McAfee-Secured Website

Course name Cisco 350-701: Implementing and Operating Cisco Security Core Technologies

Corresponding Certifications: CCIE Security, CCNP Security

350-701 Video Course

350-701 Video Course is developed by Cisco Professionals to help you pass the 350-701 exam.

You Will Learn:

Was 43.99 USD
Now 39.99 USD

Description

This course will improve your knowledge and skills required to pass Implementing and Operating Cisco Security Core Technologies exam.

Curriculum For This Course

  • 1. Cisco Certifications - CCNP SCOR 6 Videos 00:24:00
    • Cisco Certification Updates - FEB 2020 11:00
    • Cisco Re-Certifications 1:00
    • CCNP Certifications 1:00
    • CCIE Certifications 2:00
    • Cisco Certification Migration Options 6:00
    • CCNP Required Exams 3:00
  • 2. Security Core - 350-701 3 Videos 00:15:00
    • CCNP Security Certifications 7:00
    • CCNP SCOR - 350-701 1:00
    • SCOR 350-701 Contents 7:00
  • 3. Network Security Concepts 7 Videos 00:47:00
    • Network Security Terminology 6:00
    • Goals of Network Security 10:00
    • Threat Types - Mitigation 9:00
    • Assets - Classification of Assets 6:00
    • Classify Counter Measures 4:00
    • Classify Vulnerabilities 2:00
    • Network Security - Design Principles 10:00
  • 4. Common Security Attacks - Mitigation 15 Videos 00:54:00
    • Motivations behind Network Attacks 3:00
    • Social Engineering Attacks 4:00
    • Phishing Attacks 4:00
    • Social Engineering Attacks 4:00
    • Denial of Service Attacks - DoS 5:00
    • Distributed Denial of Service Attakcs - DDoS 4:00
    • Spoofing Attacks 4:00
    • Spoofing Attacks - Mitigation 4:00
    • Man in the Middle Attacks -MiTM 2:00
    • Password Attacks 5:00
    • Password Attacks - Mitigation 4:00
    • Reflector Attacks 2:00
    • Amplification Attacks 2:00
    • Reconnaissance Attacks 5:00
    • Reconnaissance Attacks - Mitigation 2:00
  • 5. Malicious Codes - Hacking 6 Videos 00:07:00
    • Malicious Codes - VIRUS 2:00
    • Malicious Codes - WORMS 1:00
    • Malicious Codes - TROJAN HORSES 1:00
    • Hacking 1:00
    • Hackers - Script Kiddies 1:00
    • Malware Service - DARKNET 1:00
  • 6. Threat Defense Technologies 6 Videos 00:37:00
    • AAA - Network Security 11:00
    • Cisco Telemetry Services 4:00
    • Firewall 8:00
    • Intrusion Prevention System - IPS 4:00
    • Virtual Private Networks 4:00
    • Next Generation Firewalls 6:00
  • 7. Virtual Labs - GNS3 Setup 11 Videos 01:07:00
    • Cisco Lab Options 8:00
    • About GNS3 4:00
    • Installing GNS3 - Windows 7:00
    • GNS3 - IOS Images 6:00
    • Default Topology - GNS3 - IOS initial Configs 5:00
    • IOS Default Topology 9:00
    • GNS3 Topology-HOST Computer 6:00
    • GNS3 - VMware Setup 9:00
    • GNS3 - IOSv L2-L3 6:00
    • GNS3 - ASAv Setup 4:00
    • GNS3 - IOU-L2-L3 3:00
  • 8. Network Infrastructure Protection 5 Videos 00:19:00
    • Network Infrastructure Protection 5:00
    • Identify Network Device Planes 2:00
    • Data Plane 6:00
    • Control Plane 3:00
    • Management Plane 3:00
  • 9. Remote Management- TELNET - SSH 3 Videos 00:22:00
