350-701: Implementing and Operating Cisco Security Core Technologies

350-701: Implementing and Operating Cisco Security Core Technologies

Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.

$14.99 / $24.99

Cisco Certifications - CCNP SCOR

  • 1. Cisco Certification Updates - FEB 2020
    11m
  • 2. Cisco Re-Certifications
    1m
  • 3. CCNP Certifications
    1m
  • 4. CCIE Certifications
    2m
  • 5. Cisco Certification Migration Options
    6m
  • 6. CCNP Required Exams
    3m

Security Core - 350-701

  • 1. CCNP Security Certifications
    7m
  • 2. CCNP SCOR - 350-701
    1m
  • 3. SCOR 350-701 Contents
    7m

Network Security Concepts

  • 1. Network Security Terminology
    6m
  • 2. Goals of Network Security
    10m
  • 3. Threat Types - Mitigation
    9m
  • 4. Assets - Classification of Assets
    6m
  • 5. Classify Counter Measures
    4m
  • 6. Classify Vulnerabilities
    2m
  • 7. Network Security - Design Principles
    10m

Common Security Attacks - Mitigation

  • 1. Motivations behind Network Attacks
    3m
  • 2. Social Engineering Attacks
    4m
  • 3. Phishing Attacks
    4m
  • 5. Denial of Service Attacks - DoS
    5m
  • 6. Distributed Denial of Service Attakcs - DDoS
    4m
  • 7. Spoofing Attacks
    4m
  • 8. Spoofing Attacks - Mitigation
    4m
  • 9. Man in the Middle Attacks -MiTM
    2m
  • 10. Password Attacks
    5m
  • 11. Password Attacks - Mitigation
    4m
  • 12. Reflector Attacks
    2m
  • 13. Amplification Attacks
    2m
  • 14. Reconnaissance Attacks
    5m
  • 15. Reconnaissance Attacks - Mitigation
    2m

Malicious Codes - Hacking

  • 1. Malicious Codes - VIRUS
    2m
  • 2. Malicious Codes - WORMS
    1m
  • 3. Malicious Codes - TROJAN HORSES
    1m
  • 4. Hacking
    1m
  • 5. Hackers - Script Kiddies
    1m
  • 6. Malware Service - DARKNET
    1m

Threat Defense Technologies

  • 1. AAA - Network Security
    11m
  • 2. Cisco Telemetry Services
    4m
  • 3. Firewall
    8m
  • 4. Intrusion Prevention System - IPS
    4m
  • 5. Virtual Private Networks
    4m
  • 6. Next Generation Firewalls
    6m

Virtual Labs - GNS3 Setup

  • 1. Cisco Lab Options
    8m
  • 2. About GNS3
    4m
  • 3. Installing GNS3 - Windows
    7m
  • 4. GNS3 - IOS Images
    6m
  • 5. Default Topology - GNS3 - IOS initial Configs
    5m
  • 6. IOS Default Topology
    9m
  • 7. GNS3 Topology-HOST Computer
    6m
  • 8. GNS3 - VMware Setup
    9m
  • 9. GNS3 - IOSv L2-L3
    6m
  • 10. GNS3 - ASAv Setup
    4m
  • 11. GNS3 - IOU-L2-L3
    3m

Network Infrastructure Protection

  • 1. Network Infrastructure Protection
    5m
  • 2. Identify Network Device Planes
    2m
  • 3. Data Plane
    6m
  • 4. Control Plane
    3m
  • 5. Management Plane
    3m

Remote Management- TELNET - SSH

  • 1. Inband Vs OutBand Management
    7m
  • 2. Remote Access - TELNET
    6m
  • 3. Remote Access - SSH
    9m

Cisco Telemetry Services

  • 1. Cisco Telemetry Services
    4m
  • 2. Device- Network Events Logging
    10m
  • 3. Syslog - Terminal Logging
    7m
  • 4. Network Time Protocol
    7m
  • 5. NTP Stratum Value
    4m
  • 6. NTP Configuration - LAB
    9m

