Home > Store

ITP Course Lab: CCNP and CCIE Security Core SCOR 350-701

Practice Test

  • Sorry, this book is no longer in print.
  • Purchase immediate access to this online product.
Not for Sale

Description

  • Copyright 2021
  • Edition: 1st
  • Practice Test
  • ISBN-10: 0-13-731248-2
  • ISBN-13: 978-0-13-731248-1

Level up your career in expert-level security job roles with this video-based online training course designed to help you master a vast array of security topics and prepare at your own pace for the Implementing and Operating Cisco Security Core Technologies v1.0 (SCOR 350-701) exam. This exam is associated with the CCNP Security, Cisco Certified Specialist - Security Core, and CCIE Security certifications.

The expert-led certification prep course provides configuration demos, troubleshooting implementations, and a detailed exploration of general security concepts, such as network security, cloud security, content security, endpoint protection and detection, and network access, visibility, and enforcement.

Who should take this course

Skill level | Intermediate to advanced

  • Network security professionals, as well as network designers, administrators, and engineers
  • Anyone planning to take the current CCNP Security certification exam
  • Anyone planning to pursue the CCNP Security, Cisco Certified Specialist - Security Core, and CCIE Security certifications

This self-paced online training product requires a working knowledge of Ethernet, TCP/IP, and Cisco IOS networking concepts, and a basic understanding of core security technologies. The knowledge required to earn a CCNA certification would serve as a good foundation for this course.

For an optimal course experience, we recommend using these browsers and devices.

Course includes

  • 12 hours of targeted lessons with dynamic presentations, demos, and illustrated techniques to help you attain a better grasp of how security threats, preventative measures, and mitigation methods coalesce
  • Hands-on labs to simulate real-world experience
  • Self-study tools, such as quizzes, flash cards and exclusive practice exams to ensure readiness
  • Tips on taking the CCNP and CCIE Security Core SCOR 350-701 exam
  • 1 year of access*

What you'll learn

This Pearson IT Training Course covers the six main domains outlined in the SCOR 350-701 exam blueprint, including:

  • Identify, mitigate, and prevent common cybersecurity threats
  • Understand and implement various cryptography methods
  • Apply Software-Defined Networking (SDN) and network programmability to streamline your networks security
  • Manage network access, authentication, and user identity through proven tools and techniques  
  • Maintain the integrity of network infrastructure security through network tools, firewalls, and intrusion prevention systems  
  • Implement site-to-site and remote access virtual private networks (VPNs)  
  • Secure your network content on-premise and in the Cloud
  • Implement Endpoint Threat Detection and Response (ETDR) and Endpoint Detection and Response (EDR)
  • Prepare for the CCNP and CCIE Security Core SCOR 350-701 exam

*Retake guarantee

Retake guaranteeDidn't pass your certification exam on your first try? We'll give you six months of additional access at no cost.

About Pearson IT Training Courses

Pearson IT Training Courses are complete and affordable packages of expert-led, self-paced courses designed to help you stand out with in-demand skills that take your career to the next level.

From learning to hands-on practice and application, our comprehensive certification prep courses ensure you are ready for exam success.

