Cisco Security: Cisco SCOR Expert

https://www.skillsoft.com/channel/cisco-security-d9ed8870-e251-11e6-91a7-0242c0a80704?technologyandversion=63001&expertiselevel=63013 https://www.skillsoft.com/channel/cisco-security-d9ed8870-e251-11e6-91a7-0242c0a80704?technologyandversion=63002&expertiselevel=63009 https://www.skillsoft.com/channel/cisco-security-d9ed8870-e251-11e6-91a7-0242c0a80704?technologyandversion=63003&expertiselevel=63009 https://www.skillsoft.com/channel/cisco-security-d9ed8870-e251-11e6-91a7-0242c0a80704?technologyandversion=63004&expertiselevel=63013 https://www.skillsoft.com/channel/cisco-security-d9ed8870-e251-11e6-91a7-0242c0a80704?technologyandversion=63005&expertiselevel=63009 https://www.skillsoft.com/channel/cisco-security-d9ed8870-e251-11e6-91a7-0242c0a80704?technologyandversion=63006&expertiselevel=63013 https://www.skillsoft.com/channel/cisco-security-d9ed8870-e251-11e6-91a7-0242c0a80704?technologyandversion=63007&expertiselevel=63009 https://www.skillsoft.com/channel/cisco-security-d9ed8870-e251-11e6-91a7-0242c0a80704?technologyandversion=63008&expertiselevel=63013 https://www.skillsoft.com/channel/cisco-security-d9ed8870-e251-11e6-91a7-0242c0a80704?technologyandversion=63010&expertiselevel=63013 https://www.skillsoft.com/channel/cisco-security-d9ed8870-e251-11e6-91a7-0242c0a80704?technologyandversion=63011&expertiselevel=63013 https://www.skillsoft.com/channel/cisco-security-d9ed8870-e251-11e6-91a7-0242c0a80704?technologyandversion=63012&expertiselevel=63013
  • 2 Books | 27h 28m
  • 31 Courses | 25h 34m 30s
  • 14 Courses | 13h 54m 59s
  • 4 Books | 43h 23m
  • 21 Courses | 22h 50m 2s
  • 4 Books | 43h 23m
  • 34 Courses | 31h 22m 58s
  • 1 Book | 11h 48m
  • 13 Courses | 11h 26m 33s
  • 2 Books | 27h 28m
  • 10 Courses | 9h 16m 7s
  • 2 Books | 21h 39m
  • 17 Courses | 18h 13m 55s
Likes 130 Likes 130
 
Security is a primary concern of all network administrators. Explore the various security methods, tools, and technologies of Cisco networking.

