350-701: Implementing and Operating Cisco Security Core Technologies

Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.
$14.99 / $24.99
Cisco Certifications - CCNP SCOR
-
1. Cisco Certification Updates - FEB 202011m
-
2. Cisco Re-Certifications1m
-
3. CCNP Certifications1m
-
4. CCIE Certifications2m
-
5. Cisco Certification Migration Options6m
-
6. CCNP Required Exams3m
Security Core - 350-701
-
1. CCNP Security Certifications7m
-
2. CCNP SCOR - 350-7011m
-
3. SCOR 350-701 Contents7m
Network Security Concepts
-
1. Network Security Terminology6m
-
2. Goals of Network Security10m
-
3. Threat Types - Mitigation9m
-
4. Assets - Classification of Assets6m
-
5. Classify Counter Measures4m
-
6. Classify Vulnerabilities2m
-
7. Network Security - Design Principles10m
Common Security Attacks - Mitigation
-
1. Motivations behind Network Attacks3m
-
2. Social Engineering Attacks4m
-
3. Phishing Attacks4m
-
5. Denial of Service Attacks - DoS5m
-
6. Distributed Denial of Service Attakcs - DDoS4m
-
7. Spoofing Attacks4m
-
8. Spoofing Attacks - Mitigation4m
-
9. Man in the Middle Attacks -MiTM2m
-
10. Password Attacks5m
-
11. Password Attacks - Mitigation4m
-
12. Reflector Attacks2m
-
13. Amplification Attacks2m
-
14. Reconnaissance Attacks5m
-
15. Reconnaissance Attacks - Mitigation2m
Malicious Codes - Hacking
-
1. Malicious Codes - VIRUS2m
-
2. Malicious Codes - WORMS1m
-
3. Malicious Codes - TROJAN HORSES1m
-
4. Hacking1m
-
5. Hackers - Script Kiddies1m
-
6. Malware Service - DARKNET1m
Threat Defense Technologies
-
1. AAA - Network Security11m
-
2. Cisco Telemetry Services4m
-
3. Firewall8m
-
4. Intrusion Prevention System - IPS4m
-
5. Virtual Private Networks4m
-
6. Next Generation Firewalls6m
Virtual Labs - GNS3 Setup
-
1. Cisco Lab Options8m
-
2. About GNS34m
-
3. Installing GNS3 - Windows7m
-
4. GNS3 - IOS Images6m
-
5. Default Topology - GNS3 - IOS initial Configs5m
-
6. IOS Default Topology9m
-
7. GNS3 Topology-HOST Computer6m
-
8. GNS3 - VMware Setup9m
-
9. GNS3 - IOSv L2-L36m
-
10. GNS3 - ASAv Setup4m
-
11. GNS3 - IOU-L2-L33m
Network Infrastructure Protection
-
1. Network Infrastructure Protection5m
-
2. Identify Network Device Planes2m
-
3. Data Plane6m
-
4. Control Plane3m
-
5. Management Plane3m
Remote Management- TELNET - SSH
-
1. Inband Vs OutBand Management7m
-
2. Remote Access - TELNET6m
-
3. Remote Access - SSH9m
Cisco Telemetry Services
-
1. Cisco Telemetry Services4m
-
2. Device- Network Events Logging10m
-
3. Syslog - Terminal Logging7m
-
4. Network Time Protocol7m
-
5. NTP Stratum Value4m
-
6. NTP Configuration - LAB9m
Control Plane Security
-
1. Control Plane Security - Possible Threats9m
-
2. Routing Protocol Authentication12m
-
3. Control Plane Policing - CoPP7m
-
4. Class-Map - Policy Map - Hierarchy5m
-
5. CoPP - Configuration Examples12m
L2-Security Basic
-
1. Switch Security - Overview2m
-
2. Disable Unused Ports1m
-
3. Dynamic Trunking Protocol - DTP8m
-
4. DTP Vulnerabilities - Mitigation2m
-
5. VLAN Hopping Attacks - Mitigation5m
-
6. Cisco Discovery Protocol - CDP18m
-
7. Link Layer Discovery Protocol - LLDP3m
-
8. CDP- LLDP Vulnerabilities - Mitigation2m
L2-Security Advanced
-
1. MAC Flooding Attack - Port Security12m
-
2. MAC Spoofing Attack - Port Security7m
-
3. Port Security - Configuration11m
-
4. Spanning Tree Port Fast7m