Control Plane Security

  • 1. Control Plane Security - Possible Threats
    9m
  • 2. Routing Protocol Authentication
    12m
  • 3. Control Plane Policing - CoPP
    7m
  • 4. Class-Map - Policy Map - Hierarchy
    5m
  • 5. CoPP - Configuration Examples
    12m

L2-Security Basic

  • 1. Switch Security - Overview
    2m
  • 2. Disable Unused Ports
    1m
  • 3. Dynamic Trunking Protocol - DTP
    8m
  • 4. DTP Vulnerabilities - Mitigation
    2m
  • 5. VLAN Hopping Attacks - Mitigation
    5m
  • 6. Cisco Discovery Protocol - CDP
    18m
  • 7. Link Layer Discovery Protocol - LLDP
    3m
  • 8. CDP- LLDP Vulnerabilities - Mitigation
    2m

L2-Security Advanced

  • 1. MAC Flooding Attack - Port Security
    12m
  • 2. MAC Spoofing Attack - Port Security
    7m
  • 3. Port Security - Configuration
    11m
  • 4. Spanning Tree Port Fast
    7m
  • 5. Native VLAN
    8m
  • 6. DHCP Spoofing Attack - DHCP Spoofing
    8m
  • 7. DHCP Snooping - Configuration
    16m
  • 8. DHCP Starvation Attack - Mitigation
    2m
  • 9. ARP Spoofing Attack - DAI
    12m
  • 10. Dynamic ARP Inspection - Configuration
    12m
  • 11. Protected Ports- Private VLAN Edge
    3m
  • 12. Private VLAN
    9m
  • 13. Private VLAN - Configuration
    5m
  • 14. Private VLAN - LAB
    20m

Firewalls

  • 1. What is Firewall
    8m
  • 2. Statefull Packet Filtering
    8m
  • 3. Stateless Packet Filtering
    4m
  • 4. Application Level Gateways - Proxy Servers
    5m
  • 5. Next Generation Firewalls
    6m
  • 6. FIrewall Vendors in Market
    6m

Cisco ASA Firewall

  • 1. Cisco Statefull Firewalls - IOS - ASA
    3m
  • 2. ASA Supported Features _ PART1
    9m
  • 3. ASA Supported Features _ PART2
    11m
  • 4. ASS Compare Models
    7m

Cisco ASA Configuration

  • 1. Manage Cisco CLI - ASA - GUI
    3m
  • 2. Basic CLI Modes - Commands
    4m
  • 3. ASA Security Levels
    10m
  • 4. ASA Interface Configurations
    5m
  • 5. ASA Security Policies - Default
    11m
  • 6. ASA Routing
    5m

ASA ACLs - Object Groups

  • 1. ASA ACls - Overview
    9m
  • 2. ASA ACLS - Basic Example
    7m
  • 3. Traffic Between Same Security Levels
    3m
  • 4. ACL Object Groups
    10m
  • 5. ACL Object Groups - LAB
    12m

ASA _ Network Address Translation (NAT)

  • 1. PRivate IP - Public IP
    5m
  • 2. What is NAT ?
    3m
  • 3. NAT Types
    6m
  • 4. Dynamic NAT - on ASA
    10m
  • 5. Dynamic PAT- ASA
    5m
  • 6. Dynamic PAT - with Exit interface
    5m
  • 7. Dynamic NAT-PAT Combination
    2m
  • 8. Static NAT - ASA
    12m
  • 9. Static PAT- ASA
    11m

IOS - Zone Based Firewall

  • 1. IOS - Zone Based Firewall
    3m
  • 2. ZBF - Configuration Overview
    4m
  • 3. ZBF - Security Zones
    3m
  • 4. ZBF - Default Flow
    3m
  • 5. Class-Map - Policy Map - Hierarchy
    5m
  • 6. ZBF - Classify Traffic using Class-Maps
    6m
  • 7. ZBF- Class-map Configuration
    5m
  • 8. ZBF - POlicy Map - Zone Pairs
    11m