COURSES INCLUDED

SECFND: Overview & Network Models
Discover the CCNA Cyber Ops exam and explore the OSI network model, in preparation for the 210-250: Understanding Cisco Cybersecurity Fundamentals certification exam.
2 videos | 37m has Assessment available Badge
SECFND: Network Models
Explore more of the OSI network model, some additional network models, and the TCP/IP network model. This course can be used as part of the preparation for the 210-250: Understanding Cisco Cybersecurity Fundamentals certification exam.
2 videos | 51m has Assessment available Badge
SECFND: Basic Networking Protocols
Explore the network protocols that are used within most networks and the Internet, as well as the processes and tools that facilitate communication between network devices. This course can be used as part of the preparation for the 210-250: Understanding Cisco Cybersecurity Fundamentals certification exam.
2 videos | 1h has Assessment available Badge
SECFND: Basic Networking Services
Discover the Address Resolution Protocol (ARP), Domain Name System (DNS), and Dynamic Host Configuration Protocol (DHCP) and how they are used to manage and facilitate communications over a network. This course can be used as part of the preparation for the 210-250: Understanding Cisco Cybersecurity Fundamentals certification exam.
2 videos | 1h 1m has Assessment available Badge
SECFND: Network Devices Operations & Security
Explore the appliances, devices, and software Cisco has available and how they can be used to help solve networking and security issues. This course can be used as part of the preparation for the 210-250: Understanding Cisco Cybersecurity Fundamentals certification exam.
3 videos | 1h 9m has Assessment available Badge
SECFND: Network Addressing
Examine the structure of an IP address, as well as how subnetting works and is used in networks, as you prepare for the 210-250: Understanding Cisco Cybersecurity Fundamentals certification exam.
2 videos | 52m has Assessment available Badge
SECFND: VLANS & Data Visibility
Explore Virtual Local Area Networks and why you may want to use one on your network. Examine a demonstration on a potential security risk and discover tips to help mitigate that risk. This course can be used as part of the preparation for the 210-250: Understanding Cisco Cybersecurity Fundamentals certification exam.
1 video | 28m has Assessment available Badge
SECFND: ACLs & Filtering
Examine access control lists, as well as how to apply packet filtering and block traffic based on IP addresses with a Cisco router. Explore how firewall devices operating at higher OSI levels can perform additional functions. This course can be used as part of the preparation for the 210-250: Understanding Cisco Cybersecurity Fundamentals certification exam.
2 videos | 53m has Assessment available Badge
SECFND: Filtering & Packet Capture
Explore the concept of deep packet inspection, including why you would use it and packet capturing methods, such as inline traffic interrogation. Examine Test Access Points, how these devices copy network traffic, and traffic mirroring. This course can be used as part of the preparation for the 210-250: Understanding Cisco Cybersecurity Fundamentals certification exam.
2 videos | 58m has Assessment available Badge
SECFND: Packet Analysis
Discover how different types of output from packet capturing can be used and analyzed. Examine a demonstration of using Cisco NetFlow and Wireshark to obtain flow information. This course can be used as part of the preparation for the 210-250: Understanding Cisco Cybersecurity Fundamentals certification exam.
2 videos | 48m has Assessment available Badge
SECFND: Data Loss & Defense-in-Depth
Discover the impacts of data loss from security and networking standpoints and analyze data loss using Wireshark. Explore the principles of Defense-in-Depth, including how to set up multiple defenses to act as independent road blocks. This course can be used as part of the preparation for the 210-250: Understanding Cisco Cybersecurity Fundamentals certification exam.
2 videos | 54m has Assessment available Badge
SECFND: Security Concepts
Explore foundational security terms and concepts, including threats, vulnerabilities, and exploits. Chain of custody, reverse engineering, principle of least privilege, and risk scoring, reduction, and assessment are also covered. This course can be used as part of the preparation for the 210-250: Understanding Cisco Cybersecurity Fundamentals certification exam.
2 videos | 56m has Assessment available Badge
SECFND: Security Management Part 1
Explore different access control models, including discretionary, mandatory, and nondiscretionary. Examine industry-standard security concepts, including host-based antivirus, protection types, log collection, and SIEM systems. This course can be used as part of the preparation for the 210-250: Understanding Cisco Cybersecurity Fundamentals certification exam.
2 videos | 48m has Assessment available Badge
SECFND: Security Management Part 2
Take a detailed look at foundational security management concepts and how they are key to maintaining a secure environment. These concepts include asset, configuration, mobile device, patch, and vulnerability management. This course can be used as part of the preparation for the 210-250: Understanding Cisco Cybersecurity Fundamentals certification exam.
1 video | 30m has Assessment available Badge
SECFND: Cryptography
Explore how crypto algorithms are used to help secure data in a digital environment, including the use of hash and encryption algorithms. Discover the differences between symmetric and asymmetric key encryption and when to use each. This course can be used as part of the preparation for the 210-250: Understanding Cisco Cybersecurity Fundamentals certification exam.
2 videos | 54m has Assessment available Badge
SECFND: Digital Signatures
Explore digital signatures and how to create and verify them. Examine public key infrastructure, when to use it, and common implementation designs. The role of cryptographic exchange on security investigations is also covered. This course can be used as part of the preparation for the 210-250: Understanding Cisco Cybersecurity Fundamentals certification exam.
3 videos | 1h 17m has Assessment available Badge
SECFND: SSL/TLS Components
Examine the characteristics and considerations of SSL/TLS and its components. Secure key exchange, protocol versions and considerations, and Public Key Cryptography Standard are also covered. This course can be used as part of the preparation for the 210-250: Understanding Cisco Cybersecurity Fundamentals certification exam.
2 videos | 57m has Assessment available Badge
SECFND: Cryptographic Hashing Algorithms
Discover the security impact of commonly used hash algorithms, characteristics of successful hashing algorithms, and the types of hashing algorithms available. This course can be used as part of the preparation for the 210-250: Understanding Cisco Cybersecurity Fundamentals certification exam.
1 video | 30m has Assessment available Badge
SECFND: Cryptographic Encryption Algorithms
Explore encryption algorithms, their history and characteristics, and the security impacts they have on networks. Examine the recommended minimum security algorithms based on use and how to appropriately choose an algorithm to use. This course can be used as part of the preparation for the 210-250: Understanding Cisco Cybersecurity Fundamentals certification exam.
2 videos | 1h 2m has Assessment available Badge
SECFND: Windows Host Terminology
Explore basic Windows terminology, including processes, threads, handles, services, memory allocation, Windows Registry, and WMI. This course can be used as part of the preparation for the 210-250: Understanding Cisco Cybersecurity Fundamentals certification exam.
1 video | 32m has Assessment available Badge
SECFND: Linux Host Terminology
Examine basic Linux terminology, how to complete basic tasks in a Linux environment, and how to identify problematic or potentially malicious processes on a Linux system. Forks, symlink, daemons, and permissions are also covered. This course can be used as part of the preparation for the 210-250: Understanding Cisco Cybersecurity Fundamentals certification exam.
2 videos | 52m has Assessment available Badge
SECFND: Endpoint Security
Examine endpoint security, its purpose, and the associated risks. Tips for hardening individual endpoints are also provided. This course can be used as part of the preparation for the 210-250: Understanding Cisco Cybersecurity Fundamentals certification exam.
1 video | 31m has Assessment available Badge
SECFND: Interpreting Log Data
Discover the importance of interpreting log data, including how to locate and decipher information. Viewing log info in Windows, Unix, Apache, and Mac systems is covered. This course can be used as part of the preparation for the 210-250: Understanding Cisco Cybersecurity Fundamentals certification exam.
2 videos | 48m has Assessment available Badge
SECFND: Network Data Types
Discover how to examine network traffic in a Linux environment using tcpdump, including tool installation and filter customization. Identifying data types and viewing information to combat malicious email attacks is also covered. This course can be used as part of the preparation for the 210-250: Understanding Cisco Cybersecurity Fundamentals certification exam.
2 videos | 57m has Assessment available Badge
SECFND: Network Data Types & Security Monitoring
Explore data types and how data can be analyzed within networks, using tools such as tcpdump, Wireshark, and NetFlow. Examine how data can be useful as a tool for network security monitoring. This course can be used as part of the preparation for the 210-250: Understanding Cisco Cybersecurity Fundamentals certification exam.
2 videos | 53m has Assessment available Badge
SECFND: Network Monitoring
Examine the importance of monitoring different network components, including how and where to configure an access control list on a router. Network and port address translation, tunneling, traffic types, and load balancing are also covered. This course can be used as part of the preparation for the 210-250: Understanding Cisco Cybersecurity Fundamentals certification exam.
2 videos | 57m has Assessment available Badge
SECFND: Next-Generation IPS Events
Explore events, the information they can provide about your network, and how to use Cisco FireSIGHT to highlight them. Viewing connection, intrusion, host, network discovery, and NetFlow events is also covered. This course can be used as part of the preparation for the 210-250: Understanding Cisco Cybersecurity Fundamentals certification exam.
1 video | 26m has Assessment available Badge
SECFND: Monitoring Network Protocols
Explore the importance of monitoring the protocols being used in your network and the weaknesses protocols can have. Protocols covered include DNS, NTP, SMTP, POP, IMAP, HTTP, and HTTPS. This course can be used as part of the preparation for the 210-250: Understanding Cisco Cybersecurity Fundamentals certification exam.
2 videos | 51m has Assessment available Badge
SECFND: Security Attack Concepts
Explore various security attack concepts, including privilege escalation, social engineering, phishing, evasion methods, and remote and local attacks. Attack surface versus vulnerability is also covered. This course can be used as part of the preparation for the 210-250: Understanding Cisco Cybersecurity Fundamentals certification exam.
1 video | 30m has Assessment available Badge
SECFND: Network & Web Attacks
Strengthen your security skills by familiarizing yourself with various attack styles. Explore DoS, DDoS, Man in the Middle, SQL injection, Cross-Site Scripting, LDAP injection, and directory traversal attacks. This course can be used as part of the preparation for the 210-250: Understanding Cisco Cybersecurity Fundamentals certification exam.
2 videos | 45m has Assessment available Badge
SECFND: Attack & Evasion
Discover how attackers target your networks and evasion methods they may use. Buffer overflow, malware, port scanning, host profiling, encryption and tunneling, resource exhaustion, traffic fragmentation, and pivot attacks are covered. This course can be used as part of the preparation for the 210-250: Understanding Cisco Cybersecurity Fundamentals certification exam.
2 videos | 53m has Assessment available Badge
SHOW MORE
FREE ACCESS

