
Corso CCNP Security SCOR – Implementing and Operating Cisco Security Core Technologies
PANORAMICA

Corso di preparazione al conseguimento della
Certificazione Cisco CCNP Security SCOR
Esame 350-701 Parte della Certificazione Cisco CCNP Security
Implementing and Operating Cisco Security Core Technologies (SCOR)
Sintesi Statistica :
Corsi realizzati: 28;
Numero Corsisti: 204;
Superamento Esame: 89,20%
Contattaci ora per ricevere tutti i dettagli e per richiedere, senza alcun impegno, di parlare direttamente con uno dei nostri docenti CISCO CLICCA QUI.
Oppure chiamaci subito al nostro numero verde 800-177596.
OBIETTIVI DEL CORSO
Il Corso SCOR Implementing and Operating Cisco Security Core Technologies rappresenta il pilastro fondamentale del percorso tecnologico e di certificazione Security e prepara il partecipante all’esame Core della Certificazione CCNP Security (Esame 350-701). Il corso ha come obiettivo principale fornire ai partecipanti le conoscenze e le competenze necessarie per implementare e gestire tecnologie di sicurezza Cisco in un’ampia gamma di ambienti. Durante il corso, i partecipanti acquisiranno una comprensione approfondita dei principi e delle tecniche di sicurezza informatica, tra cui la gestione degli endpoint, la gestione delle identità e degli accessi, la gestione dei firewall e delle VPN, la gestione delle minacce avanzate e la gestione dei sistemi di sicurezza. Inoltre, i partecipanti apprenderanno a configurare e gestire tecnologie di sicurezza Cisco, come ASA, Firepower, VPN, IPS e AMP.
Il corso preparerà inoltre i partecipanti per l’esame di Certificazione CCNP Security SCOR attraverso la revisione degli argomenti del corso e la pratica di esercizi di simulazione. Alla fine del corso, i partecipanti saranno in grado di applicare le loro conoscenze per implementare e gestire tecnologie di sicurezza Cisco in un’ampia gamma di ambienti, nonché prepararsi per l’esame CCNP SCOR.
CONTENUTI DEL CORSO
Implementing and Operating Cisco Security Core Technologies (SCOR)
- Describing Information Security Concepts
- Information Security Overview
- Managing Risk
- Vulnerability Assessment
- Understanding CVSS
- Describing Common TCP/IP Attacks
- Legacy TCP/IP Vulnerabilities
- IP Vulnerabilities
- ICMP Vulnerabilities
- TCP Vulnerabilities
- UDP Vulnerabilities
- Attack Surface and Attack Vectors
- Reconnaissance Attacks
- Access Attacks
- Man-In-The-Middle Attacks
- Denial of Service and Distributed Denial of Service Attacks
- Reflection and Amplification Attacks
- Spoofing Attacks
- DHCP Attacks
- Describing Common Network Application Attacks
- Password Attacks
- DNS-Based Attacks
- DNS Tunneling
- Web-Based Attacks
- HTTP 302 Cushioning
- Command Injections
- SQL Injections
- Cross-Site Scripting and Request Forgery
- Email-Based Attacks
- Describing Common Endpoint Attacks
- Buffer Overflow
- Malware
- Reconnaissance Attack
- Gaining Access and Control
- Gaining Access via Social Engineering
- Gaining Access via Web-Based Attacks
- Exploit Kits and Rootkits
- Privilege Escalation
- Post-Exploitation Phase
- Angler Exploit Kit
- Describing Network Security Technologies
- Defense-in-Depth Strategy
- Defending Across the Attack Continuum
- Network Segmentation and Virtualization Overview
- Stateful Firewall Overview
- Security Intelligence Overview
- Threat Information Standardization
- Network-Based Malware Protection Overview
- IPS Overview
- Next Generation Firewall Overview
- Email Content Security Overview
- Web Content Security Overview
- Threat Analytic Systems Overview
- DNS Security Overview
- Authentication, Authorization, and Accounting Overview
