
350-701: Implementing and Operating Cisco Security Core Technologies Certification Video Training Course
The complete solution to prepare for for your exam with 350-701: Implementing and Operating Cisco Security Core Technologies certification video training course. The 350-701: Implementing and Operating Cisco Security Core Technologies certification video training course contains a complete set of videos that will provide you with thorough knowledge to understand the key concepts. Top notch prep including Cisco SCOR 350-701 exam dumps, study guide & practice test questions and answers.
350-701: Implementing and Operating Cisco Security Core Technologies Certification Video Training Course Exam Curriculum
Cisco Certifications - CCNP SCOR
-
1. Cisco Certification Updates - FEB 2020
-
2. Cisco Re-Certifications
-
3. CCNP Certifications
-
4. CCIE Certifications
-
5. Cisco Certification Migration Options
-
6. CCNP Required Exams
Security Core - 350-701
-
1. CCNP Security Certifications
-
2. CCNP SCOR - 350-701
-
3. SCOR 350-701 Contents
Network Security Concepts
-
1. Network Security Terminology
-
2. Goals of Network Security
-
3. Threat Types - Mitigation
-
4. Assets - Classification of Assets
-
5. Classify Counter Measures
-
6. Classify Vulnerabilities
-
7. Network Security - Design Principles
Common Security Attacks - Mitigation
-
1. Motivations behind Network Attacks
-
2. Social Engineering Attacks
-
3. Phishing Attacks
-
4. Social Engineering Attacks
-
5. Denial of Service Attacks - DoS
-
6. Distributed Denial of Service Attakcs - DDoS
-
7. Spoofing Attacks
-
8. Spoofing Attacks - Mitigation
-
9. Man in the Middle Attacks -MiTM
-
10. Password Attacks
-
11. Password Attacks - Mitigation
-
12. Reflector Attacks
-
13. Amplification Attacks
-
14. Reconnaissance Attacks
-
15. Reconnaissance Attacks - Mitigation
Malicious Codes - Hacking
-
1. Malicious Codes - VIRUS
-
2. Malicious Codes - WORMS
-
3. Malicious Codes - TROJAN HORSES
-
4. Hacking
-
5. Hackers - Script Kiddies
-
6. Malware Service - DARKNET
Threat Defense Technologies
-
1. AAA - Network Security
-
2. Cisco Telemetry Services
-
3. Firewall
-
4. Intrusion Prevention System - IPS
-
5. Virtual Private Networks
-
6. Next Generation Firewalls
Virtual Labs - GNS3 Setup
-
1. Cisco Lab Options
-
2. About GNS3
-
3. Installing GNS3 - Windows
-
4. GNS3 - IOS Images
-
5. Default Topology - GNS3 - IOS initial Configs
-
6. IOS Default Topology
-
7. GNS3 Topology-HOST Computer
-
8. GNS3 - VMware Setup
-
9. GNS3 - IOSv L2-L3
-
10. GNS3 - ASAv Setup
-
11. GNS3 - IOU-L2-L3
Network Infrastructure Protection
-
1. Network Infrastructure Protection
-
2. Identify Network Device Planes
-
3. Data Plane
-
4. Control Plane
-
5. Management Plane
Remote Management- TELNET - SSH
-
1. Inband Vs OutBand Management
-
2. Remote Access - TELNET
-
3. Remote Access - SSH
Cisco Telemetry Services
-
1. Cisco Telemetry Services
-
2. Device- Network Events Logging
-
3. Syslog - Terminal Logging
-
4. Network Time Protocol
-
5. NTP Stratum Value
-
6. NTP Configuration - LAB
Control Plane Security
-
1. Control Plane Security - Possible Threats
-
2. Routing Protocol Authentication
-
3. Control Plane Policing - CoPP
-
4. Class-Map - Policy Map - Hierarchy
-
5. CoPP - Configuration Examples
L2-Security Basic
-
1. Switch Security - Overview
-
2. Disable Unused Ports
-
3. Dynamic Trunking Protocol - DTP
-
4. DTP Vulnerabilities - Mitigation
-
5. VLAN Hopping Attacks - Mitigation
-
6. Cisco Discovery Protocol - CDP
-
7. Link Layer Discovery Protocol - LLDP
-
8. CDP- LLDP Vulnerabilities - Mitigation
L2-Security Advanced
-
1. MAC Flooding Attack - Port Security
-
2. MAC Spoofing Attack - Port Security
-
3. Port Security - Configuration
-
4. Spanning Tree Port Fast
-
5. Native VLAN
-
6. DHCP Spoofing Attack - DHCP Spoofing
-
7. DHCP Snooping - Configuration
-
8. DHCP Starvation Attack - Mitigation
-
9. ARP Spoofing Attack - DAI
-
10. Dynamic ARP Inspection - Configuration
-
11. Protected Ports- Private VLAN Edge
-
12. Private VLAN
-
13. Private VLAN - Configuration
-
14. Private VLAN - LAB
Firewalls
-
1. What is Firewall
-
2. Statefull Packet Filtering
-
3. Stateless Packet Filtering
-
4. Application Level Gateways - Proxy Servers
-
5. Next Generation Firewalls
-
6. FIrewall Vendors in Market
Cisco ASA Firewall
-
1. Cisco Statefull Firewalls - IOS - ASA
-
2. ASA Supported Features _ PART1
-
3. ASA Supported Features _ PART2
-
4. ASS Compare Models
Cisco ASA Configuration
-
1. Manage Cisco CLI - ASA - GUI
-
2. Basic CLI Modes - Commands
-
3. ASA Security Levels
-
4. ASA Interface Configurations
-
5. ASA Security Policies - Default
-
6. ASA Routing
ASA ACLs - Object Groups
-
1. ASA ACls - Overview
-
2. ASA ACLS - Basic Example
-
3. Traffic Between Same Security Levels
-
4. ACL Object Groups
-
5. ACL Object Groups - LAB
ASA _ Network Address Translation (NAT)