COURSES INCLUDED

CBROPS: The CIA Triad & Security Approaches
For those aspiring or current IT professionals pursuing a job role as an entry or associate-level cybersecurity analyst, or for those pursuing the Cisco Certified CyberOps Associate certification, this course will introduce you to cybersecurity operations in a security operation center. You'll review security concepts, policies, and procedures used by a CyberOps Associate working within a SOC. You'll learn about the CIA triad, a model of implementing security on networks. Next, you'll explore basic models for cybersecurity and various security approaches. Finally, you'll review security terminology you should be familiar with and common security practices and tools for the CyberOps Associate. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
4 videos | 1h 8m has Assessment available Badge
CBROPS: Threat Actors, Security, & Risk Management
In this course, you'll learn about threat actor types and review related examples. You'll then explore commonly confused security concepts - risk, threat, vulnerability, and exploit. Finally, you'll examine risk management concepts, including risk scoring/weighting, risk reduction, and risk assessment. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
3 videos | 56m has Assessment available Badge
CBROPS: CVSS, Deployments, Access Control, & Data Visibility
A SOC data analyst may depend on external data to help with understanding potential attacks against systems. In this course, you'll learn how the CVSS helps and what information it provides to a cybersecurity data analyst. You'll examine the implementation of security methods and how they fit into security design. You'll review how access control is implemented across an organization and some of the available access control models. Finally, it's important to know about network data visibility challenges, so you'll learn what they are and how to deal with them. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
4 videos | 1h 17m has Assessment available Badge
CBROPS: Data Loss, Host Isolation, & Detection Methods
In this course, you'll learn to identify potential data loss indicators noted from a traffic profile. Then, you'll explore the 5-tuple approach for isolating a host. Finally, there are different detection methods that are used when securing networks dynamically. You'll review the similarities between them and how they operate to bring about usable results. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
3 videos | 51m has Assessment available Badge
CBROPS: Attack Surfaces, Vulnerability, & Analysis Tools
There are many things in cybersecurity that sound similar but are not. In this course, you'll learn to distinguish the attack surface from vulnerability. You'll also learn the basics of the tcpdump and NetFlow tools. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operation
2 videos | 30m has Assessment available Badge
CBROPS: Firewall, Filtering, Visibility, & Control Data
A key part of your role as an SOC data analyst is knowing what tool will give you the type of data type you want to analyze. In this course, you'll learn about useful next-gen and stateful firewall data. You'll explore content filtering, as well as web and e-mail content filtering, and why they are useful. Next, you'll review application level visibility and control data. Finally, you'll learn how the use of different technology can cause unexpected data visibility challenges. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
4 videos | 1h 2m has Assessment available Badge
CBROPS: Data & Attack Types
In this course, you'll learn about data types that provide valuable information for security monitoring. You'll explore different network attacks, including protocol-based, DoS, DDoS and MITM attacks. Finally, you'll also look at common web application attacks like SQL injection, command injection, and cross-site scripting. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
3 videos | 52m has Assessment available Badge
CBROPS: Social Engineering, Evasion, Obfuscation, & Certificates
In this course, you'll examine multiple examples of social engineering attacks that you should be familiar with as an analyst. Attacks are not always easily identified, so you'll learn about the different evasion and obfuscation techniques. Finally, you'll learn about the different components of digital certificates and what these components do. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
3 videos | 53m has Assessment available Badge
CBROPS: Host-based Analysis & the Role of Attribution
In this course, you'll learn about host-based attacks in their various forms. Next, you'll explore components of Windows 10 and Ubuntu that are useful in host-based analysis. Finally, you'll examine the concept of attribution and its importance when investigating an organizational security breach. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
4 videos | 1h 9m has Assessment available Badge
CBROPS: Log Evidence, Disk Images, & Malware Analysis Output
In this course, you'll examine the importance of logs, as well as types of evidence that can be acquired from them. Next, you'll learn how critical disk images can be during an investigation and about the comparisons and analysis that can transpire in an investigation. Finally, you'll review some of the most important information that can be found in the out of malware analysis tools. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
3 videos | 51m has Assessment available Badge
CBROPS: Security Events, Firewall Operations, & Traffic Analysis
In this course, you'll learn to categorize intrusion events according to the cyber kill chain and diamond intrusion models. Next, with so many tools available, you'll examine which ones should be used to identify different security events. You'll learn the differences between deep packet inspection, packet filtering, and stateful firewall operations. Finally, you'll review the differences between inline traffic interrogation, taps, and traffic monitoring. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
4 videos | 1h 12m has Assessment available Badge
CBROPS: File Extraction, Event Artifacts, & Regular Expressions
In this course, you'll learn how to extract files from a TCP stream from a PCAP file using Wireshark. Next, you'll explore how to identify intrusion elements from a given pcap file using Wireshark. You'll learn how to interpret common artifacts from events for an alert using the Cisco FMC. Finally, you'll examine how to use basic regular expressions with grep and the Cisco CLI. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
4 videos | 1h 6m has Assessment available Badge
CBROPS: Incident Response, Security Management, & Analysis
In this course, you'll review NIST800-86 to learn basic forensic techniques for incident response. You'll examine management concepts needed to be known and addressed in a security policy. Finally, you'll explore the relationship between metrics and scope analysis in a SOC. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
3 videos | 54m has Assessment available Badge
CBROPS: Protected Data, Profiling, Forensics, & IRP
In this course, you'll learn how to identify protected data in a network, as well as how to identify elements in network and server profiling. You'll explore the use of NIST SP 800-61 to identify forensic elements and how to apply them to the incident handling process. Finally, you'll learn how NIST SP 800-61 guides incident handling and review the elements of an incident response plan. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
4 videos | 1h 7m has Assessment available Badge
SHOW MORE
FREE ACCESS

COURSES INCLUDED

SECOPS: Analyzing Threat Mitigation Reports
Explore the processes involved in Cisco threat mitigation reporting and how to analyze these reports. Discover features of Cisco's AMP ThreadGRID Suite, including dynamic analysis, network file trajectory, and security intelligence events. This course can be used as part of the preparation for the 210-255: Implementing Cisco Cybersecurity Operations certification exam.
4 videos | 1h 31m has Assessment available Badge