Cryptography

  • 1. What is Cryptography
    3m
  • 2. Goals of Cryptography
    3m
  • 3. Hashing-How it Works
    3m
  • 4. Hashing with HMAC
    3m
  • 5. What is Encryption - Decryption
    1m
  • 6. Encryption Algorithms - Symmetric vs Assymetric
    5m
  • 7. Cryptanalysis - Attacks
    4m
  • 8. Asymmetric Encryption - Drawbacks
    3m
  • 9. Public Key Infrastructure - PKI
    4m

VPN foundations

  • 1. Virutal Private Network - Introduction
    5m
  • 2. VPN Types - Site to Site / Remote Access
    4m
  • 3. VPN Logical Topologies
    1m
  • 4. VPN Default Lab Setup - Routers
    5m

IPSec - IP Protocol Security

  • 1. What is IPSec ?
    3m
  • 2. IPsec Security Services
    7m
  • 3. IPSec Modes - Tunnel vs Transport
    5m

Site to Site IPSEC VPN

  • 1. How IPsec VPN Works
    5m
  • 2. Step-1 - Interesting Traffic
    3m
  • 3. Step-2 IKE Phase-1
    8m
  • 4. Step-3 - IKE Phase 2
    9m
  • 5. IKE Phase 2 - Configuration/ Verification
    7m

Remote Access VPN

  • 1. Remote Access VPN
    3m
  • 2. What is SSL-TLS
    3m
  • 3. How SSL-TLS Works
    8m
  • 4. What is SSL VPN
    4m
  • 5. SSL VPN - Modes
    6m

Authentication, Authorization, Accounting - AAA

  • 1. AAA - Network Security
    11m
  • 2. AAA - Components
    4m
  • 3. AAA Protocols - TACACS - RADIUS
    8m
  • 4. AAA- Cisco Authentication Servers
    4m

AAA Authentication

  • 1. AAA Authentication - Device Access
    3m
  • 2. Authentication Local database
    10m
  • 3. AAA External Servers
    3m
  • 4. Authentication - External server (TACACS)
    12m

AAA Authorization

  • 1. Authorization - Device Access
    3m
  • 2. IOS Privilege Levels
    9m
  • 3. Local Authorization using Privilege Levels
    14m
  • 4. IOS Privilege Levels _ Limitations
    5m
  • 5. Role based CLI Access - RBAC
    6m
  • 6. RBAC Views - Types
    4m
  • 7. RBAC Views - LAB1
    10m
  • 8. Modify RBAC Views - LAB 2
    4m
  • 9. Modify RBAC Views - LAB 3
    6m
  • 10. RBAC - Super Views
    5m

WEb Traffic - Attacks- Solutions

  • 1. Web Access - Possible Threats
    4m
  • 2. Web Based Attacks-
    5m
  • 3. Web Attack Examples
    10m
  • 4. Web Security Solutions
    5m

CIsco Web Security Appliance - WSA

  • 1. Cisco Web Security - WSA-CWS
    5m
  • 2. What is WSA ?
    9m
  • 3. WSA- HOw it Works
    5m
  • 4. WSA Deployment Modes
    6m
  • 5. WSA models - Physical -Virtual Appliance
    5m
  • 6. WSA Licensing Options
    7m

Email Security _ ESA

  • 1. Email Based Threats
    2m
  • 2. Cisco Email Security Appliance - ESA
    3m

Intrusion Prevention System - IPS

  • 1. Intrusion Prevention System - IPS
    3m
  • 2. IDS vs IPS
    2m
  • 3. Host Based IPS vs Network Based IPS
    6m
  • 4. IPS Deployment Modes - INline vs Promiscious
    3m
  • 5. Cisco IPS Solutions
    5m
  • 6. IPS Threat Detection Methods
    7m
  • 7. IPS Signature Alarm Types
    3m
  • 8. IPS Signature Actions
    3m
  • 9. IPS Evasion Methods - CounterMeasures
    6m

