350-701: Implementing and Operating Cisco Security Core Technologies

350-701: Implementing and Operating Cisco Security Core Technologies

Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.

$14.99 / $24.99

Cisco Certifications - CCNP SCOR

  • 1. Cisco Certification Updates - FEB 2020
    11m
  • 2. Cisco Re-Certifications
    1m
  • 3. CCNP Certifications
    1m
  • 4. CCIE Certifications
    2m
  • 5. Cisco Certification Migration Options
    6m
  • 6. CCNP Required Exams
    3m

Security Core - 350-701

  • 1. CCNP Security Certifications
    7m
  • 2. CCNP SCOR - 350-701
    1m
  • 3. SCOR 350-701 Contents
    7m

Network Security Concepts

  • 1. Network Security Terminology
    6m
  • 2. Goals of Network Security
    10m
  • 3. Threat Types - Mitigation
    9m
  • 4. Assets - Classification of Assets
    6m
  • 5. Classify Counter Measures
    4m
  • 6. Classify Vulnerabilities
    2m
  • 7. Network Security - Design Principles
    10m

Common Security Attacks - Mitigation

  • 1. Motivations behind Network Attacks
    3m
  • 2. Social Engineering Attacks
    4m
  • 3. Phishing Attacks
    4m
  • 5. Denial of Service Attacks - DoS
    5m
  • 6. Distributed Denial of Service Attakcs - DDoS
    4m
  • 7. Spoofing Attacks
    4m
  • 8. Spoofing Attacks - Mitigation
    4m
  • 9. Man in the Middle Attacks -MiTM
    2m
  • 10. Password Attacks
    5m
  • 11. Password Attacks - Mitigation
    4m
  • 12. Reflector Attacks
    2m
  • 13. Amplification Attacks
    2m
  • 14. Reconnaissance Attacks
    5m
  • 15. Reconnaissance Attacks - Mitigation
    2m

Malicious Codes - Hacking

  • 1. Malicious Codes - VIRUS
    2m
  • 2. Malicious Codes - WORMS
    1m
  • 3. Malicious Codes - TROJAN HORSES
    1m
  • 4. Hacking
    1m
  • 5. Hackers - Script Kiddies
    1m
  • 6. Malware Service - DARKNET
    1m

Threat Defense Technologies

  • 1. AAA - Network Security
    11m
  • 2. Cisco Telemetry Services
    4m
  • 3. Firewall
    8m
  • 4. Intrusion Prevention System - IPS
    4m
  • 5. Virtual Private Networks
    4m
  • 6. Next Generation Firewalls
    6m

Virtual Labs - GNS3 Setup

  • 1. Cisco Lab Options
    8m
  • 2. About GNS3
    4m
  • 3. Installing GNS3 - Windows
    7m
  • 4. GNS3 - IOS Images
    6m
  • 5. Default Topology - GNS3 - IOS initial Configs
    5m
  • 6. IOS Default Topology
    9m
  • 7. GNS3 Topology-HOST Computer
    6m
  • 8. GNS3 - VMware Setup
    9m
  • 9. GNS3 - IOSv L2-L3
    6m
  • 10. GNS3 - ASAv Setup
    4m
  • 11. GNS3 - IOU-L2-L3
    3m

Network Infrastructure Protection

  • 1. Network Infrastructure Protection
    5m
  • 2. Identify Network Device Planes
    2m
  • 3. Data Plane
    6m
  • 4. Control Plane
    3m
  • 5. Management Plane
    3m

Remote Management- TELNET - SSH

  • 1. Inband Vs OutBand Management
    7m
  • 2. Remote Access - TELNET
    6m
  • 3. Remote Access - SSH
    9m

Cisco Telemetry Services

  • 1. Cisco Telemetry Services
    4m
  • 2. Device- Network Events Logging
    10m
  • 3. Syslog - Terminal Logging
    7m
  • 4. Network Time Protocol
    7m
  • 5. NTP Stratum Value
    4m
  • 6. NTP Configuration - LAB
    9m