SECOPS: Scoring with CVSS 3.0
Explore the CVSS 3.0 scoring system, how to calculate scores, and scoring metrics. Calculating a base score using exploitability metrics and working with impact metrics are also covered. This course can be used as part of the preparation for the 210-255: Implementing Cisco Cybersecurity Operations certification exam.
3 videos | 1h 30m has Assessment available Badge
SECOPS: Securing File Systems
Discover the importance of file system security by looking at file systems supported by the Windows and Linux operating systems. File system forensics, alternate data streams, and timestamps are also covered. This course can be used as part of the preparation for the 210-255: Implementing Cisco Cybersecurity Operations certification exam.
3 videos | 1h 15m has Assessment available Badge
SECOPS: Identifying Forensic Evidence
Examine the importance of being able to identify, handle, and process digital forensic evidence. Learn about computer forensics, chain of custody, and order of volatility, as well as various evidence types. This course can be used as part of the preparation for the 210-255: Implementing Cisco Cybersecurity Operations certification exam.
2 videos | 1h 6m has Assessment available Badge
SECOPS: Interpreting Regular Expressions
Explore the process of interpreting regular expressions and refresh your knowledge of RegEx functions and operators. Filter Cisco router configuration output and transitioning to Wireshark to filter conversations is also covered. This course can be used as part of the preparation for the 210-255: Implementing Cisco Cybersecurity Operations certification exam.
2 videos | 59m has Assessment available Badge
SECOPS: Protocol Header Security
Discover the important roles protocol headers and their components play in security. How to analyze common Layer 2 security attacks is also covered. This course can be used as part of the preparation for the 210-255: Implementing Cisco Cybersecurity Operations certification exam.
3 videos | 1h 28m has Assessment available Badge
SECOPS: IP Header Security
Discover the important role IP headers and their components play in security. Examine security concerns associated with IP header components. This course can be used as part of the preparation for the 210-255: Implementing Cisco Cybersecurity Operations certification exam.
3 videos | 1h 23m has Assessment available Badge
SECOPS: ICMP Intrusion
Discover the importance of ICMP from a security standpoint by reviewing the purpose of ICMP, ICMP types, and header information. Analyzing a packet capture of a ping sweep and recognizing attack vectors is also covered. This course can be used as part of the preparation for the 210-255: Implementing Cisco Cybersecurity Operations certification exam.
2 videos | 56m has Assessment available Badge
SECOPS: ICMP Intrusion Part 2
Examine additional ICMP security considerations by exploring attacks like firewalking, OS fingerprinting, ICMP route redirects, router discovery spoofing, and Denial of Service. This course can be used as part of the preparation for the 210-255: Implementing Cisco Cybersecurity Operations certification exam.
2 videos | 52m has Assessment available Badge
SECOPS: Transport Layer Headers
Explore transport layer headers, including basic operations, 3-way handshake, header fields, session hijacking, TCP checksums, invalid TCP flag combinations, UDP flooding, and UDP max length. This course can be used as part of the preparation for the 210-255: Implementing Cisco Cybersecurity Operations certification exam.
3 videos | 1h 15m has Assessment available Badge
SECOPS: HTTP Headers
Examine HTTP headers, including a review of the basics, the GET, POST, and HTTP methods, and HEAD. Cookies and their components, double encoding, and common characters used in web attacks are also covered. This course can be used as part of the preparation for the 210-255: Implementing Cisco Cybersecurity Operations certification exam.
3 videos | 1h 14m has Assessment available Badge
SECOPS: Identifying NetFlow v5 Records
Discover the NetFlow tool and how to identify elements of a security event. Working with flow records, and using StealthWatch is also covered. This course can be used as part of the preparation for the 210-255: Implementing Cisco Cybersecurity Operations certification exam.
2 videos | 56m has Assessment available Badge
SECOPS: Examining Intrusion Events
Explore how to interrupt common artifact elements from an event to identify an alert, identify key intrusion elements from a PCAP file, extract files from a TCP stream given a PCAP file, and work with Wireshark. This course can be used as part of the preparation for the 210-255: Implementing Cisco Cybersecurity Operations certification exam.
1 video | 22m has Assessment available Badge
SECOPS: Using Intrusion Event Technologies
Examine intrusion event technologies, including NetFlow, StealthWatch, and Cisco Firepower Management Center. Alert data, NGFW, packet capture, network application control, and Cisco ISE are also covered. This course can be used as part of the preparation for the 210-255: Implementing Cisco Cybersecurity Operations certification exam.
3 videos | 1h 15m has Assessment available Badge
SECOPS: Analyzing Intrusion Impact
Discover how to analyze the impact of intrusion and explore the concept of heuristics. Walk through how to interpret a provided event and explore the use of Firepower Management Center. This course can be used as part of the preparation for the 210-255: Implementing Cisco Cybersecurity Operations certification exam.
2 videos | 58m has Assessment available Badge
SECOPS: Responding to Incidents
Explore incident response plans, including the elements required by NIST.SP800-61 r2. Discover how to link plan elements to analysis steps, and determine which stakeholders belong in each analysis category. This course can be used as part of the preparation for the 210-255: Implementing Cisco Cybersecurity Operations certification exam.  
2 videos | 59m has Assessment available Badge
SECOPS: CSIRT Goals & Cybersec Elements
Discover the concept of CSIRT and its associated goals. Examine how to link data types to compliance frameworks, such as PCI, HIPPA, and SOX, and identify required protected elements for PCI-DSS. This course can be used as part of the preparation for the 210-255: Implementing Cisco Cybersecurity Operations certification exam.
2 videos | 52m has Assessment available Badge
SECOPS: Data Normalization & 5-Tuple Correlation
Explore the concept of data normalization and why it should be used. Discover 5-Tuple, how it correlates in events, and how it can be used to identify compromised hosts in logs. This course can be used as part of the preparation for the 210-255: Implementing Cisco Cybersecurity Operations certification exam.
2 videos | 33m has Assessment available Badge
SECOPS: Firepower Management Console & Analysis Methods
Explore how to use the Firepower Management Console to examine threat analysis reports and identify possible compromised hosts. Compare and contrast deterministic and probabilistic analysis methods. This course can be used as part of the preparation for the 210-255: Implementing Cisco Cybersecurity Operations certification exam.
2 videos | 50m has Assessment available Badge
SECOPS: Categorize & Classify Intrusions
Discover the Diamond Model of Intrusion Analysis, how it can be used to handle events, and how it can be used in conjunction with Kill Chain for a complete security intelligence model. This course can be used as part of the preparation for the 210-255: Implementing Cisco Cybersecurity Operations certification exam.
3 videos | 1h 7m has Assessment available Badge
SECOPS: Handling Incident Events & Evidence
Explore how NIST SP800-61 r2 is used to process an incident event and the recommended incident handling process. Examine evidence handling, as documented in NIST SP800-86 and how to apply VERIS schema categories to incident handling events. This course can be used as part of the preparation for the 210-255: Implementing Cisco Cybersecurity Operations certification exam.
3 videos | 1h 17m has Assessment available Badge
SHOW MORE
FREE ACCESS

