SCOR: VPNs, Security Intelligence, & Social Engineering Attacks

Cisco SCOR    |    Expert
  • 4 videos | 1h 14m 32s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 55 users Rating 4.5 of 55 users (55)
There is no denying it, VPN is a hugely popular part of the modern Internet. In this course, you'll learn about different types of VPN, its uses, and various technologies you can use. Next, you'll explore security devices and their ability to help you author, share, and consume security intelligence data. You'll examine social engineering attacks that are very prevalent today, including how to protect against them and the software you can use for defense. Finally, you'll learn about some of the most common attacks today, including many different variations of phishing attacks. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.

WHAT YOU WILL LEARN

  • Recognize the specific features associated with different vpn technologies
    identify limitations of various cisco vpn configurations
    identify characteristics of cisco remote access vpn solutions
    identify characteristics of cisco site-to-site vpn options
    Recognize the advantages of using advanced security devices to keep up with security intelligence needs
    identify the basic elements used to create modern automated security intelligence
  • Recognize the benefits of using cisco software to defend against social engineering attacks
    recognize how to protect against a phishing attack
    identify the benefits and limits of using cisco software to defend against phishing attacks
    Identify different technologies that integrate with different types of phishing attacks
    recognize the most common phishing attack variants
    identify social engineering attacks that initially do not need to interface with computers

IN THIS COURSE

  • Locked
    1.  VPN Options
    22m 16s
    In this video, you will learn how to identify characteristics of Cisco remote access VPN solutions. FREE ACCESS
  • Locked
    2.  Security Intelligence Authoring, Sharing, and Consumption
    11m 35s
    Learn how to recognize the advantages of using advanced security devices to keep up with security intelligence needs. FREE ACCESS
  • Locked
    3.  Endpoint Protections for Social Engineering Attacks
    19m 58s
    Upon completion of this video, you will be able to recognize the benefits of using Cisco software to defend against social engineering attacks. FREE ACCESS
  • Locked
    4.  Types of Social Engineering Attacks
    20m 44s
    In this video, find out how to identify different technologies that can help protect against different types of phishing attacks. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 51 users Rating 4.6 of 51 users (51)
Rating 4.6 of 39 users Rating 4.6 of 39 users (39)
Rating 4.6 of 51 users Rating 4.6 of 51 users (51)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 116 users Rating 4.6 of 116 users (116)
Rating 4.3 of 49 users Rating 4.3 of 49 users (49)
Rating 4.4 of 33 users Rating 4.4 of 33 users (33)