    • Inband Vs OutBand Management 7:00
    • Remote Access - TELNET 6:00
    • Remote Access - SSH 9:00
  • 10. Cisco Telemetry Services 6 Videos 00:41:00
    • Cisco Telemetry Services 4:00
    • Device- Network Events Logging 10:00
    • Syslog - Terminal Logging 7:00
    • Network Time Protocol 7:00
    • NTP Stratum Value 4:00
    • NTP Configuration - LAB 9:00
  • 11. Control Plane Security 5 Videos 00:45:00
    • Control Plane Security - Possible Threats 9:00
    • Routing Protocol Authentication 12:00
    • Control Plane Policing - CoPP 7:00
    • Class-Map - Policy Map - Hierarchy 5:00
    • CoPP - Configuration Examples 12:00
  • 12. L2-Security Basic 8 Videos 00:41:00
    • Switch Security - Overview 2:00
    • Disable Unused Ports 1:00
    • Dynamic Trunking Protocol - DTP 8:00
    • DTP Vulnerabilities - Mitigation 2:00
    • VLAN Hopping Attacks - Mitigation 5:00
    • Cisco Discovery Protocol - CDP 18:00
    • Link Layer Discovery Protocol - LLDP 3:00
    • CDP- LLDP Vulnerabilities - Mitigation 2:00
  • 13. L2-Security Advanced 14 Videos 02:12:00
    • MAC Flooding Attack - Port Security 12:00
    • MAC Spoofing Attack - Port Security 7:00
    • Port Security - Configuration 11:00
    • Spanning Tree Port Fast 7:00
    • Native VLAN 8:00
    • DHCP Spoofing Attack - DHCP Spoofing 8:00
    • DHCP Snooping - Configuration 16:00
    • DHCP Starvation Attack - Mitigation 2:00
    • ARP Spoofing Attack - DAI 12:00
    • Dynamic ARP Inspection - Configuration 12:00
    • Protected Ports- Private VLAN Edge 3:00
    • Private VLAN 9:00
    • Private VLAN - Configuration 5:00
    • Private VLAN - LAB 20:00
  • 14. Firewalls 6 Videos 00:37:00
    • What is Firewall 8:00
    • Statefull Packet Filtering 8:00
    • Stateless Packet Filtering 4:00
    • Application Level Gateways - Proxy Servers 5:00
    • Next Generation Firewalls 6:00
    • FIrewall Vendors in Market 6:00
  • 15. Cisco ASA Firewall 4 Videos 00:30:00
    • Cisco Statefull Firewalls - IOS - ASA 3:00
    • ASA Supported Features _ PART1 9:00
    • ASA Supported Features _ PART2 11:00
    • ASS Compare Models 7:00
  • 16. Cisco ASA Configuration 6 Videos 00:38:00
    • Manage Cisco CLI - ASA - GUI 3:00
    • Basic CLI Modes - Commands 4:00
    • ASA Security Levels 10:00
    • ASA Interface Configurations 5:00
    • ASA Security Policies - Default 11:00
    • ASA Routing 5:00
  • 17. ASA ACLs - Object Groups 5 Videos 00:41:00
    • ASA ACls - Overview 9:00
    • ASA ACLS - Basic Example 7:00
    • Traffic Between Same Security Levels 3:00
    • ACL Object Groups 10:00
    • ACL Object Groups - LAB 12:00
  • 18. ASA _ Network Address Translation (NAT) 9 Videos 00:59:00
    • PRivate IP - Public IP 5:00
    • What is NAT ? 3:00
    • NAT Types 6:00
    • Dynamic NAT - on ASA 10:00
    • Dynamic PAT- ASA 5:00
    • Dynamic PAT - with Exit interface 5:00
    • Dynamic NAT-PAT Combination 2:00
    • Static NAT - ASA 12:00
    • Static PAT- ASA 11:00
  • 19. IOS - Zone Based Firewall 8 Videos 00:40:00
    • IOS - Zone Based Firewall 3:00
    • ZBF - Configuration Overview 4:00
    • ZBF - Security Zones 3:00
