Description

Overview

This course will teach students about information systems risk. Topics covered include risk identification, assessment, evaluation, response, and monitoring, as well as information systems control design and implementation.

Series Taught By: John Glover

Available CEUs for Course Series Completion: 6
Students can earn up to 6 CEUs for fully completing this course series. This information will be displayed on the certificate of completion. Learn More

Course Details

  • 16:50:00 Hours
  • 12 Months Access
  • Presented by highly qualified, industry leading experts

The courses cover everything you need to know about network security, cloud security, content security, endpoint protection and detection, secure network access, and visibility and enforcement. You’ll have the foundation laid for a career in network security and the ability to specialize in any number of specific areas and technologies. In addition, the courses in this path align with the objectives for the Cisco SCOR (300-701) exam and can help you prepare for the exam.

What is the SCOR course all about? Why it is important? What are the specific topics you will learn in this course? Find out all these answers and more in this course overview episode.

Objectives

  • Network security
  • Cloud security
  • Content security
  • Endpoint protection and detection
  • Secure network access

Audience

  • Security engineer
  • Network engineer
  • Network designer
  • Network administrator
  • Systems engineer
  • Consulting systems engineer

Prerequisites

  • Familiarity with Ethernet and TCP/IP networking
  • Working knowledge of the Windows operating system
  • Working knowledge of Cisco IOS networking and concepts

Course Outline

Top of Form

COURSE OVERVIEW

  • Course Overview

SECURITY CONCEPTS

  • Threats, Vulnerabilities, Exploits and Mitigations
  • Common Threats to On-Prem
  • Common Security Vulnerabilities
  • Some Attack Mitigations
  • Introduction to Cryptography
  • Modern Cryptographic Solutions
  • Fundamentals of PKI
  • Using the PKI
  • IKE v1 vs IKE v2
  • VPN Options
  • Security Intelligence Auth, Sharing, Consumption
  • Endpoint Protections Social Engineering Attacks
  • Types of Social Engineering Attacks
  • Python Scripts for Security Appliance API Calls

NETWORK SECURITY

  • Common Threats in the Cloud
  • Intrusion Prevention Versus Firewalling
  • Deployment Models for Network Security
  • NetFlow And Flexible NetFlow
  • Network Segmentation
  • DHCP Snooping
  • DAI and IP Source Guard
  • Private VLANs
  • Storm Control
  • Port Security and VLAN Hopping Attacks
  • Hardening the Network Infrastructure
  • Access Control Policies
  • Management Options for Security Solutions
  • Configure AAA for Device and Network Access
  • Configure Secure Network Management
  • Configure and Verify the Site-to-Site VPN
  • Configure and Verify the Remote Access VPN
  • Debugging and Showing IPsec Verifications

Content Security

  • Endpoint Protections Social Engineering Attacks
  • Introducing Cisco Firepower Devices
  • Traffic Redirection and Capture Methods
  • Compare ESA, CES, WSA
  • The WSA and ESA Architectures
  • Configure and Verify the WSA
  • Configure and Verify the ESA
  • Describe the Cisco Umbrella Solution
  • Configure and Verify Cisco Umbrella
  • Northbound and Southbound APIs of SDN

Securing the Cloud

  • Cloud Deployment and Service Models
  • Security Responsibilities in the Cloud
  • Miscellaneous Cloud Security Topics

Endpoint Protection and Detection

  • EPP versus EDR and Cisco AMP
  • Miscellaneous Endpoint Security
  • Outbreak Control
  • Describe MDM
  • Describe an MFA Strategy
  • Endpoint Posture Assessment Solutions
  • Explain an Endpoint Patching Strategy

Secure Network Access

  • Guest Services and BYOD
  • Configure and Verify 802.1X, MAB, and WebAuth
  • Network Access with CoA
  • Device Compliance and Application Control
  • Explain Exfiltration Techniques
  • Benefits of Network Telemetry
  • Describe Various Cisco Security Products