This training prepares you for the 350-701 SCOR v1.1 exam. If passed, you earn the Cisco Certified Specialist - Security Core certification and satisfy the core exam requirement for the Cisco Certified Network Professional (CCNP) Security and Cisco Certified Internetwork Expert (CCIE) Security certifications. This training also earns you 64 Continuing Education (CE) credits towards recertification.
Please note that this course lab access is extended for 1 week following the ILT session, for students to complete all additional self-study lab exercises. How You'll Benefit
This training will help you:
Gain hands-on experience implementing core security technologies and learn best practices using Cisco security solutions
Qualify for professional and expert-level security job roles
Prepare for the 350-701 SCOR v1.1 exam
Earn 64 CE credits towards recertification
What to Expect in the Exam
Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) v1.1 is a 120-minute exam associated with the Cisco Certified Specialist - Security Core certification and satisfies the core exam requirement for the CCNP Security and CCIE Security certifications.
This exam tests your knowledge of implementing and operating core security technologies, including:
Network security
Cloud security
Content security
Endpoint protection and detection
Secure network access
Visibility and enforcement
Live Lab:
Please note that this course lab access is extended for 1 week following the ILT session, for students to complete all additional self-study lab exercises.
Configure Network Settings and NAT on Cisco Secure Firewall ASA
Configure Cisco Secure Firewall ASA Access Control Policies
Configure Cisco Secure Firewall Threat Defense NAT
Configure Cisco Secure Firewall Threat Defense Access Control Policy
Configure Cisco Secure Firewall Threat Defense Discovery and IPS Policy
Configure Cisco Secure Firewall Threat Defense Malware and File Policy
Configure Listener, HAT, and RAT on Cisco Email Secure Email Gateway
Configure Cisco Secure Email Policies
Configure Proxy Services, Authentication, and HTTPS Decryption
Enforce Acceptable Use Control and Malware Protection
Configure Static VTI Point-to-Point IPsec IKEv2 Tunnel
Configure Point-to-Point VPN between Cisco Secure Firewall Threat Defense Devices
Configure Remote Access VPN on the Cisco Secure Firewall Threat Defense
Examine Cisco Umbrella Dashboard and DNS Security
Examine Cisco Umbrella Secure Web Gateway and Cloud-Delivered Firewall
Explore Cisco Umbrella CASB Funtionalities
Explore Cisco Secure Endpoint
Perform Endpoint Analysis Using Cisco Secure Endpoint Console
Explore File Ransomware Protection by Cisco Secure Endpoint Console
Explore Secure Network Analytics v7.4.2
Explore Global Threat Alerts Integration and ETA Cryptographic Audit
Explore Cloud Analytics Dashboard and Operations
Explore Secure Cloud Private and Public Cloud Monitoring