COURSES INCLUDED

IINS 3.0: Introduction to Cisco Security
Security is critical when it comes to maintaining networks. Explore Cisco network security and the concepts of Confidentiality, Integrity, and Availability, as you prepare for the 210-260: Implementing Cisco Network Security certification exam.
2 videos | 44m has Assessment available Badge
IINS 3.0: SIEM Technology & Security Terminology
Security is at the forefront of Cisco's networking. Explore the security information and event management (SIEM) tools and some common security terminology, as you prepare for the 210-260: Implementing Cisco Network Security certification exam.
2 videos | 1h 13m has Assessment available Badge
IINS 3.0: Introduction to Network Attacks
Detecting and preventing network attacks is a key component to network security. Explore common network attacks and how to categorize and identify them, as you prepare for the 210-260: Implementing Cisco Network Security certification exam. 
2 videos | 1h 4m has Assessment available Badge
IINS 3.0: Specific Network Attacks
Examine in more detail some specific network attacks and how to categorize and identify them, as you prepare for the 210-260: Implementing Cisco Network Security certification exam.
1 video | 35m has Assessment available Badge
IINS 3.0: Malware and Data Loss
Explore common security threats like malware and some of the ways in which data loss can occur, as you prepare for the 210-260: Implementing Cisco Network Security certification exam.
2 videos | 1h 9m has Assessment available Badge
IINS 3.0: Encryption Methods
Protecting communications and maintaining privacy and integrity is a necessary part of networking. Examine how encryption works and why it should be used, as you prepare for the 210-260: Implementing Cisco Network Security certification exam.
2 videos | 56m has Assessment available Badge
IINS 3.0: Cryptographic Key Exchange
For two devices to communicate securely they must have a common key. Explore how keys can be shared and how communications can be encrypted and verified using digital signatures, as you prepare for the 210-260: Implementing Cisco Network Security certification exam.
2 videos | 1h 1m has Assessment available Badge
IINS 3.0: Network Topologies
The topology of a network affects how and where it needs to be secured. Discover how the topology affects protecting the network and how different topologies require different security requirements, as you prepare for the 210-260: Implementing Cisco Network Security certification exam.
2 videos | 1h 12m has Assessment available Badge
IINS 3.0: Secure Device Management
Using separate access methods for regular communication versus security and management can increase security. Examine the use of in-band and out-of-band management, as you prepare for the 210-260: Implementing Cisco Network Security certification exam.
1 video | 30m has Assessment available Badge
IINS 3.0: AutoSecure
Explore the use and configuration of the AutoSecure feature and verify it is protecting the device, as you prepare for the 210-260: Implementing Cisco Network Security certification exam.
2 videos | 47m has Assessment available Badge
IINS 3.0: Management Plane Access
Securing access to the management plane can be done with AutoSecure, but sometimes you need to do it manually or have more control. Explore how to secure the management plane from the CLI, as you prepare for the 210-260: Implementing Cisco Network Security certification exam.
2 videos | 54m has Assessment available Badge
IINS 3.0: Simple Network Management Protocol
The Simple Network Management Protocol can be used to manage and configure your network devices. Explore how to configure, secure, and use SNMPv3, as you prepare for the 210-260: Implementing Cisco Network Security certification exam.
1 video | 34m has Assessment available Badge
IINS 3.0: Network Time Protocol
Accurate time on devices is necessary for security. Explore the Network Time Protocol (NTP) and how it can be configured and used to synchronize time between devices, as you prepare for the 210-260: Implementing Cisco Network Security certification exam.
2 videos | 49m has Assessment available Badge
IINS 3.0: SCP & AAA Technologies
Secure file transfers and configuring authentication, authorization, and accounting features are required to have a secure system. Explore the Secure Copy tool for file transfers and the AAA configuration of Cisco devices, as you prepare for the 210-260: Implementing Cisco Network Security certification exam.
2 videos | 1h has Assessment available Badge
IINS 3.0: TACACS+
Remote authentication simplifies securing access over a larger network. Explore using TACACS+ for remote access control over network devices, as you prepare for the 210-260: Implementing Cisco Network Security certification exam.
2 videos | 53m has Assessment available Badge
IINS 3.0: Network Access Control
Explore integrating Cisco devices with Active Directory and securing access using ISE and ACS, as you prepare for the 210-260: Implementing Cisco Network Security certification exam.
2 videos | 1h 1m has Assessment available Badge
IINS 3.0: Port-based Access Control, BYOD, & MDM
Explore how to secure ports using 802.1x authentication and discover the tools available to support Bring Your Own Device (BYOD) and mobile device management (MDM), as you prepare for the 210-260: Implementing Cisco Network Security certification exam.
2 videos | 58m has Assessment available Badge
IINS 3.0: IPsec & VPN
Explore IPsec, its components, and what is involved with Phase 1 (SA) and Phase 2 (encryption), as you prepare for the 210-260: Implementing Cisco Network Security certification exam.
2 videos | 57m has Assessment available Badge
IINS 3.0: Clientless SSL VPN & ASDM
Discover how to implement a remote access VPN using a clientless SSL VPN on a Cisco ASA, configure the VPN through the ASA Device Manager (ASDM), and verify its implementation, as you prepare for the 210-260: Implementing Cisco Network Security certification exam.
1 video | 38m has Assessment available Badge
IINS 3.0: AnyConnect VPN Using ASDM
Explore the process of using ASDM to configure client-based AnyConnect VPN on a Cisco ASA firewall. Discover the challenges of this configuration, how to reconfigure and verify it, and the components of endpoint posture assessments, as you prepare for the 210-260: Implementing Cisco Network Security certification exam.
2 videos | 1h 9m has Assessment available Badge
IINS 3.0: IPSec Site-to-Site VPN
Explore the basics of creating an IPsec site-to-site VPN and how to configure both sides of the router. Scenarios that may cause the tunnel to not build are also discussed. This course can be used to prepare for the 210-260: Implementing Cisco Network Security certification exam.
2 videos | 1h 1m has Assessment available Badge
IINS 3.0: Secure CLI Access
Explore the basics of securing router access, including how to secure the CLI using multiple privilege levels and configure role-based access. Discover how to add users with varying privilege levels for control, as you prepare for the 210-260: Implementing Cisco Network Security certification exam.
1 video | 33m has Assessment available Badge
IINS 3.0: OSPF & EIGRP Authentication
Discover how to configure OSPF and EIGRP authentication using MD5. Explore authentication configuration goals and prerequisites, routing protocol vulnerabilities, and security, as you prepare for the 210-260: Implementing Cisco Network Security certification exam.
2 videos | 1h 3m has Assessment available Badge
IINS 3.0: Attack Mitigation
A security professional must be able to identify common Layer 2 attacks. Explore these common Layer 2 attacks and how to mitigate them, as you prepare for the 210-260: Implementing Cisco Network Security certification exam.
3 videos | 1h 30m has Assessment available Badge
IINS 3.0: Control Plane Policing
Explore the concept of control plane policing, examine the security risks when CoPP isn't configured, and configure and verify CoPP configuration on a router, as you prepare for the 210-260: Implementing Cisco Network Security certification exam.
1 video | 27m has Assessment available Badge
IINS 3.0: PVLANs & VLAN Security
Examine when to use private VLANs, how to configure them, and how to verify the configuration. Discover native VLAN security issues, its purpose, and how to configure it on a switch, as you prepare for the 210-260: Implementing Cisco Network Security certification exam.
2 videos | 1h 3m has Assessment available Badge
IINS 3.0: Firewall Technology
Examine the differences between various Cisco firewall technologies, such Cisco ASA, NAT, and zone-based firewalls, as you prepare for the 210-260: Implementing Cisco Network Security certification exam.
1 video | 36m has Assessment available Badge
IINS 3.0: Network Address Translation
Explore how to set up policy-based NAT on a Cisco ASA, ASDM configuration details, and how to verify the configuration, as you prepare for the 210-260: Implementing Cisco Network Security certification exam.
2 videos | 50m has Assessment available Badge
IINS 3.0: Zone-Based Firewall Configuration
Explore the use of zone-based firewall on a Cisco router, why to use zones, using zone pairs, and how to configure zone-based firewall. The concept and configuration of self zones is also covered. This course helps prepare for the 210-260: Implementing Cisco Network Security certification exam.
2 videos | 45m has Assessment available Badge
IINS 3.0: ASA Security & Policies
Explore Cisco ASA access management, including how to configure access using Telnet, SSH, ad HTTPs and how to set up ASDM. Configuring dynamic NAT and security access policies is also covered, This course will help prepare for the 210-260: Implementing Cisco Network Security certification exam.
3 videos | 1h 25m has Assessment available Badge
IINS 3.0: Firewall Features
Examine some of the different features that can be configured on a Cisco firewall, how to navigate around the Cisco ASA, and show where configurable elements are found, as you prepare for the 210-260: Implementing Cisco Network Security certification exam.
1 video | 34m has Assessment available Badge
IINS 3.0: IPS Deployment Configuration
Examine IPS deployment considerations, including the purpose of the IPS, deployment placement, basic functions, IPS usage results, and using the Cisco FMC to show the configuration of an intrusion policy, as you prepare for the 210-260: Implementing Cisco Network Security certification exam.
2 videos | 1h 7m has Assessment available Badge
IINS 3.0: Configuring Cisco IPS
Explore how to configure the Cisco IOS IPS from the CLI interface and all the IPS technologies involved in configuring it, as you prepare for the 210-260: Implementing Cisco Network Security certification exam.
2 videos | 54m has Assessment available Badge
IINS 3.0: Threat Mitigation for Email, Web, & Endpoints
Discover how to mitigate threats for email, web, and endpoints using technologies such as Cisco Email Cloud Security, Cisco ESA, Cisco Cloud Web Security, Cisco WSA, Cisco ISE, and Cisco AMP for Endpoints. This course can be used to prepare for the 210-260: Implementing Cisco Network Security certification exam.
3 videos | 1h 15m has Assessment available Badge
SHOW MORE
FREE ACCESS