    • ZBF - Default Flow 3:00
    • Class-Map - Policy Map - Hierarchy 5:00
    • ZBF - Classify Traffic using Class-Maps 6:00
    • ZBF- Class-map Configuration 5:00
    • ZBF - POlicy Map - Zone Pairs 11:00
  • 20. Cryptography 9 Videos 00:29:00
    • What is Cryptography 3:00
    • Goals of Cryptography 3:00
    • Hashing-How it Works 3:00
    • Hashing with HMAC 3:00
    • What is Encryption - Decryption 1:00
    • Encryption Algorithms - Symmetric vs Assymetric 5:00
    • Cryptanalysis - Attacks 4:00
    • Asymmetric Encryption - Drawbacks 3:00
    • Public Key Infrastructure - PKI 4:00
  • 21. VPN foundations 4 Videos 00:15:00
    • Virutal Private Network - Introduction 5:00
    • VPN Types - Site to Site / Remote Access 4:00
    • VPN Logical Topologies 1:00
    • VPN Default Lab Setup - Routers 5:00
  • 22. IPSec - IP Protocol Security 3 Videos 00:15:00
    • What is IPSec ? 3:00
    • IPsec Security Services 7:00
    • IPSec Modes - Tunnel vs Transport 5:00
  • 23. Site to Site IPSEC VPN 5 Videos 00:32:00
    • How IPsec VPN Works 5:00
    • Step-1 - Interesting Traffic 3:00
    • Step-2 IKE Phase-1 8:00
    • Step-3 - IKE Phase 2 9:00
    • IKE Phase 2 - Configuration/ Verification 7:00
  • 24. Remote Access VPN 5 Videos 00:24:00
    • Remote Access VPN 3:00
    • What is SSL-TLS 3:00
    • How SSL-TLS Works 8:00
    • What is SSL VPN 4:00
    • SSL VPN - Modes 6:00
  • 25. Authentication, Authorization, Accounting - AAA 4 Videos 00:27:00
    • AAA - Network Security 11:00
    • AAA - Components 4:00
    • AAA Protocols - TACACS - RADIUS 8:00
    • AAA- Cisco Authentication Servers 4:00
  • 26. AAA Authentication 4 Videos 00:28:00
    • AAA Authentication - Device Access 3:00
    • Authentication Local database 10:00
    • AAA External Servers 3:00
    • Authentication - External server (TACACS) 12:00
  • 27. AAA Authorization 10 Videos 01:06:00
    • Authorization - Device Access 3:00
    • IOS Privilege Levels 9:00
    • Local Authorization using Privilege Levels 14:00
    • IOS Privilege Levels _ Limitations 5:00
    • Role based CLI Access - RBAC 6:00
    • RBAC Views - Types 4:00
    • RBAC Views - LAB1 10:00
    • Modify RBAC Views - LAB 2 4:00
    • Modify RBAC Views - LAB 3 6:00
    • RBAC - Super Views 5:00
  • 28. WEb Traffic - Attacks- Solutions 4 Videos 00:24:00
    • Web Access - Possible Threats 4:00
    • Web Based Attacks- 5:00
    • Web Attack Examples 10:00
    • Web Security Solutions 5:00
  • 29. CIsco Web Security Appliance - WSA 6 Videos 00:37:00
    • Cisco Web Security - WSA-CWS 5:00
    • What is WSA ? 9:00
    • WSA- HOw it Works 5:00
    • WSA Deployment Modes 6:00
    • WSA models - Physical -Virtual Appliance 5:00
    • WSA Licensing Options 7:00
  • 30. Email Security _ ESA 2 Videos 00:05:00
    • Email Based Threats 2:00
    • Cisco Email Security Appliance - ESA 3:00
  • 31. Intrusion Prevention System - IPS 9 Videos 00:38:00
    • Intrusion Prevention System - IPS 3:00
    • IDS vs IPS 2:00
    • Host Based IPS vs Network Based IPS 6:00
    • IPS Deployment Modes - INline vs Promiscious 3:00
    • Cisco IPS Solutions 5:00
