SCOR: Device Compliance, Exfiltration, Telemetry, & Security Products
4 Videos | 49m 42s
- Includes Assessment
- Earns a Badge
In this course, you'll learn how device compliance and application control can be achieved using Cisco products. You'll explore why data exfiltration is one of the central concerns for security professionals. Next, you'll learn about network telemetry and model-driven telemetry and their increasing popularity in the industry. You'll also examine an example of how you might use telemetry in the Cisco network. Finally, you'll learn about the impressive number of security technologies in the Cisco solution portfolio, broken down by category and individual products in each category. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
WHAT YOU WILL LEARN
identify the component that is used for time when a compliance check occursrecognize device compliance optionsrecognize the Cisco agent software to use to implement device complianceidentify security controls to combat data exfiltrationrecognize the action of unauthorized transferring of enterprise data
identify the components of Cisco Model Drive Telemetryrecognize the Cisco operating system that provides the Cisco Model Driven Telemetry featurerecognize the tool to provide security analyticsrecognize tools used to improve cloud-based security
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.
YOU MIGHT ALSO LIKE