Implementing and Operating Cisco Security Core Technologies (SCOR)
placeUtrecht 13 apr. 2026 tot 17 apr. 2026Toon rooster event 13 april 2026, 09:00-17:00, Utrecht event 14 april 2026, 09:00-17:00, Utrecht event 15 april 2026, 09:00-17:00, Utrecht event 16 april 2026, 09:00-17:00, Utrecht event 17 april 2026, 09:00-17:00, Utrecht |
placeUtrecht 6 jul. 2026 tot 10 jul. 2026Toon rooster event 6 juli 2026, 09:00-17:00, Utrecht event 7 juli 2026, 09:00-17:00, Utrecht event 8 juli 2026, 09:00-17:00, Utrecht event 9 juli 2026, 09:00-17:00, Utrecht event 10 juli 2026, 09:00-17:00, Utrecht |
placeUtrecht 5 okt. 2026 tot 9 okt. 2026Toon rooster event 5 oktober 2026, 09:00-17:00, Utrecht event 6 oktober 2026, 09:00-17:00, Utrecht event 7 oktober 2026, 09:00-17:00, Utrecht event 8 oktober 2026, 09:00-17:00, Utrecht event 9 oktober 2026, 09:00-17:00, Utrecht |
The Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 course helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and for senior-level security ro...
- Describing Information Security Concepts*
- Describing Common TCP/IP Attacks*
- Describing Common Network Application Attacks*
- Describing Common Endpoint Attacks*
- Describing Network Security Technologies
- Deploying Cisco ASA Firewall
- Deploying Cisco Firepower Next-Generation Firewall
- Deploying Email Content Security
- Deploying Web Content Security
- Deploying Cisco Umbrella*
- Explaining VPN Technologies and Cryptography
- Introducing Cisco Secure Site-to-Site VPN Solutions
- Deploy…
Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.
The Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 course helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and for senior-level security ro...
- Describing Information Security Concepts*
- Describing Common TCP/IP Attacks*
- Describing Common Network Application Attacks*
- Describing Common Endpoint Attacks*
- Describing Network Security Technologies
- Deploying Cisco ASA Firewall
- Deploying Cisco Firepower Next-Generation Firewall
- Deploying Email Content Security
- Deploying Web Content Security
- Deploying Cisco Umbrella*
- Explaining VPN Technologies and Cryptography
- Introducing Cisco Secure Site-to-Site VPN Solutions
- Deploying Cisco IOS VTI-Based Point-to-Point
- Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco
Firepower NGFW
- Introducing Cisco Secure Remote Access VPN Solutions
- Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco
Firepower NGFW
- Explaining Cisco Secure Network Access Solutions
- Describing 802.1X Authentication
- Configuring 802.1X Authentication
- Describing Endpoint Security Technologies*
- Deploying Cisco AMP for Endpoints*
- Introducing Network Infrastructure Protection*
- Deploying Control Plane Security Controls*
- Deploying Layer 2 Data Plane Security Controls*
- Deploying Layer 3 Data Plane Security Controls*
* This section is self-study material that can be...
After taking this course, you should be able to:
- Describe information security concepts and strategies within the
network
- Describe common TCP/IP, network application, and endpoint
attacks
- Describe how various network security technologies work together
to guard against attacks
- Implement access control on Cisco ASA appliance and Cisco
Firepower Next-Generation Firewall
- Describe and implement basic email content security features and
functions provided by Cisco Email Security Applia...
- Security Engineer
- Network Engineer
- Network Designer
- Network Administrator
- Systems Engineer
- Consulting Systems Engineer
- Technical Solutions Architect
- Cisco Integrators/Partners
- Network Manager
- Cisco integrators and partners
Describing Information Security Concepts*
- Information Security Overview
- Managing Risk
- Vulnerability Assessment
- Understanding CVSS
Describing Common TCP/IP Attacks*
- Legacy TCP/IP Vulnerabilities
- IP Vulnerabilities
- ICMP Vulnerabilities
- TCP Vulnerabilities
- UDP Vulnerabilities
- Attack Surface and Attack Vectors
- Reconnaissance Attacks
- Access Attacks
- Man-In-The-Middle Attacks
- Denial of Service and Distributed Denial of Service Attacks
- Reflection and Amplification At...
Fast Lane werkt met Nederlandse trainers die didactische vaardigheden combineren met veel practische ervaring.
Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.