Sample Content

Table of Contents

  1. Overview
  1. Module 1: Introduction
  2. Lesson 1: Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments
    1. Lesson 1 Learning objectives
    2. 1.1 Understanding Malware, Viruses, Trojans, and Rootkits
    3. 1.2 Keyloggers and Spyware
    4. 1.3 Malware Analysis Techniques
    5. 1.4 Surveying Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks
    6. 1.5 Surveying Common Application-based Vulnerabilities
    7. 1.6 Exploiting Cross-site Scripting (XSS) and Cross-site Request Forgery (CSRF) Vulnerabilities
    8. 1.7 Exploiting Authentication and Authorization-based Vulnerabilities
    9. 1.8 Understanding SQL Injection and Path Traversal Vulnerabilities
    10. 1.9 Understanding Buffer Overflows
    11. 1.1 Surveying Unsecure Code Practices and Insecure APIs
    12. 1.11 Understanding Security Threats in Cloud Environments
    13. 1.12 Understanding IoT Security Threats
  3. Lesson 1: Review
    1. Lesson 1 Flashcards
    2. Lesson 1 Quiz
  4. Lesson 1: Interactive Labs
  5. Lesson 2: Cryptography
    1. Lesson 2 Learning objectives
    2. 2.1 Introducing Cryptography and Cryptanalysis
    3. 2.2 Understanding Encryption Protocols
    4. 2.3 Describing Hashing Algorithms
    5. 2.4 Introducing Public Key Infrastructure (PKI)
    6. 2.5 Introducing Certificate Authorities (CAs) and Certificate Enrollment
    7. 2.6 Surveying SSL and TLS Implementations
    8. 2.7 Surveying IPsec Implementations
  6. Lesson 2: Review
    1. Lesson 2 Flashcards
    2. Lesson 2 Quiz
  7. Lesson 2: Interactive Labs
  8. Module 1: Quiz
  1. Module 2: Introduction
  2. Lesson 3: Software-Defined Networking Security
    1. Lesson 3 Learning objectives
    2. 3.1 Introducing SDN
    3. 3.2 Explaining North Bound and South Bound APIs in the SDN Architecture
    4. 3.3 Introducing Cisco ACI
    5. 3.4 Introducing Cisco DNA and Cisco DNA Center
    6. 3.5 Understanding VXLAN and Network Overlays
    7. 3.6 Understanding Microsegmentation
    8. 3.7 Surveying Open Source SDN Solutions
    9. 3.8 Understanding the Threats Against SDN Solutions
    10. 3.9 Understanding the Security Benefits in SDN Solutions
  3. Lesson 3: Review
    1. Lesson 3 Flashcards
    2. Lesson 3 Quiz
  4. Lesson 3: Interactive Labs
  5. Lesson 4: Network Programmability
    1. Lesson 4 Learning objectives
    2. 4.1 Introducing Network Programmability
    3. 4.2 Exploring DevNet and DevNet Resources for Security Automation
    4. 4.3 Introducing APIs, NETCONF, RESTCONF, and YANG
    5. 4.4 A Brief Introduction to Git
    6. 4.5 Exploring pxGrid
    7. 4.6 Integrating and Automating Security Operations with Cisco Products
  6. Lesson 4: Review
    1. Lesson 4 Flashcards
    2. Lesson 4 Quiz
  7. Lesson 4: Interactive Labs
  8. Module 2: Quiz
  1. Module 3: Introduction
  2. Lesson 5: Introducing AAA and Identity Management
    1. Lesson 5 Learning objectives
    2. 5.1 Understanding Authentication
    3. 5.2 Exploring the RADIUS Protocol
    4. 5.3 Surveying the TACACS+ Protocol
    5. 5.4 Understanding Authorization
    6. 5.5 Surveying Authorization Models
    7. 5.6 Defining Accounting
    8. 5.7 Exploring Multifactor Authentication and Single Sign-On
    9. 5.8 Exploring Examples of Multifactor and Single Sign-On
    10. 5.9 Understanding Cisco Duo
    11. 5.1 Introducing Cisco ISE
