CCNP and CCIE Security Core SCOR 350 - 701 Exam cram

booksz

U P L O A D E R
be727bf8ade1898c8186c3d057bf69a0.jpg

Free Download CCNP and CCIE Security Core SCOR 350-701 Exam cram
English | 2024 | ISBN: 0137282516 | 461 Pages | PDF | 16 MB
CCNP and CCIE Security Core SCOR 350-701 Exam Cram is the perfect study guide to help you pass the Cisco SCOR 350-701 exam, a core requirement for your CCNP or CCIE Security certification. This guide delivers expert coverage and practice questions for every exam topic, including network, cloud, and content security; endpoint protection and detection; secure network access; and visibility and enforcement. It also offers comprehensive, proven preparation tools, including:



Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Links are Interchangeable - Single Extraction
 
Kommentar
14e2171c40d54fed53ef334941bb484d.jpg


Ccnp Security - Core Scor-350-701
Last updated 4/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English​
| Size: 14.05 GB[/center]
| Duration: 29h 51m
Implementing and Operating Cisco Security Core Technologies (SCOR 350-701)

What you'll learn
Network security
Content security
Secure network access
SDN and Network Automation Concepts
Cloud security
Requirements
CCNA routing and Switching Knowledge
Description
This exam tests your knowledge of implementing and operating core security technologies, including:Network securityCloud securityContent securityEndpoint protection and detectionSecure network accessVisibility and enforcementSDN and Network Automation ConceptsSoftware and networking become more and more interconnected every day.Security teams can take advantage of automation to scale their security solutions.Today's security professionals need a broader range of skills and deeper focus in strategic technology areas.The new CCNP Security certification program gives you exactly that breadth and depth.The core exam, (SCOR 350-701)Focuses on your knowledge of security infrastructure including network security, cloud security, content security, endpoint protection and detection, secure network access, visibility, and enforcementsThe core exam is also the qualifying exam for CCIE Security Certification.