Network Management

  • 1. What is Network Management
    8m
  • 2. Past-Present Methods of Network Mangement- PART 1
    14m
  • 3. Past-Present Methods of Network Mangement- PART 2
    7m
  • 4. SNMP- Simple Network Mangement Protocol
    18m

Network Automation

  • 1. Challenges - Traditional Management
    11m
  • 2. Network Automation - Goals
    16m
  • 3. Types of Network Automation
    6m
  • 4. What can be Automated - PART 1
    12m
  • 5. What can be Automated - PART 2
    9m
  • 6. Impact of Network Automation
    8m

SDN & SDN Controllers

  • 1. Automation Origination Points
    8m
  • 2. SDN - Software Defined Networking
    15m
  • 3. SDN Controllers
    9m
  • 4. Networks Managed by SDN Controllers
    13m

SDN-Control-MGMT-DATA Plane

  • 1. Management Plane
    3m
  • 2. SDN-Management Plane
    7m
  • 3. SDN-Control Plane - Data Plane
    6m

SDN Models - Architecture

  • 1. SDN - Imperative Model
    5m
  • 2. SDN - Declarative Model
    7m
  • 3. SDN - Network Design Requirments
    9m
  • 4. UNderlaY Networks
    7m
  • 5. Overlay Networks
    7m
  • 6. SDN Fabric
    6m

Application Programming Interface - API

  • 1. Application Programming Interface - API
    11m
  • 2. API Types
    4m
  • 3. API - With SDN Networks
    9m
  • 4. NorthBound API
    9m
  • 5. SouthBound API
    8m

Cisco DEVNET - SANDBOXs

  • 1. Cisco DevNet
    5m
  • 2. DevNet Certifications
    5m
  • 3. DevNet Sandbox
    6m
  • 4. DevNet Sandbox LABS
    8m
  • 5. Sandbox LAB Access - Reservations
    3m

Cisco DNA Center

  • 1. Cisco DNA Center
    16m
  • 2. DNA Center Appliance
    4m
  • 3. DNA Center- What can do - PART 1
    11m
  • 4. DNA Center- What can do - PART 2
    13m

Web Service API - REST API

  • 1. Web Service API
    8m
  • 2. Web Service API - Commonly Used
    8m
  • 3. REST API
    8m

Network Automation Tools

  • 1. Config Management Tools
    6m
  • 2. Config Management Tools - Capabilities
    9m
  • 3. Master-Agent
    6m
  • 4. Agent Based vs Agentless
    7m
  • 5. Push-Pull Model
    10m
  • 6. Configuration Files
    5m

PUPPET - Config MGMT Tool

  • 1. PUPPET - Config MGMT Tool
    3m
  • 2. PUPPET-Master Agent Database
    3m
  • 3. PUPPET - Manifest
    5m
  • 4. PUPPET-Module-Forge
    6m
  • 5. PUPPET-Agent- Agentless
    3m
  • 6. PUPPET-PULL Model Steps
    4m

CHEF- Config MGMT Tool

  • 1. CHEF- Config MGMT Tool
    6m
  • 2. CHEF- Terminology
    7m

ANSIBLE- COnfig MGMT Tool

  • 1. ANSIBLE- COnfig MGMT Tool
    8m
  • 2. ANSIBLE- Control Station
    3m
  • 3. ANSIBLE- PlayBook-Inventory
    5m
  • 4. ANSIBLE- Templates-Variables
    7m

JSON Data Encoding

  • 1. API Data Formats
    8m
  • 2. JSON Overview
    8m
  • 3. JSON Data Types
    7m
  • 4. JSON Syntax Rules
    3m
  • 5. JSON Data Interpretation
    7m
Study4Pass does not provide real Microsoft exam questions. Similarly, Study4Pass does not supply real Amazon exam questions. The materials offered by Study4Pass lack real questions and answers from Cisco's certification exams. The CFA Institute neither endorses nor assures the accuracy or quality of Study4Pass content. CFA® and Chartered Financial Analyst® are registered trademarks held by the CFA Institute.

© study4pass.com 2025. All rights reserved.