    12. 5.11 Understanding Cisco ISE Profiling Services
    13. 5.12 Understanding ISE Identity Services
    14. 5.13 Describing ISE Authorization Rules
  3. Lesson 5: Review
    1. Lesson 5 Flashcards
    2. Lesson 5 Quiz
  4. Lesson 5: Interactive Labs
  5. Lesson 6: Secure Network Access, Visibility, and Segmentation
    1. Lesson 6 Learning objectives
    2. 6.1 Defining Network Visibility and Segmentation
    3. 6.2 Introducing NetFlow and IPFIX
    4. 6.3 Describing Flexible NetFlow Records
    5. 6.4 Understanding NetFlow Deployment
    6. 6.5 Exploring Cisco Stealthwatch
    7. 6.6 Deploying Cisco Stealthwatch Cloud
    8. 6.7 On-Premise Monitoring with Stealthwatch Cloud
    9. 6.8 Exploring the Cisco TrustSec Solution
    10. 6.9 Describing the Benefits of Device Compliance and Application Control
    11. 6.1 Introducing Network Segmentation
    12. 6.11 Exploring Application-based Segmentation
    13. 6.12 Understanding Cisco ACI
    14. 6.13 Describing Network Access with CoA
    15. 6.14 Integrating Different Security Systems Using pxGrid
    16. 6.15 Exploring Cisco Encrypted Traffic Analytics (ETA), Cisco Cognitive Threat Analytics (CTA), and Cisco Threat Grid
  6. Lesson 6: Review
    1. Lesson 6 Flashcards
    2. Lesson 6 Quiz
  7. Lesson 6: Interactive Labs
  8. Module 3: Quiz
  1. Module 4: Introduction
  2. Lesson 7: Infrastructure Security
    1. Lesson 7 Learning objectives
    2. 7.1 Configuring and Verifying Network Segmentation Using VLANs and VRF-lite
    3. 7.2 Configuring and Verifying Port Security
    4. 7.3 Configuring and Verifying DHCP Snooping
    5. 7.4 Configuring and Verifying Dynamic ARP Inspection
    6. 7.5 Exploring and Mitigating Common Layer 2 Threats
    7. 7.6 Understanding and Configuring BPDU Guard and Root Guard
    8. 7.7 Understanding and Configuring CDP/LLDP
    9. 7.8 Understanding the Control Plane, Data Plane, and Management Plane
    10. 7.9 Exploring How to Secure the Management Plane
    11. 7.1 Exploring How to Secure the Control Plane
    12. 7.11 Exploring How to Secure the Data Plane
  3. Lesson 7: Review
    1. Lesson 7 Flashcards
    2. Lesson 7 Quiz
  4. Lesson 7: Interactive Labs
  5. Lesson 8: Cisco Next-Generation Firewalls
    1. Lesson 8 Learning objectives
    2. 8.1 Introducing Cisco Next-Generation Firewalls
    3. 8.2 Surveying the Cisco Firepower Management Center (FMC)
    4. 8.3 Exploring the Cisco Firepower Device Manager (FDM)
    5. 8.4 Implementing Access Control Policies
  6. Lesson 8: Review
    1. Lesson 8 Flashcards
    2. Lesson 8 Quiz
  7. Lesson 8: Interactive Labs
  8. Lesson 9: Cisco Next-Generation Intrusion Prevention Systems
    1. Lesson 9 Learning Objectives
    2. 9.1 Introducing Cisco Next-Generation Intrusion Prevention Systems
    3. 9.2 Describing Deployment Models of Network Security Solutions and Architectures That Provide Intrusion Prevention Capabilities
    4. 9.3 Configuring Cisco Next-Generation Intrusion Prevention Systems
  9. Lesson 9: Review
    1. Lesson 9 Flashcards
    2. Lesson 9 Quiz
  10. Lesson 9: Interactive Labs
  11. Module 4: Quiz
  1. Module 5: Introduction
  2. Lesson 10: Site-to-site VPN Implementations
    1. Lesson 10 Learning objectives
    2. 10.1 Introduction to IPsec Site-to-site and Remote Access VPNs
    3. 10.2 Configuring IPsec Site-to-site VPNs