Overview

Section 1: Cisco Certifications - CCNP SCOR

Lecture 1 About Cisco

Lecture 2 Cisco Certification Updates - FEB 2020

Lecture 3 Cisco Re-Certifications

Lecture 4 CCNP Certifications

Lecture 5 CCIE Certifications

Lecture 6 Cisco Certification Migration Options

Lecture 7 CCNP Required Exams

Section 2: WORKBOOKS DOWNLOAD LINKS - IMAGES DOWNLOAD

Lecture 8 WORKBOOKS DOWNLOAD LINKS - IMAGES DOWNLOAD

Section 3: GNS3 - Virtual LABS

Lecture 9 Cisco Lab Options

Lecture 10 Supported Virtual Images - GNS3- EVE-ng

Lecture 11 About GNS3

Lecture 12 Installing GNS3 on Windows

Lecture 13 GNS3 - Adding IOS Images

Lecture 14 Default Topology- IOS Routers -Initial Configurations

Lecture 15 IOS Default Topology

Lecture 16 Connecting GNS3 Topology to Host Computer

Lecture 17 GNS3- VMWARE Integration

Lecture 18 GNS3 - IOSv L2-L3 Configuration Steps

Lecture 19 GNS3 - ASAv Setup

Lecture 20 GNS3- IOU- L2-L3 Configuration Steps

Section 4: EVE-NG Virtual Platform

Lecture 21 EVE-NG Virtual Platform

Lecture 22 EVE-nG Professional License

Lecture 23 IOL Devices - EVE-nG

Lecture 24 Upload SD-WAN Images - EVE-NG

Lecture 25 Adding Viptela Devices - EVE-NG Lab

Lecture 26 ASA - EVE-NG

Lecture 27 Windows - EVE-NG

Lecture 28 ASA 8.4 Image - EVE-NG

Lecture 29 Connecting Window's PC- EVE-Topology

Lecture 30 Connecting Windows PC - Internet

Lecture 31 CSR1000v - EVE-NG

Section 5: Security Core - 350-701

Lecture 32 CCNP Security Certifications

Lecture 33 CCNP SCOR - 350-701

Lecture 34 SCOR 350-701 Contents

Section 6: Network Security Concepts

Lecture 35 Network Security Terminology

Lecture 36 Goals of Network Security

Lecture 37 Threat Types - Mitigation

Lecture 38 Assets - Classification of Assets

Lecture 39 Classify Counter Measures

Lecture 40 Classify Vulnerabilities

Lecture 41 Network Security - Design Principles

Section 7: Common Security Attacks - Mitigation

Lecture 42 Motivations behind Network Attacks

Lecture 43 Social Engineering Attacks

Lecture 44 Phishing Attacks

Lecture 45 Social Engineering Attacks

Lecture 46 Denial of Service Attacks - DoS

Lecture 47 Distributed Denial of Service Attakcs - DDoS

Lecture 48 Spoofing Attacks

Lecture 49 Spoofing Attacks - Mitigation

Lecture 50 Man in the Middle Attacks -MiTM

Lecture 51 Password Attacks

Lecture 52 Password Attacks - Mitigation

Lecture 53 Reflector Attacks

Lecture 54 Amplification Attacks

Lecture 55 Reconnaissance Attacks

Lecture 56 Reconnaissance Attacks - Mitigation

Section 8: Malicious Codes - Hacking

Lecture 57 Malicious Codes - VIRUS

Lecture 58 Malicious Codes - WORMS

Lecture 59 Malicious Codes - TROJAN HORSES

Lecture 60 Hacking

Lecture 61 Hackers - Script Kiddies

Lecture 62 Malware Service - DARKNET

Section 9: Threat Defense Technologies

Lecture 63 AAA - Network Security

Lecture 64 Cisco Telemetry Services

Lecture 65 Firewall

Lecture 66 Intrusion Prevention System - IPS

Lecture 67 Virtual Private Networks

Lecture 68 Next Generation Firewalls

Section 10: Virtual Labs - GNS3 Setup

Lecture 69 Cisco Lab Options

Lecture 70 About GNS3

Lecture 71 Installing GNS3 - Windows

Lecture 72 GNS3 - IOS Images

Lecture 73 Default Topology - GNS3 - IOS initial Configs

Lecture 74 IOS Default Topology

Lecture 75 GNS3 Topology-HOST Computer

Lecture 76 GNS3 - VMware Setup

Lecture 77 GNS3 - IOSv L2-L3

Lecture 78 GNS3 - ASAv Setup

Lecture 79 GNS3 - IOU-L2-L3

Section 11: Network Infrastructure Protection

Lecture 80 Network Infrastructure Protection

Lecture 81 Identify Network Device Planes

Lecture 82 Data Plane

Lecture 83 Control Plane

Lecture 84 Management Plane

Section 12: Remote Management- TELNET - SSH

Lecture 85 Inband Vs OutBand Management

Lecture 86 Remote Access - TELNET

Lecture 87 Remote Access - SSH

Section 13: Cisco Telemetry Services