Control Plane Security

  • 1. Control Plane Security - Possible Threats
    9m
  • 2. Routing Protocol Authentication
    12m
  • 3. Control Plane Policing - CoPP
    7m
  • 4. Class-Map - Policy Map - Hierarchy
    5m
  • 5. CoPP - Configuration Examples
    12m

L2-Security Basic

  • 1. Switch Security - Overview
    2m
  • 2. Disable Unused Ports
    1m
  • 3. Dynamic Trunking Protocol - DTP
    8m
  • 4. DTP Vulnerabilities - Mitigation
    2m
  • 5. VLAN Hopping Attacks - Mitigation
    5m
  • 6. Cisco Discovery Protocol - CDP
    18m
  • 7. Link Layer Discovery Protocol - LLDP
    3m
  • 8. CDP- LLDP Vulnerabilities - Mitigation
    2m

L2-Security Advanced

  • 1. MAC Flooding Attack - Port Security
    12m
  • 2. MAC Spoofing Attack - Port Security
    7m
  • 3. Port Security - Configuration
    11m
  • 4. Spanning Tree Port Fast
    7m
  • 5. Native VLAN
    8m
  • 6. DHCP Spoofing Attack - DHCP Spoofing
    8m
  • 7. DHCP Snooping - Configuration
    16m
  • 8. DHCP Starvation Attack - Mitigation
    2m
  • 9. ARP Spoofing Attack - DAI
    12m
  • 10. Dynamic ARP Inspection - Configuration
    12m
  • 11. Protected Ports- Private VLAN Edge
    3m
  • 12. Private VLAN
    9m
  • 13. Private VLAN - Configuration
    5m
  • 14. Private VLAN - LAB
    20m

Firewalls

  • 1. What is Firewall
    8m
  • 2. Statefull Packet Filtering
    8m
  • 3. Stateless Packet Filtering
    4m
  • 4. Application Level Gateways - Proxy Servers
    5m
  • 5. Next Generation Firewalls
    6m
  • 6. FIrewall Vendors in Market
    6m

Cisco ASA Firewall

  • 1. Cisco Statefull Firewalls - IOS - ASA
    3m
  • 2. ASA Supported Features _ PART1
    9m
  • 3. ASA Supported Features _ PART2
    11m
  • 4. ASS Compare Models
    7m

Cisco ASA Configuration

  • 1. Manage Cisco CLI - ASA - GUI
    3m
  • 2. Basic CLI Modes - Commands
    4m
  • 3. ASA Security Levels
    10m
  • 4. ASA Interface Configurations
    5m
  • 5. ASA Security Policies - Default
    11m
  • 6. ASA Routing
    5m

ASA ACLs - Object Groups

  • 1. ASA ACls - Overview
    9m
  • 2. ASA ACLS - Basic Example
    7m
  • 3. Traffic Between Same Security Levels
    3m
  • 4. ACL Object Groups
    10m
  • 5. ACL Object Groups - LAB
    12m

ASA _ Network Address Translation (NAT)

  • 1. PRivate IP - Public IP
    5m
  • 2. What is NAT ?
    3m
  • 3. NAT Types
    6m
  • 4. Dynamic NAT - on ASA
    10m
  • 5. Dynamic PAT- ASA
    5m
  • 6. Dynamic PAT - with Exit interface
    5m
  • 7. Dynamic NAT-PAT Combination
    2m
  • 8. Static NAT - ASA
    12m
  • 9. Static PAT- ASA
    11m

IOS - Zone Based Firewall

  • 1. IOS - Zone Based Firewall
    3m
  • 2. ZBF - Configuration Overview
    4m
  • 3. ZBF - Security Zones
    3m
  • 4. ZBF - Default Flow
    3m
  • 5. Class-Map - Policy Map - Hierarchy
    5m
  • 6. ZBF - Classify Traffic using Class-Maps
    6m
  • 7. ZBF- Class-map Configuration
    5m
  • 8. ZBF - POlicy Map - Zone Pairs
    11m