-
1. PRivate IP - Public IP
-
2. What is NAT ?
-
3. NAT Types
-
4. Dynamic NAT - on ASA
-
5. Dynamic PAT- ASA
-
6. Dynamic PAT - with Exit interface
-
7. Dynamic NAT-PAT Combination
-
8. Static NAT - ASA
-
9. Static PAT- ASA
IOS - Zone Based Firewall
-
1. IOS - Zone Based Firewall
-
2. ZBF - Configuration Overview
-
3. ZBF - Security Zones
-
4. ZBF - Default Flow
-
5. Class-Map - Policy Map - Hierarchy
-
6. ZBF - Classify Traffic using Class-Maps
-
7. ZBF- Class-map Configuration
-
8. ZBF - POlicy Map - Zone Pairs
Cryptography
-
1. What is Cryptography
-
2. Goals of Cryptography
-
3. Hashing-How it Works
-
4. Hashing with HMAC
-
5. What is Encryption - Decryption
-
6. Encryption Algorithms - Symmetric vs Assymetric
-
7. Cryptanalysis - Attacks
-
8. Asymmetric Encryption - Drawbacks
-
9. Public Key Infrastructure - PKI
VPN foundations
-
1. Virutal Private Network - Introduction
-
2. VPN Types - Site to Site / Remote Access
-
3. VPN Logical Topologies
-
4. VPN Default Lab Setup - Routers
IPSec - IP Protocol Security
-
1. What is IPSec ?
-
2. IPsec Security Services
-
3. IPSec Modes - Tunnel vs Transport
Site to Site IPSEC VPN
-
1. How IPsec VPN Works
-
2. Step-1 - Interesting Traffic
-
3. Step-2 IKE Phase-1
-
4. Step-3 - IKE Phase 2
-
5. IKE Phase 2 - Configuration/ Verification
Remote Access VPN
-
1. Remote Access VPN
-
2. What is SSL-TLS
-
3. How SSL-TLS Works
-
4. What is SSL VPN
-
5. SSL VPN - Modes
Authentication, Authorization, Accounting - AAA
-
1. AAA - Network Security
-
2. AAA - Components
-
3. AAA Protocols - TACACS - RADIUS
-
4. AAA- Cisco Authentication Servers
AAA Authentication
-
1. AAA Authentication - Device Access
-
2. Authentication Local database
-
3. AAA External Servers
-
4. Authentication - External server (TACACS)
AAA Authorization
-
1. Authorization - Device Access
-
2. IOS Privilege Levels
-
3. Local Authorization using Privilege Levels
-
4. IOS Privilege Levels _ Limitations
-
5. Role based CLI Access - RBAC
-
6. RBAC Views - Types
-
7. RBAC Views - LAB1
-
8. Modify RBAC Views - LAB 2
-
9. Modify RBAC Views - LAB 3
-
10. RBAC - Super Views
WEb Traffic - Attacks- Solutions
-
1. Web Access - Possible Threats
-
2. Web Based Attacks-
-
3. Web Attack Examples
-
4. Web Security Solutions
CIsco Web Security Appliance - WSA
-
1. Cisco Web Security - WSA-CWS
-
2. What is WSA ?
-
3. WSA- HOw it Works
-
4. WSA Deployment Modes
-
5. WSA models - Physical -Virtual Appliance
-
6. WSA Licensing Options
Email Security _ ESA
-
1. Email Based Threats
-
2. Cisco Email Security Appliance - ESA
Intrusion Prevention System - IPS
-
1. Intrusion Prevention System - IPS
-
2. IDS vs IPS
-
3. Host Based IPS vs Network Based IPS
-
4. IPS Deployment Modes - INline vs Promiscious
-
5. Cisco IPS Solutions
-
6. IPS Threat Detection Methods
-
7. IPS Signature Alarm Types
-
8. IPS Signature Actions
-
9. IPS Evasion Methods - CounterMeasures
Network Management
-
1. What is Network Management
-
2. Past-Present Methods of Network Mangement- PART 1
-
3. Past-Present Methods of Network Mangement- PART 2
-
4. SNMP- Simple Network Mangement Protocol
Network Automation
-
1. Challenges - Traditional Management
-
2. Network Automation - Goals
-
3. Types of Network Automation
-
4. What can be Automated - PART 1
-
5. What can be Automated - PART 2
-
6. Impact of Network Automation
SDN & SDN Controllers
-
1. Automation Origination Points
-
2. SDN - Software Defined Networking
-
3. SDN Controllers
-
4. Networks Managed by SDN Controllers
SDN-Control-MGMT-DATA Plane
-
1. Management Plane
-
2. SDN-Management Plane
