - Plan for DevOps.mp4
    10:11
  • 08 - Plan for DevSecOps.mp4
    12:27
  • 01 - Planning for Software-as-a-Service Security.mp4
    03:30
  • 02 - Federating Identities with SAML, OAuth, and OpenID.mp4
    12:18
  • 03 - Cisco Zero-Trust for the Workforce.mp4
    10:43
  • 04 - Cisco Cloudlock Access Security Broker.mp4
    11:57
  • 05 - Securing DNS with Cisco Umbrella and OpenDNS.mp4
    12:08
  • 06 - Securing Communications with Cisco Email Security.mp4
    15:45
  • 01 - Planning for Cloud Infrastructure Security.mp4
    02:55
  • 02 - Assessing Cloud Service Providers.mp4
    07:25
  • 03 - Isolating and Segmenting Cloud Networks.mp4
    10:31
  • 04 - Leveraging Virtual Appliances.mp4
    11:23
  • 05 - Hardening, Protecting, and Maintaining Cloud VMs.mp4
    13:51
  • 06 - Planning for Infrastructure-as-Code.mp4
    12:32
  • 07 - Zero Trust Token Auth Demo.mp4
    06:11
  • 01 - Securing Cloud Platform-as-a-Service.mp4
    03:08
  • 02 - Plan for Containers.mp4
    08:24
  • 03 - Secure Container Images and Registries.mp4
    13:52
  • 04 - Orchestrating Containers.mp4
    10:08
  • 05 - Open Web Application Security Project Controls.mp4
    14:36
  • 06 - OWASP Protective Controls Continued.mp4
    13:57
  • 07 - Cisco Zero-Trust Architecture Overview.mp4
    11:54
  • 08 - Securing Workloads with Cisco Tetration.mp4
    14:19
  • 09 - Visibility with Cisco AppDynamics.mp4
    15:18
  • 01 - Introduction to Capture and Redirection Methods.mp4
    00:40
  • 02 - Capture and Redirection Overview.mp4
    02:21
  • 03 - Policy Based Routing (PBR) Overview.mp4
    02:03
  • 04 - PBR Configuration and Testing.mp4
    06:11
  • 05 - WCCP Overview and Planning.mp4
    02:12
  • 06 - WSA Configuration for WCCP.mp4
    04:17
  • 07 - IOS Configuration for WCCP.mp4
    07:45
  • 08 - Testing WCCP.mp4
    03:27
  • 09 - Traffic Redirection Summary.mp4
    01:00
  • 01 - Introduction to Cisco Web Security.mp4
    00:42
  • 02 - Web Security Appliance Overview.mp4
    06:04
  • 03 - WSA and AD Integration.mp4
    04:33
  • 04 - WSA Identification Profiles.mp4
    06:56
  • 05 - WSA Access Policies.mp4
    06:13
  • 06 - WSA Application Filtering.mp4
    05:38
  • 07 - WSA TLS Decryption Overview.mp4
    03:13
  • 08 - WSA Certificate Management.mp4
    06:56
  • 09 - WSA Decryption Policy.mp4
    06:26
  • 10 - WSA Additional Security Features.mp4
    03:36
  • 01 - Introduction to Cisco Email Security.mp4
    00:31
  • 02 - Cisco Email Security Overview.mp4
    05:38
  • 03 - ESA Inbound Mail Overview.mp4
    06:24
  • 04 - Blocking Incoming Email.mp4
    04:07
  • 05 - ESA Outbound Mail Overview.mp4
    05:41
  • 06 - SPAM Filtering.mp4
    03:28
  • 07 - Email Anti-Virus.mp4
    01:55
  • 08 - DLP.mp4
    02:39
  • 09 - Encryption.mp4
    03:02
  • 01 - Introduction to Cisco Umbrella.mp4
    00:33
  • 02 - Cisco Umbrella Overview.mp4
    08:26
  • 03 - Umbrella Components.mp4
    08:01
  • 04 - Policy Overview.mp4
    05:18
  • 05 - Policy Components.mp4
    08:20
  • 06 - Policy Creation.mp4
    07:54
  • 07 - Core Identities.mp4
    06:32
  • 08 - Umbrella CA Certificates.mp4
    05:25
  • 09 - Reporting and Investigation.mp4
    05:57
  • 10 - Umbrella VA.mp4
    11:08
  • 11 - Umbrella Summary.mp4
    00:47