Lecture 88 Cisco Telemetry Services

Lecture 89 Device- Network Events Logging

Lecture 90 Syslog - Terminal Logging

Lecture 91 Network Time Protocol

Lecture 92 NTP Stratum Value

Lecture 93 NTP Configuration - LAB

Section 14: Control Plane Security

Lecture 94 Control Plane Security - Possible Threats

Lecture 95 Routing Protocol Authentication

Lecture 96 Control Plane Policing - CoPP

Lecture 97 Class-Map - Policy Map - Hierarchy

Lecture 98 CoPP - Configuration Examples

Section 15: L2-Security Basic

Lecture 99 Switch Security - Overview

Lecture 100 Disable Unused Ports

Lecture 101 Dynamic Trunking Protocol - DTP

Lecture 102 DTP Vulnerabilities - Mitigation

Lecture 103 VLAN Hopping Attacks - Mitigation

Lecture 104 Cisco Discovery Protocol - CDP

Lecture 105 Link Layer Discovery Protocol - LLDP

Lecture 106 CDP- LLDP Vulnerabilities - Mitigation

Section 16: L2-Security Advanced

Lecture 107 MAC Flooding Attack - Port Security

Lecture 108 MAC Spoofing Attack - Port Security

Lecture 109 Port Security - Configuration

Lecture 110 Spanning Tree Port Fast

Lecture 111 Native VLAN

Lecture 112 DHCP Spoofing Attack - DHCP Spoofing

Lecture 113 DHCP Snooping - Configuration

Lecture 114 DHCP Starvation Attack - Mitigation

Lecture 115 ARP Spoofing Attack - DAI

Lecture 116 Dynamic ARP Inspection - Configuration

Lecture 117 Protected Ports- Private VLAN Edge

Lecture 118 Private VLAN

Lecture 119 Private VLAN - Configuration

Lecture 120 Private VLAN - LAB

Section 17: Firewalls

Lecture 121 What is Firewall

Lecture 122 Statefull Packet Filtering

Lecture 123 Stateless Packet Filtering

Lecture 124 Application Level Gateways - Proxy Servers

Lecture 125 Next Generation Firewalls

Lecture 126 FIrewall Vendors in Market

Section 18: Cisco ASA Firewall

Lecture 127 Cisco Statefull Firewalls - IOS - ASA

Lecture 128 ASA Supported Features _ PART1

Lecture 129 ASA Supported Features _ PART2

Lecture 130 ASS Compare Models

Section 19: Cisco ASA Configuration

Lecture 131 Manage Cisco CLI - ASA - GUI

Lecture 132 Basic CLI Modes - Commands

Lecture 133 ASA Security Levels

Lecture 134 ASA Interface Configurations

Lecture 135 ASA Security Policies - Default

Lecture 136 ASA Routing

Section 20: ASA ACLs - Object Groups

Lecture 137 ASA ACls - Overview

Lecture 138 ASA ACLS - Basic Example

Lecture 139 Traffic Between Same Security Levels

Lecture 140 ACL Object Groups

Lecture 141 ACL Object Groups - LAB

Section 21: ASA _ Network Address Translation (NAT)

Lecture 142 PRivate IP - Public IP

Lecture 143 What is NAT ?

Lecture 144 NAT Types

Lecture 145 Dynamic NAT - on ASA

Lecture 146 Dynamic PAT- ASA

Lecture 147 Dynamic PAT - with Exit interface

Lecture 148 Dynamic NAT-PAT Combination

Lecture 149 Static NAT - ASA

Lecture 150 Static PAT- ASA

Section 22: IOS - Zone Based Firewall

Lecture 151 IOS - Zone Based Firewall

Lecture 152 ZBF - Configuration Overview

Lecture 153 ZBF - Security Zones

Lecture 154 ZBF - Default Flow

Lecture 155 Class-Map - Policy Map - Hierarchy

Lecture 156 ZBF - Classify Traffic using Class-Maps

Lecture 157 ZBF- Class-map Configuration

Lecture 158 ZBF - POlicy Map - Zone Pairs

Section 23: Cryptography

Lecture 159 What is Cryptography

Lecture 160 Goals of Cryptography

Lecture 161 Hashing-How it Works

Lecture 162 Hashing with HMAC

Lecture 163 What is Encryption - Decryption

Lecture 164 Encryption Algorithms - Symmetric vs Assymetric

Lecture 165 Cryptanalysis - Attacks

Lecture 166 Asymmetric Encryption - Drawbacks

Lecture 167 Public Key Infrastructure - PKI

Section 24: VPN foundations

Lecture 168 Virutal Private Network - Introduction

Lecture 169 VPN Types - Site to Site / Remote Access

Lecture 170 VPN Logical Topologies

Lecture 171 VPN Default Lab Setup - Routers

Section 25: IPSec - IP Protocol Security

Lecture 172 What is IPSec ?