- Identity and Access Management Overview
- Virtual Private Network Technology Overview
- Network Security Device Form Factors Overview
- Deploying Cisco ASA Firewall
- Cisco ASA Deployment Types
- Cisco ASA Interface Security Levels
- Cisco ASA Objects and Object Groups
- Network Address Translation
- Cisco ASA Interface ACLs
- Cisco ASA Global ACLs
- Cisco ASA Advanced Access Policies
- Cisco ASA High Availability Overview
- Deploying Cisco Firepower Next-Generation Firewall
- Cisco Firepower NGFW Deployments
- Cisco Firepower NGFW Packet Processing and Policies
- Cisco Firepower NGFW Objects
- Cisco Firepower NGFW NAT
- Cisco Firepower NGFW Prefilter Policies
- Cisco Firepower NGFW Access Control Policies
- Cisco Firepower NGFW Security Intelligence
- Cisco Firepower NGFW Discovery Policies
- Cisco Firepower NGFW IPS Policies
- Cisco Firepower NGFW Malware and File Policies
- Deploying Email Content Security
- Cisco Email Content Security Overview
- SMTP Overview
- Email Pipeline Overview
- Public and Private Listeners
- Host Access Table Overview
- Recipient Access Table Overview
- Mail Policies Overview
- Protection Against Spam and Graymail
- Anti-virus and Anti-malware Protection
- Outbreak Filters
- Content Filters
- Data Loss Prevention
- Email Encryption
- Deploying Web Content Security
- Cisco WSA Overview
- Deployment Options
- Network Users Authentication
- HTTPS Traffic Decryption
- Access Policies and Identification Profiles
- Acceptable Use Controls Settings
- Anti-Malware Protection
- Deploying Cisco Umbrella
- Cisco Umbrella Architecture
- Deploying Cisco Umbrella
- Cisco Umbrella Roaming Client
- Managing Cisco Umbrella
- Cisco Umbrella Investigate Overview
- Explaining VPN Technologies and Cryptography
- VPN Definition
- VPN Types
- Secure Communication and Cryptographic Services
- Keys in Cryptography
- Public Key Infrastructure
- Introducing Cisco Secure Site-to-Site VPN Solutions
- Site-to-Site VPN Topologies
- IPsec VPN Overview
- IPsec Static Crypto Maps
- IPsec Static Virtual Tunnel Interface
- Dynamic Multipoint VPN
- Cisco IOS FlexVPN
- Deploying Cisco IOS VTI-Based Point-to-Point
- Cisco IOS VTIs
- Static VTI Point-to-Point IPsec IKEv2 VPN Configuration
- Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW
- Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW
- Cisco ASA Point-to-Point VPN Configuration
- Cisco Firepower NGFW Point-to-Point VPN Configuration
- Introducing Cisco Secure Remote Access VPN Solutions
- Remote Access VPN Components
- Remote Access VPN Technologies
- SSL Overview
- Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW
- Remote Access Configuration Concepts
- Connection Profiles
- Group Policies
- Cisco ASA Remote Access VPN Configuration
- Cisco Firepower NGFW Remote Access VPN Configuration
- Explaining Cisco Secure Network Access Solutions
- Cisco Secure Network Access
- Cisco Secure Network Access Components
- AAA Role in Cisco Secure Network Access Solution
- Cisco Identity Services Engine
- Cisco TrustSec
- Describing 802.1X Authentication
- 1X and EAP
- EAP Methods
- Role of RADIUS in 802.1X Communications
- RADIUS Change of Authorization
- Configuring 802.1X Authentication
- Cisco Catalyst Switch 802.1X Configuration
- Cisco WLC 802.1X Configuration
- Cisco ISE 802.1X Configuration
- Supplicant 802.1x Configuration
- Cisco Central Web Authentication
- Describing Endpoint Security Technologies
- Host-Based Personal Firewall
- Host-Based Anti-Virus
- Host-Based Intrusion Prevention System
- Application Whitelists and Blacklists
- Host-Based Malware Protection
- Sandboxing Overview
- File Integrity Checking
- Deploying Cisco AMP for Endpoints