-
5. Native VLAN8m
-
6. DHCP Spoofing Attack - DHCP Spoofing8m
-
7. DHCP Snooping - Configuration16m
-
8. DHCP Starvation Attack - Mitigation2m
-
9. ARP Spoofing Attack - DAI12m
-
10. Dynamic ARP Inspection - Configuration12m
-
11. Protected Ports- Private VLAN Edge3m
-
12. Private VLAN9m
-
13. Private VLAN - Configuration5m
-
14. Private VLAN - LAB20m
Firewalls
-
1. What is Firewall8m
-
2. Statefull Packet Filtering8m
-
3. Stateless Packet Filtering4m
-
4. Application Level Gateways - Proxy Servers5m
-
5. Next Generation Firewalls6m
-
6. FIrewall Vendors in Market6m
Cisco ASA Firewall
-
1. Cisco Statefull Firewalls - IOS - ASA3m
-
2. ASA Supported Features _ PART19m
-
3. ASA Supported Features _ PART211m
-
4. ASS Compare Models7m
Cisco ASA Configuration
-
1. Manage Cisco CLI - ASA - GUI3m
-
2. Basic CLI Modes - Commands4m
-
3. ASA Security Levels10m
-
4. ASA Interface Configurations5m
-
5. ASA Security Policies - Default11m
-
6. ASA Routing5m
ASA ACLs - Object Groups
-
1. ASA ACls - Overview9m
-
2. ASA ACLS - Basic Example7m
-
3. Traffic Between Same Security Levels3m
-
4. ACL Object Groups10m
-
5. ACL Object Groups - LAB12m
ASA _ Network Address Translation (NAT)
-
1. PRivate IP - Public IP5m
-
2. What is NAT ?3m
-
3. NAT Types6m
-
4. Dynamic NAT - on ASA10m
-
5. Dynamic PAT- ASA5m
-
6. Dynamic PAT - with Exit interface5m
-
7. Dynamic NAT-PAT Combination2m
-
8. Static NAT - ASA12m
-
9. Static PAT- ASA11m
IOS - Zone Based Firewall
-
1. IOS - Zone Based Firewall3m
-
2. ZBF - Configuration Overview4m
-
3. ZBF - Security Zones3m
-
4. ZBF - Default Flow3m
-
5. Class-Map - Policy Map - Hierarchy5m
-
6. ZBF - Classify Traffic using Class-Maps6m
-
7. ZBF- Class-map Configuration5m
-
8. ZBF - POlicy Map - Zone Pairs11m
Cryptography
-
1. What is Cryptography3m
-
2. Goals of Cryptography3m
-
3. Hashing-How it Works3m
-
4. Hashing with HMAC3m
-
5. What is Encryption - Decryption1m
-
6. Encryption Algorithms - Symmetric vs Assymetric5m
-
7. Cryptanalysis - Attacks4m
-
8. Asymmetric Encryption - Drawbacks3m
-
9. Public Key Infrastructure - PKI4m
VPN foundations
-
1. Virutal Private Network - Introduction5m
-
2. VPN Types - Site to Site / Remote Access4m
-
3. VPN Logical Topologies1m
-
4. VPN Default Lab Setup - Routers5m
IPSec - IP Protocol Security
-
1. What is IPSec ?3m
-
2. IPsec Security Services7m
-
3. IPSec Modes - Tunnel vs Transport5m
Site to Site IPSEC VPN
-
1. How IPsec VPN Works5m
-
2. Step-1 - Interesting Traffic3m
-
3. Step-2 IKE Phase-18m
-
4. Step-3 - IKE Phase 29m
-
5. IKE Phase 2 - Configuration/ Verification7m
Remote Access VPN
-
1. Remote Access VPN3m
-
2. What is SSL-TLS3m
-
3. How SSL-TLS Works8m
-
4. What is SSL VPN4m
-
5. SSL VPN - Modes6m
Authentication, Authorization, Accounting - AAA
-
1. AAA - Network Security11m
-
2. AAA - Components4m
-
3. AAA Protocols - TACACS - RADIUS8m
-
4. AAA- Cisco Authentication Servers4m
AAA Authentication
-
1. AAA Authentication - Device Access3m
-
2. Authentication Local database10m
-
3. AAA External Servers3m
-
4. Authentication - External server (TACACS)12m
AAA Authorization
-
1. Authorization - Device Access3m
-
2. IOS Privilege Levels9m
-
3. Local Authorization using Privilege Levels14m
-
4. IOS Privilege Levels _ Limitations5m
-
5. Role based CLI Access - RBAC6m
-