Cryptography

  • 1. What is Cryptography
    3m
  • 2. Goals of Cryptography
    3m
  • 3. Hashing-How it Works
    3m
  • 4. Hashing with HMAC
    3m
  • 5. What is Encryption - Decryption
    1m
  • 6. Encryption Algorithms - Symmetric vs Assymetric
    5m
  • 7. Cryptanalysis - Attacks
    4m
  • 8. Asymmetric Encryption - Drawbacks
    3m
  • 9. Public Key Infrastructure - PKI
    4m

VPN foundations

  • 1. Virutal Private Network - Introduction
    5m
  • 2. VPN Types - Site to Site / Remote Access
    4m
  • 3. VPN Logical Topologies
    1m
  • 4. VPN Default Lab Setup - Routers
    5m

IPSec - IP Protocol Security

  • 1. What is IPSec ?
    3m
  • 2. IPsec Security Services
    7m
  • 3. IPSec Modes - Tunnel vs Transport
    5m

Site to Site IPSEC VPN

  • 1. How IPsec VPN Works
    5m
  • 2. Step-1 - Interesting Traffic
    3m
  • 3. Step-2 IKE Phase-1
    8m
  • 4. Step-3 - IKE Phase 2
    9m
  • 5. IKE Phase 2 - Configuration/ Verification
    7m

Remote Access VPN

  • 1. Remote Access VPN
    3m
  • 2. What is SSL-TLS
    3m
  • 3. How SSL-TLS Works
    8m
  • 4. What is SSL VPN
    4m
  • 5. SSL VPN - Modes
    6m

Authentication, Authorization, Accounting - AAA

  • 1. AAA - Network Security
    11m
  • 2. AAA - Components
    4m
  • 3. AAA Protocols - TACACS - RADIUS
    8m
  • 4. AAA- Cisco Authentication Servers
    4m

AAA Authentication

  • 1. AAA Authentication - Device Access
    3m
  • 2. Authentication Local database
    10m
  • 3. AAA External Servers
    3m
  • 4. Authentication - External server (TACACS)
    12m

AAA Authorization

  • 1. Authorization - Device Access
    3m
  • 2. IOS Privilege Levels
    9m
  • 3. Local Authorization using Privilege Levels
    14m
  • 4. IOS Privilege Levels _ Limitations
    5m
  • 5. Role based CLI Access - RBAC
    6m
  • 6. RBAC Views - Types
    4m
  • 7. RBAC Views - LAB1
    10m
  • 8. Modify RBAC Views - LAB 2
    4m
  • 9. Modify RBAC Views - LAB 3
    6m
  • 10. RBAC - Super Views
    5m

WEb Traffic - Attacks- Solutions

  • 1. Web Access - Possible Threats
    4m
  • 2. Web Based Attacks-
    5m
  • 3. Web Attack Examples
    10m
  • 4. Web Security Solutions
    5m

CIsco Web Security Appliance - WSA

  • 1. Cisco Web Security - WSA-CWS
    5m
  • 2. What is WSA ?
    9m
  • 3. WSA- HOw it Works
    5m
  • 4. WSA Deployment Modes
    6m
  • 5. WSA models - Physical -Virtual Appliance
    5m
  • 6. WSA Licensing Options
    7m

Email Security _ ESA

  • 1. Email Based Threats
    2m
  • 2. Cisco Email Security Appliance - ESA
    3m

Intrusion Prevention System - IPS

  • 1. Intrusion Prevention System - IPS
    3m
  • 2. IDS vs IPS
    2m
  • 3. Host Based IPS vs Network Based IPS
    6m
  • 4. IPS Deployment Modes - INline vs Promiscious
    3m
  • 5. Cisco IPS Solutions
    5m
  • 6. IPS Threat Detection Methods
    7m
  • 7. IPS Signature Alarm Types
    3m
  • 8. IPS Signature Actions
    3m
  • 9. IPS Evasion Methods - CounterMeasures
    6m