SDN Models - Architecture
-
1. SDN - Imperative Model
-
2. SDN - Declarative Model
-
3. SDN - Network Design Requirments
-
4. UNderlaY Networks
-
5. Overlay Networks
-
6. SDN Fabric
Application Programming Interface - API
-
1. Application Programming Interface - API
-
2. API Types
-
3. API - With SDN Networks
-
4. NorthBound API
-
5. SouthBound API
Cisco DEVNET - SANDBOXs
-
1. Cisco DevNet
-
2. DevNet Certifications
-
3. DevNet Sandbox
-
4. DevNet Sandbox LABS
-
5. Sandbox LAB Access - Reservations
Cisco DNA Center
-
1. Cisco DNA Center
-
2. DNA Center Appliance
-
3. DNA Center- What can do - PART 1
-
4. DNA Center- What can do - PART 2
Web Service API - REST API
-
1. Web Service API
-
2. Web Service API - Commonly Used
-
3. REST API
Network Automation Tools
-
1. Config Management Tools
-
2. Config Management Tools - Capabilities
-
3. Master-Agent
-
4. Agent Based vs Agentless
-
5. Push-Pull Model
-
6. Configuration Files
PUPPET - Config MGMT Tool
-
1. PUPPET - Config MGMT Tool
-
2. PUPPET-Master Agent Database
-
3. PUPPET - Manifest
-
4. PUPPET-Module-Forge
-
5. PUPPET-Agent- Agentless
-
6. PUPPET-PULL Model Steps
CHEF- Config MGMT Tool
-
1. CHEF- Config MGMT Tool
-
2. CHEF- Terminology
ANSIBLE- COnfig MGMT Tool
-
1. ANSIBLE- COnfig MGMT Tool
-
2. ANSIBLE- Control Station
-
3. ANSIBLE- PlayBook-Inventory
-
4. ANSIBLE- Templates-Variables
JSON Data Encoding
-
1. API Data Formats
-
2. JSON Overview
-
3. JSON Data Types
-
4. JSON Syntax Rules
-
5. JSON Data Interpretation
About 350-701: Implementing and Operating Cisco Security Core Technologies Certification Video Training Course
350-701: Implementing and Operating Cisco Security Core Technologies certification video training course by prepaway along with practice test questions and answers, study guide and exam dumps provides the ultimate training package to help you pass.
Prepaway's 350-701: Implementing and Operating Cisco Security Core Technologies video training course for passing certification exams is the only solution which you need.
Pass Cisco SCOR 350-701 Exam in First Attempt Guaranteed!
Get 100% Latest Exam Questions, Accurate & Verified Answers As Seen in the Actual Exam!
30 Days Free Updates, Instant Download!

350-701 Premium Bundle
- Premium File 595 Questions & Answers. Last update: Jun 09, 2025
- Training Course 299 Video Lectures
- Study Guide 701 Pages
Free 350-701 Exam Questions & Cisco 350-701 Dumps | ||
---|---|---|
Cisco.realtests.350-701.v2025-05-02.by.holly.179q.ete |
Views: 491
Downloads: 619
|
Size: 1.88 MB
|
Cisco.examlabs.350-701.v2021-05-21.by.zachary.140q.ete |
Views: 799
Downloads: 1975
|
Size: 1.72 MB
|
Cisco.examcollection.350-701.v2021-04-26.by.austin.113q.ete |
Views: 324
Downloads: 1737
|
Size: 1.5 MB
|
Cisco.selftesttraining.350-701.v2021-03-22.by.giovanni.97q.ete |
Views: 353
Downloads: 1749
|
Size: 369.38 KB
|
Cisco.testkings.350-701.v2021-01-06.by.brahim.81q.ete |
Views: 526
Downloads: 1931
|
Size: 806.84 KB
|
Cisco.testking.350-701.v2020-10-09.by.caleb.61q.ete |
Views: 1087
Downloads: 2496
|
Size: 581.61 KB
|
Student Feedback
Can View Online Video Courses
Please fill out your email address below in order to view Online Courses.
Registration is Free and Easy, You Simply need to provide an email address.
- Trusted By 1.2M IT Certification Candidates Every Month
- Hundreds Hours of Videos
- Instant download After Registration
A confirmation link will be sent to this email address to verify your login.
Please Log In to view Online Course
Registration is free and easy - just provide your E-mail address.
Click Here to Register