Lecture 173 IPsec Security Services

Lecture 174 IPSec Modes - Tunnel vs Transport

Section 26: Site to Site IPSEC VPN

Lecture 175 How IPsec VPN Works

Lecture 176 Step-1 - Interesting Traffic

Lecture 177 Step-2 IKE Phase-1

Lecture 178 Step-3 - IKE Phase 2

Lecture 179 IKE Phase 2 - Configuration/ Verification

Section 27: Remote Access VPN

Lecture 180 Remote Access VPN

Lecture 181 What is SSL-TLS

Lecture 182 How SSL-TLS Works

Lecture 183 What is SSL VPN

Lecture 184 SSL VPN - Modes

Section 28: Authentication, Authorization, Accounting - AAA

Lecture 185 AAA - Network Security

Lecture 186 AAA - Components

Lecture 187 AAA Protocols - TACACS - RADIUS

Lecture 188 AAA- Cisco Authentication Servers

Section 29: AAA Authentication

Lecture 189 AAA Authentication - Device Access

Lecture 190 Authentication Local database

Lecture 191 AAA External Servers

Lecture 192 Authentication - External server (TACACS)

Section 30: AAA Authorization

Lecture 193 Authorization - Device Access

Lecture 194 IOS Privilege Levels

Lecture 195 Local Authorization using Privilege Levels

Lecture 196 IOS Privilege Levels _ Limitations

Lecture 197 Role based CLI Access - RBAC

Lecture 198 RBAC Views - Types

Lecture 199 RBAC Views - LAB1

Lecture 200 Modify RBAC Views - LAB 2

Lecture 201 Modify RBAC Views - LAB 3

Lecture 202 RBAC - Super Views

Section 31: WEb Traffic - Attacks- Solutions

Lecture 203 Web Access - Possible Threats

Lecture 204 Web Based Attacks-

Lecture 205 Web Attack Examples

Lecture 206 Web Security Solutions

Section 32: CIsco Web Security Appliance - WSA

Lecture 207 Cisco Web Security - WSA-CWS

Lecture 208 What is WSA ?

