Description
Overview
This course will teach students about information systems risk. Topics covered include risk identification, assessment, evaluation, response, and monitoring, as well as information systems control design and implementation.
Series Taught By: John Glover
Available CEUs for Course Series Completion: 6
Students can earn up to 6 CEUs for fully completing this course series. This information will be displayed on the certificate of completion. Learn More
Course Details
- 16:50:00 Hours
- 12 Months Access
- Presented by highly qualified, industry leading experts
The courses cover everything you need to know about network security, cloud security, content security, endpoint protection and detection, secure network access, and visibility and enforcement. You’ll have the foundation laid for a career in network security and the ability to specialize in any number of specific areas and technologies. In addition, the courses in this path align with the objectives for the Cisco SCOR (300-701) exam and can help you prepare for the exam.
What is the SCOR course all about? Why it is important? What are the specific topics you will learn in this course? Find out all these answers and more in this course overview episode.
Objectives
- Network security
- Cloud security
- Content security
- Endpoint protection and detection
- Secure network access
Audience
- Security engineer
- Network engineer
- Network designer
- Network administrator
- Systems engineer
- Consulting systems engineer
Prerequisites
- Familiarity with Ethernet and TCP/IP networking
- Working knowledge of the Windows operating system
- Working knowledge of Cisco IOS networking and concepts
Course Outline
Top of Form
COURSE OVERVIEW
- Course Overview
SECURITY CONCEPTS
- Threats, Vulnerabilities, Exploits and Mitigations
- Common Threats to On-Prem
- Common Security Vulnerabilities
- Some Attack Mitigations
- Introduction to Cryptography
- Modern Cryptographic Solutions
- Fundamentals of PKI
- Using the PKI
- IKE v1 vs IKE v2
- VPN Options
- Security Intelligence Auth, Sharing, Consumption
- Endpoint Protections Social Engineering Attacks
- Types of Social Engineering Attacks
- Python Scripts for Security Appliance API Calls
NETWORK SECURITY
- Common Threats in the Cloud
- Intrusion Prevention Versus Firewalling
- Deployment Models for Network Security
- NetFlow And Flexible NetFlow
- Network Segmentation
- DHCP Snooping
- DAI and IP Source Guard
- Private VLANs
- Storm Control
- Port Security and VLAN Hopping Attacks
- Hardening the Network Infrastructure
- Access Control Policies
- Management Options for Security Solutions
- Configure AAA for Device and Network Access
- Configure Secure Network Management
- Configure and Verify the Site-to-Site VPN
- Configure and Verify the Remote Access VPN
- Debugging and Showing IPsec Verifications
Content Security
- Endpoint Protections Social Engineering Attacks
- Introducing Cisco Firepower Devices
- Traffic Redirection and Capture Methods
- Compare ESA, CES, WSA
- The WSA and ESA Architectures
- Configure and Verify the WSA
- Configure and Verify the ESA
- Describe the Cisco Umbrella Solution
- Configure and Verify Cisco Umbrella
- Northbound and Southbound APIs of SDN
Securing the Cloud
- Cloud Deployment and Service Models
- Security Responsibilities in the Cloud
- Miscellaneous Cloud Security Topics
Endpoint Protection and Detection
- EPP versus EDR and Cisco AMP
- Miscellaneous Endpoint Security
- Outbreak Control
- Describe MDM
- Describe an MFA Strategy
- Endpoint Posture Assessment Solutions
- Explain an Endpoint Patching Strategy
Secure Network Access
- Guest Services and BYOD
- Configure and Verify 802.1X, MAB, and WebAuth
- Network Access with CoA
- Device Compliance and Application Control
- Explain Exfiltration Techniques
- Benefits of Network Telemetry
- Describe Various Cisco Security Products