6. RBAC Views - Types4m
-
7. RBAC Views - LAB110m
-
8. Modify RBAC Views - LAB 24m
-
9. Modify RBAC Views - LAB 36m
-
10. RBAC - Super Views5m
WEb Traffic - Attacks- Solutions
-
1. Web Access - Possible Threats4m
-
2. Web Based Attacks-5m
-
3. Web Attack Examples10m
-
4. Web Security Solutions5m
CIsco Web Security Appliance - WSA
-
1. Cisco Web Security - WSA-CWS5m
-
2. What is WSA ?9m
-
3. WSA- HOw it Works5m
-
4. WSA Deployment Modes6m
-
5. WSA models - Physical -Virtual Appliance5m
-
6. WSA Licensing Options7m
Email Security _ ESA
-
1. Email Based Threats2m
-
2. Cisco Email Security Appliance - ESA3m
Intrusion Prevention System - IPS
-
1. Intrusion Prevention System - IPS3m
-
2. IDS vs IPS2m
-
3. Host Based IPS vs Network Based IPS6m
-
4. IPS Deployment Modes - INline vs Promiscious3m
-
5. Cisco IPS Solutions5m
-
6. IPS Threat Detection Methods7m
-
7. IPS Signature Alarm Types3m
-
8. IPS Signature Actions3m
-
9. IPS Evasion Methods - CounterMeasures6m
Network Management
-
1. What is Network Management8m
-
2. Past-Present Methods of Network Mangement- PART 114m
-
3. Past-Present Methods of Network Mangement- PART 27m
-
4. SNMP- Simple Network Mangement Protocol18m
Network Automation
-
1. Challenges - Traditional Management11m
-
2. Network Automation - Goals16m
-
3. Types of Network Automation6m
-
4. What can be Automated - PART 112m
-
5. What can be Automated - PART 29m
-
6. Impact of Network Automation8m
SDN & SDN Controllers
-
1. Automation Origination Points8m
-
2. SDN - Software Defined Networking15m
-
3. SDN Controllers9m
-
4. Networks Managed by SDN Controllers13m
SDN-Control-MGMT-DATA Plane
-
1. Management Plane3m
-
2. SDN-Management Plane7m
-
3. SDN-Control Plane - Data Plane6m
SDN Models - Architecture
-
1. SDN - Imperative Model5m
-
2. SDN - Declarative Model7m
-
3. SDN - Network Design Requirments9m
-
4. UNderlaY Networks7m
-
5. Overlay Networks7m
-
6. SDN Fabric6m
Application Programming Interface - API
-
1. Application Programming Interface - API11m
-
2. API Types4m
-
3. API - With SDN Networks9m
-
4. NorthBound API9m
-
5. SouthBound API8m
Cisco DEVNET - SANDBOXs
-
1. Cisco DevNet5m
-
2. DevNet Certifications5m
-
3. DevNet Sandbox6m
-
4. DevNet Sandbox LABS8m
-
5. Sandbox LAB Access - Reservations3m
Cisco DNA Center
-
1. Cisco DNA Center16m
-
2. DNA Center Appliance4m
-
3. DNA Center- What can do - PART 111m
-
4. DNA Center- What can do - PART 213m
Web Service API - REST API
-
1. Web Service API8m
-
2. Web Service API - Commonly Used8m
-
3. REST API8m
Network Automation Tools
-
1. Config Management Tools6m
-
2. Config Management Tools - Capabilities9m
-
3. Master-Agent6m
-
4. Agent Based vs Agentless7m
-
5. Push-Pull Model10m
-
6. Configuration Files5m
PUPPET - Config MGMT Tool
-
1. PUPPET - Config MGMT Tool3m
-
2. PUPPET-Master Agent Database3m
-
3. PUPPET - Manifest5m
-
4. PUPPET-Module-Forge6m
-
5. PUPPET-Agent- Agentless3m
-
6. PUPPET-PULL Model Steps4m
CHEF- Config MGMT Tool
-
1. CHEF- Config MGMT Tool6m
-
2. CHEF- Terminology7m
ANSIBLE- COnfig MGMT Tool
-
1. ANSIBLE- COnfig MGMT Tool8m
-
2. ANSIBLE- Control Station3m
-
3. ANSIBLE- PlayBook-Inventory5m
-
4. ANSIBLE- Templates-Variables7m
JSON Data Encoding
-
1. API Data Formats8m
-
2. JSON Overview8m
-
3. JSON Data Types7m
-
4. JSON Syntax Rules3m
-
5. JSON Data Interpretation7m