CCNP Security SCOR (350-701) Training

Gain the expertise to design, build, and troubleshoot complex network infrastructure with our CCNP-SCOR (350-701) course.

(350-701.AP1) / ISBN : 978-1-64459-267-0
This course includes
Lessons
TestPrep
Hands-On Labs
AI Tutor (Add-on)
92 Reviews
Get A Free Trial

About This Course

Cyber threats are becoming increasingly sophisticated, demanding professionals to upgrade their network defenses. To upskill and reskill, join our CCNP Security Core SCOR 350-701 training course. It will enable you to tackle the challenges of modern network environments. Through a curriculum that covers topics such as network security fundamentals, threat analysis, security architecture, and incident response, you will gain the practical skills and theoretical understanding necessary to protect your organization’s valuable assets.

Skills You’ll Get

  • Recognize potential threats and risks to network security
  • Collect, preserve, and analyze digital evidence for incident response 
  • Understand and configure PKI for secure communication 
  • Use programmability to automate and secure network operations 
  • Utilize AAA protocols (TACACS+ and RADIUS) for secure access control 
  • Use tools like NetFlow and IPFIX to monitor and analyze network traffic 
  • Implement micro-segmentation and network segmentation for improved security 
  • Secure Layer 2 technologies like VLANs and STP, protect network management interfaces and routing protocols and maintain data integrity
  • Configure Cisco NGFWs for advanced threat protection 
  • Configure site-to-site and remote access VPNs using various protocols 
  • Enforce cloud security solutions like Cisco Umbrella and Cloudlock 
  • Configure content filtering solutions to block malicious content and implement web security measures to protect against web-based threats 
  • Deploy endpoint protection solutions to protect devices from malware

Interactive Lessons

13+ Interactive Lessons | 237+ Quizzes | 162+ Flashcards | 162+ Glossary of terms

Gamified TestPrep

100+ Pre Assessment Questions | 2+ Full Length Tests | 100+ Post Assessment Questions | 200+ Practice Test Questions

Hands-On Labs

54+ LiveLab | 55+ Video tutorials | 01:40+ Hours

1

Introduction

  • The CCNP Security Certification
  • The CCIE Security Certification
  • The Exam Objectives (Domains)
  • Steps to Pass the SCOR Exam
  • Facts About the Exam
2

Cybersecurity Fundamentals

  • Introduction to Cybersecurity
  • Defining What Are Threats, Vulnerabilities, and Exploits
  • Common Software and Hardware Vulnerabilities
  • Confidentiality, Integrity, and Availability
  • Cloud Security Threats
  • IoT Security Threats
  • An Introduction to Digital Forensics and Incident Response
  • Summary
  • Review All Key Topics
3

Cryptography

  • Introduction to Cryptography
  • Fundamentals of PKI
  • Review All Key Topics
4

Software-Defined Networking Security and Network Programmability

  • Introduction to Software-Defined Networking
  • Introduction to Network Programmability
  • Review All Key Topics
5

Authentication, Authorization, Accounting (AAA) and Identity Management

  • Introduction to Authentication, Authorization, and Accounting
  • Authentication
  • Authorization
  • Accounting
  • Infrastructure Access Controls
  • AAA Protocols
  • Cisco Identity Services Engine (ISE)
  • Configuring TACACS+ Access
  • Configuring RADIUS Authentication
  • Additional Cisco ISE Design Tips
  • Review All Key Topics
6

Network Visibility and Segmentation

  • Introduction to Network Visibility
  • NetFlow
  • IP Flow Information Export (IPFIX)
  • NetFlow Deployment Scenarios
  • Cisco Stealthwatch
  • Cisco Cognitive Threat Analytics (CTA) and Encrypted Traffic Analytics (ETA)
  • NetFlow Collection Considerations and Best Practices
  • Configuring NetFlow in Cisco IOS and Cisco IOS-XE
  • Configuring NetFlow in NX-OS
  • Introduction to Network Segmentation
  • Micro-Segmentation with Cisco ACI
  • Segmentation with Cisco ISE
  • Review All Key Topics
7

Infrastructure Security

  • Securing Layer 2 Technologies
  • Common Layer 2 Threats and How to Mitigate Them
  • Network Foundation Protection
  • Understanding and Securing the Management Plane
  • Understanding the Control Plane
  • Understanding and Securing the Data Plane
  • Securing Management Traffic
  • Implementing Logging Features
  • Configuring NTP
  • Securing the Network Infrastructure Device Image and Configuration Files
  • Securing the Data Plane in IPv6
  • Securing Routing Protocols and the Control Plane
  • Review All Key Topics
8

Cisco Next-Generation Firewalls and Cisco Next-Generation Intrusion Prevention Systems

  • Introduction to Cisco Next-Generation Firewalls ...-Generation Intrusion Prevention Systems (NGIPS)
  • Comparing Network Security Solutions That Provide Firewall Capabilities
  • Deployment Modes of Network Security Solutions and Architectures That Provide Firewall Capabilities
  • High Availability and Clustering
  • Implementing Access Control
  • Cisco Firepower Intrusion Policies
  • Cisco Advanced Malware Protection (AMP)
  • Security Intelligence, Security Updates, and Keeping Firepower Software Up to Date
  • Review All Key Topics
9

Virtual Private Networks (VPNs)

