The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.
The Implementing Secure Solutions with Virtual Private Networks (SVPN) course focuses on implementing secure remote communications with Virtual Private Network (VPN) solutions, including secure communications, architectures, and troubleshooting on Cisco ASAs and Cisco IOS Routers.
The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SVPN. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
Instructor(s):Shane Sexton
Shane Sexton is a cybersecurity-focused instructor with a hunger for using technology to combat real-world challenges. He holds many professional IT certifications such as Citrix CCA, CompTIA A+, CompTIA Security+, CompTIA Linux+, CompTIA CySA+, ITIL Foundations, Cisco CCNA, AWS SysOps, and Cisco CCNP Security. Shane's extensive professional expertise includes Citrix Virtualization, Citrix Virtualization, Computer Hardware support, Cisco networking, Cybersecurity Blue Team, Cybersecurity Red Team, Cisco security, Amazon AWS, and ITIL. Inside the classroom, Shane makes the complicated seem approachable. Outside the classroom, Shane is a mad scientist with automation, coding, and scripting, tying them back to technologies he teaches in class. If he isn't watching the latest SpaceX launch, he can usually be found tinkering with something.
Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online.
Hide Syllabus
Lesson 1
- Security Foundations
- Attacks against on-premises and cloud resources
- Common security vulnerabilities
- Cryptography concepts and applications
- Managing Cisco security devices via application programming interfaces (APIs)
- Implementing Security
- Security in common cloud environments
- Division of responsibility (shared responsibility model)
- DevSecOps, continuous integration, and orchestration
- Cloud Concepts and Security
- Configuring and Verifying VLANs
- Configuring and Verifying Trunks
- VLAN Trunking Protocol (VTP)
- STP Overview and Algorithm Deep Dive
- STP Convergence, Configuration and Manipulation
- STP PortFast, and BPDU Guard
- Multiple Spanning Tree Protocol (MSTP)
- EtherChannels
- Inter-VLAN Routing
- First-Hop Redundancy Protocol (FHRP)
- Application-Specific Security Tools
- Email Security Appliance (ESA)
- Web Security Appliance (WSA)
- Cloud Email Security (CES)
- Securing DNS with Cisco Umbrella
- Securing Endpoints
- Antimalware concepts
- Mobile device management (MDM)
- Multifactor authentication (MFA)
- Network access control
- Patch management
- Network Access Control and Visibility
- 802.1x, WebAuth, and MAB
- Network visibility and evasion techniques
- Cisco network analytics technologies
- Introduction to VPN Technologies
- Site-to-site and remote access VPNs
- Cryptography concepts
- Public Key Infrastructure (PKI)
- IPsec Concepts
- IKEv1 and IKEv2
- AH and ESP
- VPN Configuration
- Traditional crypto map IPsec configuration
- VTI configuration
- Configuring and troubleshooting DMVPN
- Deploying and troubleshooting FlexVPN
- Remote Access VPN Configuration
- SSL concepts
- Clientless AnyConnect deployments
- Client-based AnyConnect deployments
- Extended functionality with plugins
- Local, remote, and two-factor authentication
- Host scan and posture assessment
- AnyConnect troubleshooting
Hide Syllabus