COURSES INCLUDED

SENSS 1.0: IOS Security Configuration
Discover the steps required to configure a new Cisco router or switch, including basic configuration settings and specific security-related settings designed to harden the attack surface of the device.
3 videos | 55m has Assessment available Badge
SENSS 1.0: Role-Based Access Control
Explore how to harden an IOS device to prevent unauthorized access by configuring filtered command sets that can be assigned to users based on their role. Examine IOS zone-based firewalls and the steps necessary to enable them.
2 videos | 53m has Assessment available Badge
SENSS 1.0: Zone-Based Firewalls
Explore the final steps in configuring an IOS-based router as a network firewall and special zones that can be used alongside the configuration. Discover how the "self" zone functions and how single zone traffic is handled.
2 videos | 36m has Assessment available Badge
SENSS 1.0: ASA Firewall Configuration & Access Control
Explore how to configure a new Cisco ASA firewall, including the initial configuration commands needed to enable the firewall and how to secure administrative access to the device in preparation of placing a firewall into production use.
3 videos | 1h 8m has Assessment available Badge
SENSS 1.0: Twice NAT & Network Object NAT
Explore network address translation on Cisco devices using Twice NAT and the newer Network Object NAT.
2 videos | 57m has Assessment available Badge
SENSS 1.0: ASA Firewall Access Control
Discover how Access Control Lists (ACLs) and Network Objects can be used to configure and build firewall rules on Cisco devices.
2 videos | 1h has Assessment available Badge
SENSS 1.0: IPv6 Support & Traffic Inspection
Explore IPv6, how to use IPv6 NAT, and how to use the advanced traffic inspection features to prevent network attacks.
2 videos | 48m has Assessment available Badge
SENSS 1.0: Transparent Firewalls & Security Contexts
Discover transparent and virtual firewalls and how they can be used to improve network security.
2 videos | 1h 1m has Assessment available Badge
SENSS 1.0: High Availability & Private VLANs
Explore high availability by clustering Cisco devices and use private VLANs to isolate systems in a multi-tenant environment.
2 videos | 1h 2m has Assessment available Badge
SENSS 1.0: DHCP Snooping & IP Source Guard
Discover how DHCP snooping, ARP inspection, and IP Source Guard can be configured and used to prevent network attacks.
2 videos | 42m has Assessment available Badge
SENSS 1.0: Cisco Port-Based Traffic Control
Discover Storm Control and how it can be used to prevent broadcast attacks and use port security to link ports to MAC addresses to prevent unauthorized hardware on a network.
2 videos | 49m has Assessment available Badge
SENSS 1.0: Traffic & Device Monitoring
Explore how NetFlow can be leveraged to gain visibility into the types of traffic passing through a network and how SNMP can be used to poll performance and configuration data from a Cisco device.
2 videos | 50m has Assessment available Badge
SENSS 1.0: Centralized Logging & Device Management
Examine the importance of having a central location to store device logs from an organization's network infrastructure and explore some of the centralized device management solutions available from Cisco.
2 videos | 40m has Assessment available Badge
SHOW MORE
FREE ACCESS

COURSES INCLUDED

SNCF: Cisco Firewall, IPS Systems, & the FMCv in AWS
Cisco Firepower devices from Cisco Systems have become very popular in enterprise environments. In this course, you'll first review the requirements of the SNCF 300-710 exam. Next, you'll look at the history of firewalls and IPS systems in the Cisco product portfolio. You'll learn about the AWS version of the FMCv, including the restrictions, limitations, and capabilities of this device. Finally, you'll examine the steps involved in constructing the Virtual Private Cloud when building a Firepower lab. This course can be used in preparation for the 300-710: Securing Networks with Cisco Firepower (SNCF) certification exam.
4 videos | 1h 4m has Assessment available Badge
SNCF: FMCv Deployment & Initial Setup
Are you ready to see the deployment of Cisco Firepower Management Center (FMC)? In this course, you'll learn the basics of an FMC deployment with an example that uses the Cisco Firepower Management Center Virtual (FMCv) image in AWS. Then, you'll move on to examine the initial configurations you should make to your FMCv after you have successfully installed the FMC. You'll also explore the FMCv interface. This course can be used in preparation for the 300-710: Securing Networks with Cisco Firepower (SNCF) certification exam.
2 videos | 44m has Assessment available Badge
SNCF: Deploying NGFWv & Adding It to the FMCv
In this course, you'll learn about the Cisco Firepower Next-Generation Firewall Virtual (NGFWv) appliance for AWS, including the requirements and caveats of a cloud-based implementation. You'll explore the typical steps for the deployment of an NGFWv in AWS, including integration with the FMCv for the management of your security devices. Finally, you'll learn how to add your NGFWv to the FMCv for the most robust management and configuration options. This course can be used in preparation for the 300-710: Securing Networks with Cisco Firepower (SNCF) certification exam.
3 videos | 52m has Assessment available Badge
SNCF: NGFW Modes, Interface Types, & Link Redundancy
There are multiple ways in which you can deploy a Next-Generation Firewall (NGFW) from Cisco Systems. In this course, you'll learn about the standard routed mode as well as alternative transparent mode. You'll also learn about the flexibility of Firepower devices, which is due in part to the many different types of interfaces supported. Finally, you'll explore the options that exist on Cisco Firepower devices for link redundancy. This course can be used in preparation for the 300-710: Securing Networks with Cisco Firepower (SNCF) certification exam.
4 videos | 58m has Assessment available Badge
SNCF: Failover, Multi-instance Deployments, & Clustering
In this course, you'll learn how to configure multiple Firepower devices for redundancy purposes. Then, you'll look at multi-instance deployments of Cisco Firepower. Finally, you'll learn how clustering helps you to ramp up the horsepower and availability of your Cisco Firepower implementation. This course can be used in preparation for the 300-710: Securing Networks with Cisco Firepower (SNCF) certification exam.
3 videos | 47m has Assessment available Badge
SNCF: FMC Settings, Object Management, & Intrusion Rules
There are many options for management of the Cisco Firepower Management Center (FMC) using the console. In this course, you'll learn about the key features of the FMC that can make your life as a security engineer much, much easier. Objects permit you to define reusable object components that you can leverage for the fast configuration of policies, searches, reports, and dashboards. You'll learn how you can manage the objects that help define your network and your security operations. Finally, you'll examine the Intrusion Rules section of the Objects area and how it allows you to modify the IPS rules for the Firepower device. This course can be used in preparation for the 300-710: Securing Networks with Cisco Firepower (SNCF) certification exam.
3 videos | 54m has Assessment available Badge
SNCF: Access Control, FTD, & Prefilter Policies
Access control policies are critically important as almost all of your traffic will pass through this policy at some point. This policy dictates whether traffic will be passed, blocked, or logged by your Firepower device. In this course, you'll learn about the creation of access control policies. Next, you'll examine how Cisco's Firepower Threat Defense (FTD) can take many actions against traffic at many different points in the traffic flow through the device. Finally, you'll explore the powerful prefilter policy actions of Firepower FTD and why you will want to take advantage of them. This course can be used in preparation for the 300-710: Securing Networks with Cisco Firepower (SNCF) certification exam.
3 videos | 56m has Assessment available Badge
SNCF: Security Intelligence & Policies
You'll definitely want to take advantage of all the great security intelligence that Cisco Talos can provide dynamically. In this course, you'll learn about the integration of security intelligence with Firepower polices and the number of security checks and safeguards that the Cisco Firepower devices bring to your network. You'll also learn about the powerful malware and file policies you can create and associate with your access control policy. Next, you'll look at the FTD's intrusion prevention capabilities with a close examination of the intrusion polices. Finally, you'll learn about the SSL inspection feature, which allows you to either block encrypted traffic without inspecting it or inspect encrypted or decrypted traffic with access control. This course can be used in preparation for the 300-710: Securing Networks with Cisco Firepower (SNCF) certification exam.
4 videos | 1h 11m has Assessment available Badge
SNCF: Network Discovery, Identity and DNS Policies, & Correlation
The network discovery policy on the Firepower Management Center controls how the system collects data on your organization's network assets and which network segments and ports are monitored. In this course, you'll learn about this policy and how to configure it. Next, you'll examine the authentication options that are possible thanks to identity policies. You'll learn about DNS-based security intelligence and how it allows you to allow or block traffic based on the domain name requested by a client using an Allow or Block list. Cisco provides domain name intelligence, so you'll learn how to customize this and even add your own domains. Finally, you'll explore why you might want to have your FTD engage in event correlation to enact some remediation for a very tricky and specific situation. This course can be used in preparation for the 300-710: Securing Networks with Cisco Firepower (SNCF) certification exam.
4 videos | 1h 6m has Assessment available Badge
SNCF: NAT, QoS, VPN, & Device Management
Cisco Firepower devices support different NAT variations and VPN configurations. In this course, you'll learn about the many variations of NAT supported by Firepower, including the classic options of static and dynamic. You'll learn that Firepower devices also support the different configuration approaches to NAT on the Cisco security devices, including auto NAT and manual NAT. Next, you'll explore the QoS support Firepower provides, as well as support limitations. You'll learn about the types of VPNs that are supported on Firepower systems. Finally, you'll examine why you might want to break your Firepower deployment into domains in large enterprise environments. This course can be used in preparation for the 300-710: Securing Networks with Cisco Firepower (SNCF) certification exam.
4 videos | 40m has Assessment available Badge
SHOW MORE
FREE ACCESS

