Implementing and Operating Cisco Security Core Technologies

Course Code: SCOR-G1

Duration: 5 days


Implementing and Operating Cisco Security Core Technologies Course Overview

The Implementing and Operating Cisco Security Core Technologies (SCOR) course helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility and enforcements. You will get extensive hands-on experience deploying Cisco Firepower Next-Generation Firewall and Cisco ASA Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch Enterprise and Cisco Stealthwatch Cloud threat detection features.

• Please note that this course is a combination of Instructor-Led and Self-Paced Study - 5 days in the classroom and approx 3 days of self study. The self-study content will be provided as part of the digital courseware that you will recieve at the beginning of the course and should be part of your preparation for the exam.

Skills Gained

After completing this course you should be able to:

• Describe information security concepts and strategies within the network

• Describe common TCP/IP, network application, and endpoint attacks

• Describe how various network security technologies work together to guard against attacks

• Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall

• Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance

• Describe and implement web content security features and functions provided by Cisco Web Security Appliance

• Describe Cisco Umbrella security capabilities, deployment models, policy management, and Investigate console

• Introduce VPNs and describe cryptography solutions and algorithms

• Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco IOS VTI-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco FirePower NGFW

• Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and EAP authentication

• Provide basic understanding of endpoint security and describe AMP for Endpoints architecture and basic features

• Examine various defenses on Cisco devices that protect the control and management plane

• Configure and verify Cisco IOS Software Layer 2 and Layer 3 Data Plane Controls

• Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions

• Describe basics of cloud computing and common cloud attacks and how to secure cloud environment

Who will the Course Benefit?

Security individuals who need to be able to implement and operate core security technologies including network security, cloud security, content security, endpoint protection and detection, secure network access, visibility and enforcements.


Attendees should meet the following prerequisites:

• Familiarity with Ethernet and TCP/IP networking

• Working Knowledge of the Windows operating system

• Working Knowledge of Cisco IOS networking and concepts

• Familiarity with basics of networking security concepts

Course Contents

Describing Information Security Concepts (Self-Study)

Information Security Overview

Managing Risk

Vulnerability Assessment

Understanding CVSS

Describing Common TCP/IP Attacks (Self-Study)

Legacy TCP/IP Vulnerabilities

IP Vulnerabilities

ICMP Vulnerabilities

TCP Vulnerabilities

UDP Vulnerabilities

Attack Surface and Attack Vectors

Reconnaissance Attacks

Access Attacks

Man-In-The-Middle Attacks

Denial of Service and Distributed Denial of Service Attacks

Reflection and Amplification Attacks

Spoofing Attacks

DHCP Attacks

Describing Common Network Application Attacks (Self-Study)

Password Attacks

DNS-Based Attacks

DNS Tunneling

Web-Based Attacks

HTTP 302 Cushioning

Command Injections

SQL Injections

Cross-Site Scripting and Request Forgery

Email-Based Attacks

Describing Common Endpoint Attacks (Self-Study)

Buffer Overflow


Reconnaissance Attack

Gaining Access and Control

Gaining Access via Social Engineering

Gaining Access via Web-Based Attacks

Exploit Kits and Rootkits

Privilege Escalation

Post-Exploitation Phase

Angler Exploit Kit

Describing Network Security Technologies

Defense-in-Depth Strategy

Defending Across the Attack Continuum

Network Segmentation and Virtualization Overview

Stateful Firewall Overview

Security Intelligence Overview

Threat Information Standardization

Network-Based Malware Protection Overview

IPS Overview

Next Generation Firewall Overview

Email Content Security Overview

Web Content Security Overview

Threat Analytic Systems Overview

DNS Security Overview

Authentication, Authorization, and Accounting Overview

Identity and Access Management Overview

Virtual Private Network Technology Overview

Network Security Device Form Factors Overview

Deploying Cisco ASA Firewall

Cisco ASA Deployment Types

Cisco ASA Interface Security Levels

Cisco ASA Objects and Object Groups

Network Address Translation

Cisco ASA Interface ACLs

Cisco ASA Global ACLs

Cisco ASA Advanced Access Policies

Cisco ASA High Availability Overview

Deploying Cisco Firepower Next-Generation Firewall

Cisco Firepower NGFW Deployments

Cisco Firepower NGFW Packet Processing and Policies

Cisco Firepower NGFW Objects

Cisco Firepower NGFW NAT

Cisco Firepower NGFW Prefilter Policies

Cisco Firepower NGFW Access Control Policies

Cisco Firepower NGFW Security Intelligence

Cisco Firepower NGFW Discovery Policies

Cisco Firepower NGFW IPS Policies

Cisco Firepower NGFW Malware and File Policies

Deploying Email Content Security

Cisco Email Content Security Overview

SMTP Overview

Email Pipeline Overview

Public and Private Listeners

Host Access Table Overview

Recipient Access Table Overview

Mail Policies Overview

Protection Against Spam and Graymail

Anti-virus and Anti-malware Protection

Outbreak Filters

Content Filters

Data Loss Prevention

Email Encryption

Deploying Web Content Security

Cisco WSA Overview

Deployment Options

Network Users Authentication

HTTPS Traffic Decryption

Access Policies and Identification Profiles

Acceptable Use Controls Settings

Anti-Malware Protection

Deploying Cisco Umbrella (Self-Study)

