SCOR: VPNs, Security Intelligence, & Social Engineering Attacks

Cisco SCOR    |    Expert
  • 4 Videos | 1h 20m 32s
  • Includes Assessment
  • Earns a Badge
There is no denying it, VPN is a hugely popular part of the modern Internet. In this course, you'll learn about different types of VPN, its uses, and various technologies you can use. Next, you'll explore security devices and their ability to help you author, share, and consume security intelligence data. You'll examine social engineering attacks that are very prevalent today, including how to protect against them and the software you can use for defense. Finally, you'll learn about some of the most common attacks today, including many different variations of phishing attacks. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.

WHAT YOU WILL LEARN

  • identify characteristics of Cisco remote access VPN solutions
    identify characteristics of Cisco site-to-site VPN options
    identify limitations of various Cisco VPN configurations
    recognize the specific features associated with different VPN technologies
    identify the basic elements used to create modern automated security intelligence
    Recognize the advantages of using advanced security devices to keep up with security intelligence needs
  • identify the benefits and limits of using Cisco software to defend against phishing attacks
    recognize how to protect against a phishing attack
    recognize the benefits of using Cisco software to defend against social engineering attacks
    identify different technologies that integrate with different types of phishing attacks
    identify social engineering attacks that initially do not need to interface with computers
    recognize the most common phishing attack variants

IN THIS COURSE

  • Locked
    1. 
    VPN Options
    22m 16s
  • Locked
    2. 
    Security Intelligence Authoring, Sharing, and Consumption
    11m 35s
  • Locked
    3. 
    Endpoint Protections for Social Engineering Attacks
    19m 58s
  • Locked
    4. 
    Types of Social Engineering Attacks
    20m 44s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.