    • IPS Threat Detection Methods 7:00
    • IPS Signature Alarm Types 3:00
    • IPS Signature Actions 3:00
    • IPS Evasion Methods - CounterMeasures 6:00
  • 32. Network Management 4 Videos 00:47:00
    • What is Network Management 8:00
    • Past-Present Methods of Network Mangement- PART 1 14:00
    • Past-Present Methods of Network Mangement- PART 2 7:00
    • SNMP- Simple Network Mangement Protocol 18:00
  • 33. Network Automation 6 Videos 01:02:00
    • Challenges - Traditional Management 11:00
    • Network Automation - Goals 16:00
    • Types of Network Automation 6:00
    • What can be Automated - PART 1 12:00
    • What can be Automated - PART 2 9:00
    • Impact of Network Automation 8:00
  • 34. SDN & SDN Controllers 4 Videos 00:45:00
    • Automation Origination Points 8:00
    • SDN - Software Defined Networking 15:00
    • SDN Controllers 9:00
    • Networks Managed by SDN Controllers 13:00
  • 35. SDN-Control-MGMT-DATA Plane 3 Videos 00:16:00
    • Management Plane 3:00
    • SDN-Management Plane 7:00
    • SDN-Control Plane - Data Plane 6:00
  • 36. SDN Models - Architecture 6 Videos 00:41:00
    • SDN - Imperative Model 5:00
    • SDN - Declarative Model 7:00
    • SDN - Network Design Requirments 9:00
    • UNderlaY Networks 7:00
    • Overlay Networks 7:00
    • SDN Fabric 6:00
  • 37. Application Programming Interface - API 5 Videos 00:41:00
    • Application Programming Interface - API 11:00
    • API Types 4:00
    • API - With SDN Networks 9:00
    • NorthBound API 9:00
    • SouthBound API 8:00
  • 38. Cisco DEVNET - SANDBOXs 5 Videos 00:27:00
    • Cisco DevNet 5:00
    • DevNet Certifications 5:00
    • DevNet Sandbox 6:00
    • DevNet Sandbox LABS 8:00
    • Sandbox LAB Access - Reservations 3:00
  • 39. Cisco DNA Center 4 Videos 00:44:00
    • Cisco DNA Center 16:00
    • DNA Center Appliance 4:00
    • DNA Center- What can do - PART 1 11:00
    • DNA Center- What can do - PART 2 13:00
  • 40. Web Service API - REST API 3 Videos 00:24:00
    • Web Service API 8:00
    • Web Service API - Commonly Used 8:00
    • REST API 8:00
  • 41. Network Automation Tools 6 Videos 00:43:00
    • Config Management Tools 6:00
    • Config Management Tools - Capabilities 9:00
    • Master-Agent 6:00
    • Agent Based vs Agentless 7:00
    • Push-Pull Model 10:00
    • Configuration Files 5:00
  • 42. PUPPET - Config MGMT Tool 6 Videos 00:24:00
    • PUPPET - Config MGMT Tool 3:00
    • PUPPET-Master Agent Database 3:00
    • PUPPET - Manifest 5:00
    • PUPPET-Module-Forge 6:00
    • PUPPET-Agent- Agentless 3:00
    • PUPPET-PULL Model Steps 4:00
  • 43. CHEF- Config MGMT Tool 2 Videos 00:13:00
    • CHEF- Config MGMT Tool 6:00
    • CHEF- Terminology 7:00
  • 44. ANSIBLE- COnfig MGMT Tool 4 Videos 00:23:00
    • ANSIBLE- COnfig MGMT Tool 8:00
    • ANSIBLE- Control Station 3:00
    • ANSIBLE- PlayBook-Inventory 5:00
    • ANSIBLE- Templates-Variables 7:00
  • 45. JSON Data Encoding 5 Videos 00:33:00
    • API Data Formats 8:00
    • JSON Overview 8:00
    • JSON Data Types 7:00
    • JSON Syntax Rules 3:00
    • JSON Data Interpretation 7:00