Cisco Umbrella Architecture

Deploying Cisco Umbrella

Cisco Umbrella Roaming Client

Managing Cisco Umbrella

Cisco Umbrella Investigate Overview

Explaining VPN Technologies and Cryptography

VPN Definition

VPN Types

Secure Communication and Cryptographic Services

Keys in Cryptography

Public Key Infrastructure

Introducing Cisco Secure Site-to-Site VPN Solutions

Site-to-Site VPN Topologies

IPsec VPN Overview

IPsec Static Crypto Maps

IPsec Static Virtual Tunnel Interface

Dynamic Multipoint VPN

Cisco IOS FlexVPN

Deploying Cisco IOS VTI-Based Point-to-Point

Cisco IOS VTIs

Static VTI Point-to-Point IPsec IKEv2 VPN Configuration

Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW

Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW

Cisco ASA Point-to-Point VPN Configuration

Cisco Firepower NGFW Point-to-Point VPN Configuration

Introducing Cisco Secure Remote Access VPN Solutions

Remote Access VPN Components

Remote Access VPN Technologies

SSL Overview

Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW

Remote Access Configuration Concepts

Connection Profiles

Group Policies

Cisco ASA Remote Access VPN Configuration

Cisco Firepower NGFW Remote Access VPN Configuration

Explaining Cisco Secure Network Access Solutions

Cisco Secure Network Access

Cisco Secure Network Access Components

AAA Role in Cisco Secure Network Access Solution

Cisco Identity Services Engine

Cisco TrustSec

Describing 802.1X Authentication

802.1X and EAP

EAP Methods

Role of RADIUS in 802.1X Communications

RADIUS Change of Authorization

Configuring 802.1X Authentication

Cisco Catalyst Switch 802.1X Configuration

Cisco WLC 802.1X Configuration

Cisco ISE 802.1X Configuration

Supplicant 802.1x Configuration

Cisco Central Web Authentication

Describing Endpoint Security Technologies (Self-Study)

Host-Based Personal Firewall

Host-Based Anti-Virus

Host-Based Intrusion Prevention System

Application Whitelists and Blacklists

Host-Based Malware Protection

Sandboxing Overview

File Integrity Checking

Deploying Cisco AMP for Endpoints (Self-study)

Cisco AMP for Endpoints Architecture

Cisco AMP for Endpoints Engines

Retrospective Security with Cisco AMP

Cisco AMP Device and File Trajectory

Managing Cisco AMP for Endpoints

Introducing Network Infrastructure Protection (Self-Study)

Identifying Network Device Planes

Control Plane Security Controls

Management Plane Security Controls

Network Telemetry

Layer 2 Data Plane Security Controls

Layer 3 Data Plane Security Controls

Deploying Control Plane Security Controls (Self-Study)

Infrastructure ACLs

Control Plane Policing

Control Plane Protection

Routing Protocol Security

Deploying Layer 2 Data Plane Security Controls (Self-Study)

Overview of Layer 2 Data Plane Security Controls

VLAN-Based Attacks Mitigation

STP Attacks Mitigation

Port Security

Private VLANs

DHCP Snooping

ARP Inspection

Storm Control

MACsec Encryption

Deploying Layer 3 Data Plane Security Controls (Self-Study)

Infrastructure Antispoofing ACLs

Unicast Reverse Path Forwarding

IP Source Guard


Configure Network Settings And NAT On Cisco ASA

Configure Cisco ASA Access Control Policies

Configure Cisco Firepower NGFW NAT

Configure Cisco Firepower NGFW Access Control Policy

Configure Cisco Firepower NGFW Discovery and IPS Policy

Configure Cisco NGFW Malware and File Policy

Configure Listener, HAT, and RAT on Cisco ESA

Configure Mail Policies

Configure Proxy Services, Authentication, and HTTPS Decryption

Enforce Acceptable Use Control and Malware Protection

Examine the Umbrella Dashboard

Examine Cisco Umbrella Investigate

Explore DNS Ransomware Protection by Cisco Umbrella

Configure Static VTI Point-to-Point IPsec IKEv2 Tunnel

Configure Point-to-Point VPN between the Cisco ASA and Cisco Firepower NGFW

Configure Remote Access VPN on the Cisco Firepower NGFW

Explore Cisco AMP for Endpoints

Perform Endpoint Analysis Using AMP for Endpoints Console

Explore File Ransomware Protection by Cisco AMP for Endpoints Console

Explore Cisco Stealthwatch Enterprise v6.9.3

Explore CTA in Stealthwatch Enterprise v7.0

Explore the Cisco Cloudlock Dashboard and User Security

Explore Cisco Cloudlock Application and Data Security

Explore Cisco Stealthwatch Cloud

Explore Stealthwatch Cloud Alert Settings, Watchlists, and Sensors  

Public Scheduled Events

Classroom & Live Virtual Instructor-Led Training

Duration: 5 days

Price: £2,995.00 exc. VAT 

Start Date Options Spaces  
08 Nov 2021 StayAhead Classroom Courses available  Spaces Book Now 
Start Date Options Spaces  
23 Aug 2021 StayAhead Classroom Courses available  Spaces Book Now 
27 Sep 2021 StayAhead Classroom Courses available  Spaces Book Now 

Live Virtual Classroom

Join live instructor-led classroom training from the comfort of your home or office.
All the convenience and benefits of the classroom experience without the hassle and costs of travel and accommodation.

Our Customers Include

missing image
missing image
missing image
missing image
missing image
missing image
missing image
missing image
missing image
missing image
missing image
missing image
missing image
missing image
missing image
missing image
missing image
missing image
missing image
missing image
missing image
missing image
missing image
missing image

Our Course Curriculum

Facebook LinkedIn Twitter Instagram E-Mail
+44 (0)20 7600 6116
Copyright © 2021 StayAhead Training Ltd
Cookies   /   Privacy Policy