- Cisco AMP for Endpoints Architecture
- Cisco AMP for Endpoints Engines
- Retrospective Security with Cisco AMP
- Cisco AMP Device and File Trajectory
- Managing Cisco AMP for Endpoints
- Introducing Network Infrastructure Protection
- Identifying Network Device Planes
- Control Plane Security Controls
- Management Plane Security Controls
- Network Telemetry
- Layer 2 Data Plane Security Controls
- Layer 3 Data Plane Security Controls
- Deploying Control Plane Security Controls
- Infrastructure ACLs
- Control Plane Policing
- Control Plane Protection
- Routing Protocol Security
- Deploying Layer 2 Data Plane Security Controls
- Overview of Layer 2 Data Plane Security Controls
- VLAN-Based Attacks Mitigation
- STP Attacks Mitigation
- Port Security
- Private VLANs
- DHCP Snooping
- ARP Inspection
- Storm Control
- MACsec Encryption
- Deploying Layer 3 Data Plane Security Controls
- Infrastructure Antispoofing ACLs
- Unicast Reverse Path Forwarding
- IP Source Guard
Attività Laboratoriali
- Configure Network Settings And NAT On Cisco ASA
- Configure Cisco ASA Access Control Policies
- Configure Cisco Firepower NGFW NAT
- Configure Cisco Firepower NGFW Access Control Policy
- Configure Cisco Firepower NGFW Discovery and IPS Policy
- Configure Cisco NGFW Malware and File Policy
- Configure Listener, HAT, and RAT on Cisco ESA
- Configure Mail Policies
- Configure Proxy Services, Authentication, and HTTPS Decryption
- Enforce Acceptable Use Control and Malware Protection
- Examine the Umbrella Dashboard
- Examine Cisco Umbrella Investigate
- Explore DNS Ransomware Protection by Cisco Umbrella
- Configure Static VTI Point-to-Point IPsec IKEv2 Tunnel
- Configure Point-to-Point VPN between the Cisco ASA and Cisco Firepower NGFW
- Configure Remote Access VPN on the Cisco Firepower NGFW
- Explore Cisco AMP for Endpoints
- Perform Endpoint Analysis Using AMP for Endpoints Console
- Explore File Ransomware Protection by Cisco AMP for Endpoints Console
- Explore Cisco Stealthwatch Enterprise v6.9.3
- Explore CTA in Stealthwatch Enterprise v7.0
- Explore the Cisco Cloudlock Dashboard and User Security
- Explore Cisco Cloudlock Application and Data Security
- Explore Cisco Stealthwatch Cloud
- Explore Stealthwatch Cloud Alert Settings, Watchlists, and Sensors
TIPOLOGIA DEL CORSO
Corso di Formazione con Docente.
INFRASTRUTTURA LABORATORIALE
Per tutte le tipologie di erogazione, il Corsista può accedere alle attrezzature e ai sistemi reali Cisco presenti nei Nostri laboratori o direttamente presso i data center Cisco in modalità remota h24. Ogni partecipante dispone di un accesso per implementare le varie configurazioni avendo così un riscontro pratico e immediato della teoria affrontata.
Ecco di seguito alcune topologie di rete dei Laboratori Cisco Disponibili:


PREREQUISITI
Si consiglia la partecipazione al Corso Cisco CCNA e al Corso Cisco Cybersecurity.
DURATA E FREQUENZA
Durata Estensiva 60 Ore;
Durata Intensiva 5gg;
Varie tipologie di Frequenza Estensiva ed Intensiva.
DOCENTI
I docenti sono Istruttori Ufficiali pluri certificati Cisco e in altre tecnologie IT, con anni di esperienza pratica nel settore e nella Formazione.
MODALITÀ DI ISCRIZIONE
Le iscrizioni sono a numero chiuso per garantire ai tutti i partecipanti un servizio eccellente.
L’iscrizione avviene richiedendo di essere contattati dal seguente Link, o contattando la sede al numero verde 800-177596 o inviando una richiesta all’email [email protected].
CALENDARIO
- Corso Cisco SCOR (Formula Estensiva Serale) – 28/09/2023 – Mar. Gio. 18:30/21:30
- Corso Cisco SCOR (Formula Intensiva 5gg) – 22/01/2024- 9:00 – 17:00