COURSES INCLUDED

SCOR: Security Basics & Common Threats
In this course, you'll first review basic SCOR concepts and why they are important. Next, you'll move on to explore common language when it comes to securing your lT architecture and how to correctly use this language when discussing your security environment. You'll examine common attack methods in order to properly secure your on-prem IT environment. With the popularity of the cloud, computer criminals have begun targeting these areas with more and more frequency. To wrap up this course, you'll learn about some of the most common attacks against the cloud. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
4 videos | 1h 3m has Assessment available Badge
SCOR: Security Vulnerabilities, Attack Mitigations, & Cryptographic Solutions
There are many common vulnerabilities in software and systems and you must understand them to effectively secure your network systems. In this course, you'll learn about some of these vulnerabilities, as well as common attack mitigation techniques for network application style attacks. Before reviewing cybersecurity technologies in greater detail, you'll first look at the basics of cryptography and the critical role it plays in computer and network security. Finally, you'll explore some current cryptographic solutions and what they are used for. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
4 videos | 1h 23m has Assessment available Badge
SCOR: PKI & IKE
A major aspect of Internet-based security these days hinges upon the Public Key Infrastructure. In this course, you'll learn the basics of this critical set of technologies. PKI is the magic behind the use of seamless SSL/TLS authentication and encryption on the public Internet and this clever implementation of asymmetric encryption algorithms can also be used in your private enterprise. You'll continue your exploration of PKI by learning how to fulfill a certificate request. Finally, you'll learn about the Internet Key Exchange, including the differences between IKE v1 and v2. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
3 videos | 52m has Assessment available Badge
SCOR: VPNs, Security Intelligence, & Social Engineering Attacks
There is no denying it, VPN is a hugely popular part of the modern Internet. In this course, you'll learn about different types of VPN, its uses, and various technologies you can use. Next, you'll explore security devices and their ability to help you author, share, and consume security intelligence data. You'll examine social engineering attacks that are very prevalent today, including how to protect against them and the software you can use for defense. Finally, you'll learn about some of the most common attacks today, including many different variations of phishing attacks. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
4 videos | 1h 20m has Assessment available Badge
SCOR: SDN APIs & Security Appliance API Calls
In this course, you'll learn about SDN and the northbound and southbound APIs used with it. You'll also learn about the RESTful APIs that you can make use of for the programmability of your Cisco security devices. You'll also discover how these API calls can be used in an actual network environment and how to quickly get started with programmatic code referencing these important APIs. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
2 videos | 43m has Assessment available Badge
SCOR: Security Models & Frameworks
There is often confusion about why there are intrusion prevention devices when we already have firewalls. Aren't these devices doing the same thing? In this course, you'll learn the differences between these network security functions and tools. You'll also look at some specialized devices in more detail, including the Web Security Appliance and the Email Security Appliance. You'll move on to explore how you can deploy the ASA and Firepower in different ways like routed or transparent mode. Next, you'll learn about NetFlow and Flexible NetFlow, valuable tools for monitoring the flows of data through your network. You'll also see how you can safely leverage the power of Flexible NetFlow to help control your network. Finally, you'll learn about techniques for adding segmentation to your network, including EPGs in Cisco ACI and SGTs. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
4 videos | 1h 5m has Assessment available Badge
SCOR: DHCP Snooping, DAI, IP Source Guard, Private VLANs, & Storm Control
When you think about attacking a network with a rogue DHCP device, you realize it is such a relatively easy attack to carry out. In this course, you'll learn about the DHCP snooping feature and how it is configured. Next, you'll examine how multiple different security features can leverage the DHCP snooping database that results from a proper implementation of DHCP snooping, including a demonstration of both the DAI and IP Source Guard features. You'll learn about the often intimidating security feature private VLANs, including the details of these structures and the reason why they exist. Finally, you'll explore traffic storms, including when they occur, how they create excessive traffic and can degrade network performance, and how to use the traffic storm control feature. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
4 videos | 1h 16m has Assessment available Badge
SCOR: Port Security, VLAN Hopping, Network Hardening, & Access Control
Port security is not one of the most important features when it comes to securing your network and it does have its challenges, but this feature is definitely a nice layer of defense in your overall defense-in-depth strategy. In this course, you'll learn about port security, as well as the VLAN hopping attack and how it can be prevented. You'll explore several security techniques you can use to help harden the network against security attacks and how it can benefit you to break the network and network device functionality down into the three planes of operation - management, data, and control planes. You'll also examine examples of security technologies you can use at each plane of operation to harden the overall network. Finally, you'll learn about different approaches to providing secure access to data in network systems, including MAC, DAC, and RBAC. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
3 videos | 1h 1m has Assessment available Badge
SCOR: Network Access & Secure Network Management
In this course, you'll learn about options for the management of Cisco Firepower devices, including FMC, FDM, and ASDM. You'll explore how AAA can protect access through the device and to the device. Next, you'll learn about the RADIUS and TACACS+ security protocols, as well as commands you should use to ensure authentication to a Cisco device. Finally, you'll learn about critical best practices in secure network management for your enterprise and the syntax used with SNMP version 3. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
3 videos | 51m has Assessment available Badge
SCOR: Configuring and Verifying VPN & IPsec
There are many different styles of site-to-site VPNs possible because there are Cisco-centric types, as well as open standard designs. In this course, you'll examine a typical configuration of a site-to-site VPN, such as the DMVPN configuration and verification. Then you'll explore the many types of remote access VPN Cisco supports, including having a Cisco ASA provide VPN access to remote clients. Finally, you'll learn how to determine if your traffic is being protected in your IPsec site-to-site VPN built between Cisco devices. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
3 videos | 1h 12m has Assessment available Badge
SCOR: Cloud Deployment, Service Models, Responsibilities, & Security
In this course, you'll learn about the cloud in general, including the NIST definition of cloud (NIST 800-145) and cloud deployment and service models. You'll discover that you don't have to sacrifice security when you move to the cloud and explore the types of security responsibilities that exist with the cloud and the parties that are responsible for them. Finally, you'll learn about various cloud security processes and solutions that you should be familiar with if the cloud is an important aspect of your IT infrastructure, including cloud logging, auditing, and the security of workloads. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
3 videos | 1h 6m has Assessment available Badge
SCOR: Cisco Firepower, Traffic Management, Identity, & Authentication
In this course, you'll learn about the ASAv, FMCv, and FTDv in AWS, as well as how you would register an FTD in the FMC. Next, you'll move on to explore the need to deploy web security solutions transparently and how to implement this using the Web Cache Communication Protocol. You'll also learn how to view the implementation with a Cisco ASA. Finally, you'll learn about Cisco's Web Security Appliance, how it handles web requests in the network, and the importance of identity and authentication on the Cisco WSA. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
3 videos | 1h 7m has Assessment available Badge
SCOR: Working with ESA, CES, & WSA
Cisco has demonstrated its commitment to securing the enterprise with many different solutions that focus on specific needs, such as the Email Security Appliance, Cisco Cloud Email Security, and the Web Security Appliance. In this course, you'll learn the key facts about all three of these solutions. You'll explore how the WSA and ESA are impressive appliances when it comes to securing your web and e-mail infrastructures and about the components that make up these solutions. Even if you're not currently planning on implementing a WSA in your enterprise, it can be beneficial to see what a typical configuration is like. So next you'll look at the options available with the WSA. Finally, you'll learn about the steps involved in a typical ESA configuration and verification and how the ESA can function for you in the enterprise. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
4 videos | 1h 20m has Assessment available Badge
SCOR: Cisco Umbrella & Endpoint Security
When it comes to an IP and DNS-centric approach to network security, there is nothing quite like Cisco Umbrella. In this course, you'll learn about the Cisco Umbrella solution, including how to ensure it is properly configured and verified. Next, you'll examine EPP and EDR and their roles in securing network endpoints. You'll learn about the importance and uses of Cisco AMP and about a variety of other products that can be used to assist with keeping your endpoints secure. Finally, you'll explore the Outbreak Control functionality of Cisco AMP for Endpoints is the Outbreak Control. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
5 videos | 57m has Assessment available Badge
SCOR: MDM, MFA, & Endpoint Solutions
Mobile Device Management is widespread and getting more so all the time. MDM permits the management and control of all mobile devices that make their way to the typical enterprise today and in this course you'll learn about MDM as a cloud-based solution. Next, you'll look at the three main factors you can use to implement MFA and why you might choose some factors over the others. You'll examine the use of posture assessment as part of the overall security design and the key elements of this approach. Finally, you'll learn about the challenges of keeping systems patched, as well as various endpoint patching issues and approaches. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
4 videos | 1h 7m has Assessment available Badge
SCOR: Guest Services, BYOD, 802.1X, & CoA
In lower security environments, there is often a desire to permit guest access to the network. These guests might get limited Internet access or even access to some of the non-sensitive network resources and data. In this course, you'll learn about the Identity Service Engine, which is the component in the Cisco security portfolio that can make this access seamless to configure and implement. You'll also learn about guest access and BYOD for the network. Next, you'll move on to examine the use of 802.1X in high security enterprises to ensure that each network user is authenticated and then authorized for their network and resource access. You'll also look at related technologies like MAB and WebAuth. Finally, you'll explore the RADIUS Change of Authorization feature, which can be critical for certain network security functions. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
3 videos | 46m has Assessment available Badge
SCOR: Device Compliance, Exfiltration, Telemetry, & Security Products
In this course, you'll learn how device compliance and application control can be achieved using Cisco products. You'll explore why data exfiltration is one of the central concerns for security professionals. Next, you'll learn about network telemetry and model-driven telemetry and their increasing popularity in the industry. You'll also examine an example of how you might use telemetry in the Cisco network. Finally, you'll learn about the impressive number of security technologies in the Cisco solution portfolio, broken down by category and individual products in each category. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
4 videos | 54m has Assessment available Badge
SHOW MORE
FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE COURSES