Network Management

  • 1. What is Network Management
    8m
  • 2. Past-Present Methods of Network Mangement- PART 1
    14m
  • 3. Past-Present Methods of Network Mangement- PART 2
    7m
  • 4. SNMP- Simple Network Mangement Protocol
    18m

Network Automation

  • 1. Challenges - Traditional Management
    11m
  • 2. Network Automation - Goals
    16m
  • 3. Types of Network Automation
    6m
  • 4. What can be Automated - PART 1
    12m
  • 5. What can be Automated - PART 2
    9m
  • 6. Impact of Network Automation
    8m

SDN & SDN Controllers

  • 1. Automation Origination Points
    8m
  • 2. SDN - Software Defined Networking
    15m
  • 3. SDN Controllers
    9m
  • 4. Networks Managed by SDN Controllers
    13m

SDN-Control-MGMT-DATA Plane

  • 1. Management Plane
    3m
  • 2. SDN-Management Plane
    7m
  • 3. SDN-Control Plane - Data Plane
    6m

SDN Models - Architecture

  • 1. SDN - Imperative Model
    5m
  • 2. SDN - Declarative Model
    7m
  • 3. SDN - Network Design Requirments
    9m
  • 4. UNderlaY Networks
    7m
  • 5. Overlay Networks
    7m
  • 6. SDN Fabric
    6m

Application Programming Interface - API

  • 1. Application Programming Interface - API
    11m
  • 2. API Types
    4m
  • 3. API - With SDN Networks
    9m
  • 4. NorthBound API
    9m
  • 5. SouthBound API
    8m

Cisco DEVNET - SANDBOXs

  • 1. Cisco DevNet
    5m
  • 2. DevNet Certifications
    5m
  • 3. DevNet Sandbox
    6m
  • 4. DevNet Sandbox LABS
    8m
  • 5. Sandbox LAB Access - Reservations
    3m

Cisco DNA Center

  • 1. Cisco DNA Center
    16m
  • 2. DNA Center Appliance
    4m
  • 3. DNA Center- What can do - PART 1
    11m
  • 4. DNA Center- What can do - PART 2
    13m

Web Service API - REST API

  • 1. Web Service API
    8m
  • 2. Web Service API - Commonly Used
    8m
  • 3. REST API
    8m

Network Automation Tools

  • 1. Config Management Tools
    6m
  • 2. Config Management Tools - Capabilities
    9m
  • 3. Master-Agent
    6m
  • 4. Agent Based vs Agentless
    7m
  • 5. Push-Pull Model
    10m
  • 6. Configuration Files
    5m

PUPPET - Config MGMT Tool

  • 1. PUPPET - Config MGMT Tool
    3m
  • 2. PUPPET-Master Agent Database
    3m
  • 3. PUPPET - Manifest
    5m
  • 4. PUPPET-Module-Forge
    6m
  • 5. PUPPET-Agent- Agentless
    3m
  • 6. PUPPET-PULL Model Steps
    4m

CHEF- Config MGMT Tool

  • 1. CHEF- Config MGMT Tool
    6m
  • 2. CHEF- Terminology
    7m

ANSIBLE- COnfig MGMT Tool

  • 1. ANSIBLE- COnfig MGMT Tool
    8m
  • 2. ANSIBLE- Control Station
    3m
  • 3. ANSIBLE- PlayBook-Inventory
    5m
  • 4. ANSIBLE- Templates-Variables
    7m

JSON Data Encoding

  • 1. API Data Formats
    8m
  • 2. JSON Overview
    8m
  • 3. JSON Data Types
    7m
  • 4. JSON Syntax Rules
    3m
  • 5. JSON Data Interpretation
    7m