  • 01 - Introducing Endpoint Security.mp4
    01:24
  • 02 - The Types of Endpoint Protection.mp4
    05:30
  • 03 - Introducing Advanced Malware Protection (AMP) for Endpoints.mp4
    08:36
  • 04 - Configuring Simple Outbreak Controls in AMP.mp4
    06:28
  • 05 - Explore Other Outbreak Controls.mp4
    05:03
  • 06 - Understand Groups and Policies.mp4
    04:51
  • 07 - Summarizing Endpoint Security.mp4
    00:29
  • 01 - Introducing Endpoint Defense Mechanisms.mp4
    01:04
  • 02 - Anti-Virus and Anti-Malware.mp4
    04:49
  • 03 - Indicators of Compromise (IoC).mp4
    05:38
  • 04 - Retrospective Analysis.mp4
    03:51
  • 05 - Dynamic File Analysis.mp4
    03:30
  • 06 - Summarizing Endpoint Protection Mechanisms.mp4
    00:46
  • 01 - Introduction to Endpoint Security.mp4
    00:40
  • 02 - Why Endpoint Protection is Critical.mp4
    04:25
  • 03 - The Value of Mobile Device Management.mp4
    04:40
  • 04 - Using Multi-Factor Authentication.mp4
    09:10
  • 05 - Posture Assessment for Endpoint Security.mp4
    06:00
  • 06 - Patching Endpoints.mp4
    02:01
  • 01 - Introducing Network Access Control for Endpoints.mp4
    01:12
  • 02 - Endpoint Profiling.mp4
    09:31
  • 03 - Identity-Based Authentication.mp4
    08:32
  • 04 - Authenticating with AnyConnect.mp4
    08:06
  • 05 - Posture Assessment.mp4
    05:59
  • 06 - Cisco TrustSec and Security Group Tags (SGTs).mp4
    06:11
  • 07 - Change of Authorization (CoA).mp4
    06:08
  • 08 - Summarizing Network Access Controls for Endpoints.mp4
    00:35
  • 01 - Introduction to 802.1x Fundamentals.mp4
    01:07
  • 02 - Network Authentication and Authorization.mp4
    07:20
  • 03 - Options for Authentication.mp4
    07:30
  • 04 - Options after Authentication.mp4
    07:07
  • 01 - Introduction to Switch Configuration for 802.1X.mp4
    00:38
  • 02 - Configure Global AAA Parameters.mp4
    08:04
  • 03 - Port Configuration.mp4
    07:34
  • 04 - Testing and Verifying.mp4
    05:24
  • 05 - Switch Configuration Summary.mp4
    00:26
  • 01 - Introduction to Configuring ISE.mp4
    00:41
  • 02 - Identity Stores.mp4
    02:33
  • 03 - Configure ISE to use AD.mp4
    03:33
  • 04 - Adding Network Devices to ISE.mp4
    04:52
  • 05 - Policy Set Overview.mp4
    11:23
  • 06 - Creating a Policy Set.mp4
    12:33
  • 07 - Authorization Policies.mp4
    10:11
  • 08 - Summary.mp4
    00:56
  • 01 - Introducing Attacker Exfiltration Techniques.mp4
    00:49
  • 02 - DNS Tunneling Exfiltration.mp4
    05:41
  • 03 - HTTP(S) Exfiltration.mp4
    07:04
  • 04 - Outbound File Transfers.mp4
    04:12
  • 05 - Text-Based Protocols.mp4
    04:45
  • 06 - Recapping Exfiltration Techniques.mp4
    00:47
  • 01 - Introducing Streaming Telemetry.mp4
    01:02
  • 02 - What is Telemetry.mp4
    05:10
  • 03 - Network Telemetry.mp4
    06:59
  • 04 - Endpoint Telemetry.mp4
    04:40
  • 05 - Summarizing Telemetry.mp4
    00:28
  • 01 - Introducing Cisco Security Platforms.mp4
    00:22
  • 02 - Stealthwatch.mp4
    07:32
  • 03 - pXGrid.mp4
    05:07
  • 04 - Umbrella Investigate.mp4
    06:34
  • 05 - Cognitive Threat Analytics.mp4
    03:54
  • 06 - AnyConnect Network Visibility Module.mp4
    03:23
  • 07 - Summarizing Cisco Security Platforms.mp4
    00:20
  • Description