    4. 10.3 Configuring Traditional Site-to-site VPN Utilizing Cisco Routers
    5. 10.4 Exploring DMVPN
    6. 10.5 Understanding GET VPN
    7. 10.6 Deploying FlexVPN
    8. 10.7 Troubleshooting Site-to-site VPN Implementations
  3. Lesson 10: Review
    1. Lesson 10 Flashcards
    2. Lesson 10 Quiz
  4. Lesson 10: Interactive Labs
  5. Lesson 11: Remote Access VPN
    1. Lesson 11 Learning Objectives
    2. 11.1 Introducing Remote Access VPNs
    3. 11.2 Exploring Clientless Remote Access VPNs
    4. 11.3 Surveying Remote Access VPN Implementations Using Cisco AnyConnect Secure Mobility Client
    5. 11.4 Configuring Remote Access VPN in Cisco ASA and in Cisco FTD
    6. 11.5 Troubleshooting Remote Access VPN Implementations
  6. Lesson 11: Review
    1. Lesson 11 Flashcards
    2. Lesson 11 Quiz
  7. Lesson 11: Interactive Labs
  8. Module 5: Quiz
  1. Module 6: Introduction
  2. Lesson 12: Securing the Cloud
    1. Lesson 12 Learning objectives
    2. 12.1 Introducing the Different Cloud Deployment and Service Models
    3. 12.2 Surveying Patch Management in the Cloud
    4. 12.3 Performing Security Assessments in Cloud Environments
    5. 12.4 Introducing Agile, DevOps, and CI/CD Pipelines
    6. 12.5 Introducing Serverless Computing
    7. 12.6 Understanding Container Orchestration and an Introduction to Kubernetes
    8. 12.7 Exploring the Concepts of DevSecOps
    9. 12.8 Surveying Cisco Umbrella
    10. 12.9 Exploring Cisco Cloud Email Security
    11. 12.1 Exploring Cisco Cloudlock
  3. Lesson 12: Review
    1. Lesson 12 Flashcards
    2. Lesson 12 Quiz
  4. Lesson 12: Interactive Labs
  5. Lesson 13: Content Security
    1. Lesson 13 Learning Objectives
    2. 13.1 Introducing Cisco Content Security Solutions
    3. 13.2 Describing Web Proxy Identity and Authentication Including Transparent User Identification
    4. 13.3 Introduction to Cisco Email Security
    5. 13.4 Exploring the Cisco ESA Deployment Model
    6. 13.5 Understanding Email Security Features
    7. 13.6 Discussing Email Security in the Cloud
    8. 13.7 Introduction to Secure Internet Gateway (SIG)
    9. 13.8 Describing the Components, Capabilities, and Benefits of Cisco Umbrella
    10. 13.9 Exploring Cisco Umbrella Investigate
  6. Lesson 13: Review
    1. Lesson 13 Flashcards
    2. Lesson 13 Quiz
  7. Lesson 13: Interactive Labs
  8. Module 6: Quiz
  1. Module 7: Introduction
  2. Lesson 14: Endpoint Protection and Detection
    1. Lesson 14 Learning objectives
    2. 14.1 Introducing AMP for Endpoints
    3. 14.2 Describing AMP for Endpoints Outbreak Control
    4. 14.3 Comparing Endpoint Threat Detection and Response (ETDR) and Endpoint Detection and Response (EDR) Solutions
    5. 14.4 Understanding AMP IP Blacklists and Whitelists
    6. 14.5 Exploring Application Control in AMP for Endpoints
    7. 14.6 Describing AMP for Endpoints Exclusion Sets
    8. 14.7 Introduction to AMP for Endpoints Policies
    9. 14.8 Describing the Anyconnect AMP Enabler
    10. 14.9 Exploring AMP for Endpoints Engines
    11. 14.1 How to Utilize AMP for Endpoints Reporting Features
    12. 14.11 Introducing the Cisco Threat Response Solution
  3. Lesson 14: Review
    1. Lesson 14 Flashcards
    2. Lesson 14 Quiz
  4. Lesson 14: Interactive Labs
  5. Module 7: Quiz

Updates

Submit Errata

More Information