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

BOOKS INCLUDED

Book

Cisco Networks: Engineers’ Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA
For beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this concise, one-stop reference lays out clear directions for installing, configuring, and troubleshooting networks with Cisco devices.
Book Duration 11h 48m Book Authors By Chris Carthern, Noel Rivera, Richard Bedwell, William Wilson

Book

Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance: Identify, Mitigate, and Respond to Network Attacks, Second Edition
Offering comprehensive sample configurations, proven troubleshooting methodologies, and debugging examples, this book provides an authoritative practitioner's guide to planning, deploying, managing, and troubleshooting security with Cisco ASA.
Book Duration 15h 40m Book Authors By Jazib Frahim, Omar Santos

BOOKS INCLUDED

Book

Cisco Secure Firewall Services Module (FWSM)
Comprehensively answering how and why the FWSM functions as it does, this book provides practical examples throughout and enables you to successfully deploy the FWSM and gain the greatest functional benefit from your deployment.
Book Duration 6h 4m Book Authors By Arvind Durai, Ray Blair

Book

Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance: Identify, Mitigate, and Respond to Network Attacks, Second Edition
Offering comprehensive sample configurations, proven troubleshooting methodologies, and debugging examples, this book provides an authoritative practitioner's guide to planning, deploying, managing, and troubleshooting security with Cisco ASA.
Book Duration 15h 40m Book Authors By Jazib Frahim, Omar Santos

Book

Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity
Devoted to forensic analysis of routers and switches, this book details where network forensics fits within the entire process of an investigation, end to end, from incident response and data collection to preparing a report and legal testimony.
Book Duration 9h 51m Book Authors By Dale Liu

Book

Cisco Networks: Engineers’ Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA
For beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this concise, one-stop reference lays out clear directions for installing, configuring, and troubleshooting networks with Cisco devices.
Book Duration 11h 48m Book Authors By Chris Carthern, Noel Rivera, Richard Bedwell, William Wilson

BOOKS INCLUDED

Book

Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance: Identify, Mitigate, and Respond to Network Attacks, Second Edition
Offering comprehensive sample configurations, proven troubleshooting methodologies, and debugging examples, this book provides an authoritative practitioner's guide to planning, deploying, managing, and troubleshooting security with Cisco ASA.
Book Duration 15h 40m Book Authors By Jazib Frahim, Omar Santos

Book

Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity
Devoted to forensic analysis of routers and switches, this book details where network forensics fits within the entire process of an investigation, end to end, from incident response and data collection to preparing a report and legal testimony.
Book Duration 9h 51m Book Authors By Dale Liu

Book

Cisco Networks: Engineers’ Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA
For beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this concise, one-stop reference lays out clear directions for installing, configuring, and troubleshooting networks with Cisco devices.
Book Duration 11h 48m Book Authors By Chris Carthern, Noel Rivera, Richard Bedwell, William Wilson

Book

Cisco Secure Firewall Services Module (FWSM)
Comprehensively answering how and why the FWSM functions as it does, this book provides practical examples throughout and enables you to successfully deploy the FWSM and gain the greatest functional benefit from your deployment.
Book Duration 6h 4m Book Authors By Arvind Durai, Ray Blair

BOOKS INCLUDED

Book

Cisco Networks: Engineers’ Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA
For beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this concise, one-stop reference lays out clear directions for installing, configuring, and troubleshooting networks with Cisco devices.
Book Duration 11h 48m Book Authors By Chris Carthern, Noel Rivera, Richard Bedwell, William Wilson

BOOKS INCLUDED

Book

Cisco Networks: Engineers’ Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA
For beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this concise, one-stop reference lays out clear directions for installing, configuring, and troubleshooting networks with Cisco devices.
Book Duration 11h 48m Book Authors By Chris Carthern, Noel Rivera, Richard Bedwell, William Wilson

Book

Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance: Identify, Mitigate, and Respond to Network Attacks, Second Edition
Offering comprehensive sample configurations, proven troubleshooting methodologies, and debugging examples, this book provides an authoritative practitioner's guide to planning, deploying, managing, and troubleshooting security with Cisco ASA.
Book Duration 15h 40m Book Authors By Jazib Frahim, Omar Santos

BOOKS INCLUDED

Book

Cisco Networks: Engineers’ Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA
For beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this concise, one-stop reference lays out clear directions for installing, configuring, and troubleshooting networks with Cisco devices.
Book Duration 11h 48m Book Authors By Chris Carthern, Noel Rivera, Richard Bedwell, William Wilson

Book

Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity
Devoted to forensic analysis of routers and switches, this book details where network forensics fits within the entire process of an investigation, end to end, from incident response and data collection to preparing a report and legal testimony.
Book Duration 9h 51m Book Authors By Dale Liu