  • Virtual Private Network (VPN) Fundamentals
  • Deploying and Configuring Site-to-Site VPNs in Cisco Routers
  • Configuring Site-to-Site VPNs in Cisco ASA Firewalls
  • Configuring Remote Access VPNs in the Cisco ASA
  • Configuring Clientless Remote Access SSL VPNs in the Cisco ASA
  • Configuring Client-Based Remote-Access SSL VPNs in the Cisco ASA
  • Configuring Remote Access VPNs in FTD
  • Configuring Site-to-Site VPNs in FTD
  • Review All Key Topics
10

Securing the Cloud

  • What Is Cloud and What Are the Cloud Service Models?
  • DevOps, Continuous Integration (CI), Continuous Delivery (CD), and DevSecOps
  • Describing the Customer vs. Provider Security Responsibility for the Different Cloud Service Models
  • Cisco Umbrella
  • Cisco Email Security in the Cloud
  • Cisco Cloudlock
  • Stealthwatch Cloud
  • AppDynamics Cloud Monitoring
  • Cisco Tetration
  • Review All Key Topics
11

Content Security

  • Content Security Fundamentals
  • Cisco WSA
  • Cisco ESA
  • Cisco Content Security Management Appliance (SMA)
  • Review All Key Topics
12

Endpoint Protection and Detection

  • Introduction to Endpoint Protection and Detection
  • Cisco AMP for Endpoints
  • Cisco Threat Response
  • Review All Key Topics
13

Final Preparation

  • Hands-on Activities
  • Suggested Plan for Final Review and Study
  • Summary

1

Cybersecurity Fundamentals

  • Conducting Vulnerability Scanning Using Nessus
  • Completing the Chain of Custody
2

Cryptography

  • Configuring IPSec
  • Generating an RSA Key Pair
  • Generating an Asymmetric Key
  • Using OpenSSL to Create a Public/Private Key Pair
3

Authentication, Authorization, Accounting (AAA) and Identity Management

  • Understanding MAC Bypass
  • Configuring the AAA Router for TACACS+ Authentication
4

Network Visibility and Segmentation

  • Configuring a Flow Record
  • Configuring a Flow Monitor for IPv4 or IPv6
  • Defining a Flow Record in Cisco NX-OS
  • Defining a Flow Exporter in Cisco NX-OS
  • Defining a Flow Monitor with a Custom Record in Cisco NX-OS Software
5

Infrastructure Security

  • Configuring Interfaces as Trunk Ports
  • Configuring Router-on-a-Stick and Switch Support for a Router
  • Configuring PortFast and Rapid Spanning Tree
  • Implementing BPDU Guard on a Switch Port
  • Implementing Port Security
  • Configuring DHCP Snooping
  • Locking Down Switch Ports Administratively
  • Enabling AAA Services and Working with Method Lists
  • Creating and Working with Parser Views
  • Preparing SSH in a Router
  • Configuring a Router to Use NTP Services
  • Creating a Secure Bootset
  • Configuring the IPv6 ACL
  • Configuring IPv6
  • Configuring and Displaying Control Plane Policing
  • Configuring the BGP MD5 Authentication Process between BGP Peers
  • Configuring the OSPF MD5 Authentication Process
  • Configuring the EIGRP MD5 Authentication Process
  • Configuring the RIPv2 MD5 Authentication Process
6

Cisco Next-Generation Firewalls and Cisco Next-Generation Intrusion Prevention Systems

  • Configuring Cisco ASA Application Inspection
  • Configuring the Cisco ASA To-The-Box Traffic Filtering
  • Configuring Static NAT
  • Configuring a Standard ACL
  • Configuring Dynamic PAT
  • Configuring Dynamic NAT
7

Virtual Private Networks (VPNs)

  • Implementing IPsec VPNs through CLI
  • Configuring the GRE Tunnel Interface
  • Configuring and Viewing DMVPN Phase 1
  • Configuring Site-to-Site IPsec VPN Topology
  • Configuring the Cisco ASA Remote Access IPsec VPN IKEv2 Policy, IPsec Policy, and Dynamic Crypto Map
  • Configuring the Group Policy in the Cisco ASA
  • Creating the IP Pool for VPN Clients
  • Creating the Tunnel Group for Remote Access VPN Clients
  • Configuring Clientless SSL VPNs on ASA
  • Enrolling in the Manual Certificate
  • Configuring a Tunnel Group for Clientless SSL VPN
  • Configuring the Cisco ASA to Authenticate Users Using a RADIUS Server
  • Defining a WebType ACL
  • Defining the RADIUS Server for Client-Based SSL VPN
  • Configuring Split Tunneling
8

Content Security

  • Configuring PBR in a Cisco Router

Any questions?
Check out the FAQs

Read more about our Cisco CCNP security core (350-701 SCOR) training course.

Contact Us Now

The CCNP security certification is a professional-level certification offered by Cisco that validates your skills and knowledge in securing Cisco networks. The certification requires passing the core exam, SCOR 350-701(Implementing and Operating Cisco Security Core Technologies), which covers essential security concepts, including network security, cloud security, content security, endpoint protection, and secure network access.

Our course covers a range of topics such as: 

  • Security concepts 
  • Network security
  • Cloud security 
  • Content security 
  • Endpoint protection and detection 
  • Secure network access, visibility, and enforcement

This course is ideal for network security engineers, security administrators, and anyone looking to advance their skills in implementing and operating core security technologies.

It is recommended that candidates should have a good understanding of network fundamentals, including IP addressing and routing concepts.

Earning the CCNP SCOR certification opens up various career opportunities, such as: 

  • Network security engineer
  • Security administrator 
  • Security consultant 
  • Senior network engineer 
  • Cybersecurity analyst 

Professionals with the SCOR certification typically see an increase in their earning potential. On average, certified professionals earn between $90,000 to $130,000 per year.

scroll to top