    This intermediate Cisco CCNP Security training covers the objectives in the 350-701 SCOR exam, which is the core exam for the CCNP Security certification.

    Cisco's 350-701 SCOR exam tests a broad skill set, including network, cloud, and content security; endpoint protection and detection; secure network access, visibility, and enforcement. Covering these core security technologies will provide you with the knowledge tested by the 350-701 SCOR.

    More details


    The CCNP Security represents extreme familiarity with core security technologies — that's why this training covers the essentials of implementing and operating core Cisco security technologies.

    For anyone who manages their network — or the security of their network, this training is for you. This Cisco training can be also be used for 350-701 SCOR exam prep, onboarding new network engineers, individual or team training plans, or as a Cisco reference resource.

    350-701 SCOR: What You Need to Know

    For any network administrator using this training for exam preparation, our CCNP Security Core course maps to the Cisco 350-701 SCOR exam objectives, and covers topics such as:

    • Understanding information security concepts and strategies, including common attack vectors
    • Implementing access controls on Cisco appliances and security technologies
    • Implementing email content security features
    • Planning for the unique vulnerabilities VPNs can pose to network security
    • Locking down networks with Cisco-specific solutions like IOS, VTI VPNs and point-to-point IPsec VPNs

    Who Should Take 350-701 SCOR Training?

    This CCNP Security Core training is considered Professional-level Cisco training, which means it was designed for network administrators with three to five years of experience with advanced security practices.

    New or aspiring network administrators. If you're a new network administrator, getting the training for the CCNP Security Core exam will help ensure that your networks are secure. You don't have to go on to take the exam, or even go for the certification, but instead you can learn the advanced procedures for locking down a network against breaches and hostile actors. There's time for the certification later in your career, in the meantime, why not have a rock-solid and safe network?.

    Experienced network administrators. If you've been working as a network administrator for a few years, you may be at a point in your career when you want to focus your expertise and choose a longer-term path. If network security interests you, this CCNP Security Core training can help you make wiser choices within your networks and very wise decisions about a career step toward network security.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Knox Hutchinson
    Knox Hutchinson
    Instructor's Courses

    The personal touch, coupled with the ability to go at your own pace, makes video training far and away the best way to learn.

    Knox brings a wealth of data analysis and visualization experience to CBT Nuggets. Knox started off as a CBT Nuggets learner, became a mentor in our Learner Community, and is now a trainer. Having benefited from the CBT Nuggets Learning Experience firsthand, Knox creates training that connects with learners. Knox also has a wide range of IT experience. Prior to joining CBT Nuggets, Knox worked as an IT consultant, advising in a variety of areas including networking, cloud computing, and project management.

    Certifications: Microsoft MCSE: Cloud Platform and Infrastructure, Microsoft MCP: Administering SQL Server 2012/2014 Databases, Cisco DevNet Professional, Cisco CCNP: Enterprise, Certified Meraki Network Operator (CMNO), JNCIA-JUNOS, JNCIA-DevOps, Tableau Desktop Qualified Associate, and CompTIA Network+

    Areas of expertise: Data analysis and visualization, business intelligence solutions

    CBT Nuggets is renowned for providing innovative training that's informative, meaningful, and engaging. We provide a variety of training, primarily in IT, project management, and office productivity topics. Our comprehensive library contains thousands of training videos ranging from Cisco networking to Microsoft Word. Whether you want to pass a certification exam, increase your skills, or simply learn new things, we've got you covered! All of our training is delivered through high-quality online streaming video. Subscribers can train 24 hours a day, seven days a week, from the convenience of a computer or mobile device. CBT Nuggets trainers are the rock stars of training, renowned for their expertise, industry-wide credibility, and engaging personalities. They enable CBT Nuggets to deliver accurate, up-to-date training, using a laid-back whiteboard presentation style. There are no scripts, EVER. Our trainers love to teach, and it shows! CEO and founder Dan Charbonneau was a Microsoft trainer when he began recording CBT Nuggets' very first training videos back in the 1990s. He wanted to help provide large organizations, small teams and individuals with comprehensive and budget-conscious training, and he realized it couldn't be done in a classroom. From the CBT Nuggets World Headquarters in Eugene, Oregon, Dan and his team promise each video will be informative, comprehensive, accurate, and fun to watch.
    • language english
    • Training sessions 366
    • duration 33:25:09
    • Release Date 2023/07/21

    Courses related to CCNP Enterprise

    Courses related to Network Security

    Courses related to Computer Network

    Courses related to Network Engineering

    Courses related to Cisco CCNP