Lecture 209 WSA- HOw it Works

Lecture 210 WSA Deployment Modes

Lecture 211 WSA models - Physical -Virtual Appliance

Lecture 212 WSA Licensing Options

Section 33: Email Security _ ESA

Lecture 213 Email Based Threats

Lecture 214 Cisco Email Security Appliance - ESA

Section 34: Intrusion Prevention System - IPS

Lecture 215 What is Intrusion

Lecture 216 Intrusion Prevention System - IPS

Lecture 217 IDS vs IPS

Lecture 218 Host Based IPS vs Network Based IPS

Lecture 219 IPS Deployment Modes - INline vs Promiscious

Lecture 220 Cisco IPS Solutions

Lecture 221 IPS Threat Detection Methods

Lecture 222 IPS Signature Alarm Types

Lecture 223 IPS Signature Actions

Lecture 224 IPS Evasion Methods - CounterMeasures

Section 35: Network Management

Lecture 225 What is Network Management

Lecture 226 Past-Present Methods of Network Mangement- PART 1

Lecture 227 Past-Present Methods of Network Mangement- PART 2

Lecture 228 SNMP- Simple Network Mangement Protocol

Section 36: Network Automation

Lecture 229 Challenges - Traditional Management

Lecture 230 Network Automation - Goals

Lecture 231 Types of Network Automation

Lecture 232 What can be Automated - PART 1

Lecture 233 What can be Automated - PART 2

Lecture 234 Impact of Network Automation

Section 37: SDN & SDN Controllers

Lecture 235 Automation Origination Points

Lecture 236 SDN - Software Defined Networking

Lecture 237 SDN Controllers

Lecture 238 Networks Managed by SDN Controllers

Section 38: SDN-Control-MGMT-DATA Plane

Lecture 239 Identify Network Device Planes

Lecture 240 Data Plane

Lecture 241 Control Plane

Lecture 242 Management Plane

Lecture 243 SDN-Management Plane

Lecture 244 SDN-Control Plane - Data Plane

Section 39: SDN Models - Architecture

Lecture 245 SDN - Imperative Model

Lecture 246 SDN - Declarative Model

Lecture 247 SDN - Network Design Requirments

Lecture 248 UNderlaY Networks

Lecture 249 Overlay Networks

Lecture 250 SDN Fabric

Section 40: Application Programming Interface - API

Lecture 251 Application Programming Interface - API

Lecture 252 API Types

Lecture 253 API - With SDN Networks

Lecture 254 NorthBound API

Lecture 255 SouthBound API

Section 41: Cisco DEVNET - SANDBOXs

Lecture 256 Cisco DevNet

Lecture 257 DevNet Certifications

Lecture 258 DevNet Sandbox

Lecture 259 DevNet Sandbox LABS

Lecture 260 Sandbox LAB Access - Reservations

Section 42: Cisco DNA Center

Lecture 261 Cisco DNA Center

Lecture 262 DNA Center Appliance

Lecture 263 DNA Center- What can do - PART 1

Lecture 264 DNA Center- What can do - PART 2

Section 43: Web Service API - REST API

Lecture 265 Web Service API

Lecture 266 Web Service API - Commonly Used

Lecture 267 REST API

Section 44: Network Automation Tools

Lecture 268 Config Management Tools

Lecture 269 Config Management Tools - Capabilities

Lecture 270 Configuration Management Tools - Similarities

Lecture 271 Master-Agent

Lecture 272 Agent Based vs Agentless

Lecture 273 Push-Pull Model

Lecture 274 Configuration Files

Section 45: PUPPET - Config MGMT Tool

Lecture 275 PUPPET - Config MGMT Tool

Lecture 276 PUPPET-Master Agent Database

Lecture 277 PUPPET - Manifest

Lecture 278 PUPPET-Module-Forge

Lecture 279 PUPPET-Agent- Agentless

Lecture 280 PUPPET-PULL Model Steps

Section 46: CHEF- Config MGMT Tool

Lecture 281 CHEF- Config MGMT Tool

Lecture 282 CHEF- Terminology

Section 47: ANSIBLE- COnfig MGMT Tool

Lecture 283 ANSIBLE- COnfig MGMT Tool

Lecture 284 ANSIBLE- Control Station

Lecture 285 ANSIBLE- PlayBook-Inventory

Lecture 286 ANSIBLE- Templates-Variables

Section 48: JSON Data Encoding

Lecture 287 API Data Formats

Lecture 288 JSON Overview

Lecture 289 JSON Data Types

Lecture 290 JSON Syntax Rules

Lecture 291 JSON Data Interpretation

Network Security Engineers,Security Engineers
qgIXV3Q0_o.jpg


Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!

Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!

Free search engine download: Udemy CCNP SECURITY CORE SCOR-350-701 2022-4
 
Kommentar

In der Börse ist nur das Erstellen von Download-Angeboten erlaubt! Ignorierst du das, wird dein Beitrag ohne Vorwarnung gelöscht. Ein Eintrag ist offline? Dann nutze bitte den Link  Offline melden . Möchtest du stattdessen etwas zu einem Download schreiben, dann nutze den Link  Kommentieren . Beide Links findest du immer unter jedem Eintrag/Download.

Data-Load.me | Data-Load.ing | Data-Load.to

Auf Data-Load.me findest du Links zu kostenlosen Downloads für Filme, Serien, Dokumentationen, Anime, Animation & Zeichentrick, Audio / Musik, Software und Dokumente / Ebooks / Zeitschriften. Wir sind deine Boerse für kostenlose Downloads!

Ist Data-Load legal?

Data-Load ist nicht illegal. Es werden keine zum Download angebotene Inhalte auf den Servern von Data-Load gespeichert.
Oben Unten