SCOR: VPNs, Security Intelligence, & Social Engineering Attacks
4 Videos | 1h 14m 32s
- Includes Assessment
- Earns a Badge
There is no denying it, VPN is a hugely popular part of the modern Internet. In this course, you'll learn about different types of VPN, its uses, and various technologies you can use. Next, you'll explore security devices and their ability to help you author, share, and consume security intelligence data. You'll examine social engineering attacks that are very prevalent today, including how to protect against them and the software you can use for defense. Finally, you'll learn about some of the most common attacks today, including many different variations of phishing attacks. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
WHAT YOU WILL LEARN
identify characteristics of Cisco remote access VPN solutionsidentify characteristics of Cisco site-to-site VPN optionsidentify limitations of various Cisco VPN configurationsrecognize the specific features associated with different VPN technologiesidentify the basic elements used to create modern automated security intelligenceRecognize the advantages of using advanced security devices to keep up with security intelligence needs
identify the benefits and limits of using Cisco software to defend against phishing attacksrecognize how to protect against a phishing attackrecognize the benefits of using Cisco software to defend against social engineering attacksidentify different technologies that integrate with different types of phishing attacksidentify social engineering attacks that initially do not need to interface with computersrecognize the most common phishing attack variants
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.
YOU MIGHT ALSO LIKE
COURSE CBROPS: Data & Attack Types